URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Submission: On October 10 via api from CH

Summary

This website contacted 71 IPs in 6 countries across 53 domains to perform 349 HTTP transactions. The main IP is 2.18.233.143, located in European Union and belongs to AKAMAI-AS - Akamai Technologies, Inc., US. The main domain is www.zdnet.com.
TLS certificate: Issued by GeoTrust RSA CA 2018 on August 28th 2018. Valid for: 10 months.
This is the only time www.zdnet.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 12 2.18.233.143 16625 (AKAMAI-AS)
62 2.18.233.149 16625 (AKAMAI-AS)
6 23.38.48.113 20940 (AKAMAI-ASN1)
1 2.18.234.21 16625 (AKAMAI-AS)
5 184.30.223.226 20940 (AKAMAI-ASN1)
1 8 2a00:1450:400... 15169 (GOOGLE)
1 54.230.93.44 16509 (AMAZON-02)
3 34.201.183.1 14618 (AMAZON-AES)
3 2a00:1450:400... 15169 (GOOGLE)
9 2a00:1450:400... 15169 (GOOGLE)
16 172.217.22.98 15169 (GOOGLE)
16 68.232.35.180 15133 (EDGECAST)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
4 2400:cb00:204... 13335 (CLOUDFLAR...)
4 2400:cb00:204... 13335 (CLOUDFLAR...)
2 7 52.31.106.135 16509 (AMAZON-02)
1 64.30.224.172 6623 (CBSI-1)
3 23.67.133.222 20940 (AKAMAI-ASN1)
2 2606:4700:20:... 13335 (CLOUDFLAR...)
6 143.204.101.19 16509 (AMAZON-02)
1 2600:9000:200... 16509 (AMAZON-02)
3 64.30.230.22 6623 (CBSI-1)
1 52.3.8.119 14618 (AMAZON-AES)
1 34.231.154.145 14618 (AMAZON-AES)
1 2606:4700:20:... 13335 (CLOUDFLAR...)
2 2 184.30.221.236 20940 (AKAMAI-ASN1)
2 2 34.192.19.184 14618 (AMAZON-AES)
2 2 2.18.233.201 16625 (AKAMAI-AS)
1 34.246.247.78 16509 (AMAZON-02)
2 2 34.255.138.125 16509 (AMAZON-02)
2 3 35.156.121.57 16509 (AMAZON-02)
1 5 54.154.86.186 16509 (AMAZON-02)
4 54.76.79.78 16509 (AMAZON-02)
2 52.17.182.129 16509 (AMAZON-02)
3 63.140.43.37 15224 (OMNITURE)
3 94.31.29.248 33438 (HIGHWINDS2)
2 94.31.29.96 33438 (HIGHWINDS2)
5 185.33.223.221 29990 (ASN-APPNEXUS)
2 23.53.169.164 16625 (AKAMAI-AS)
1 4 66.117.28.68 15224 (OMNITURE)
12 2a00:1450:400... 15169 (GOOGLE)
1 2a03:2880:f01... 32934 (FACEBOOK)
1 2620:109:c00c... 14413 (LINKEDIN)
2 7 172.227.85.103 16625 (AKAMAI-AS)
1 23.45.101.171 20940 (AKAMAI-ASN1)
1 54.76.241.29 16509 (AMAZON-02)
2 2a03:2880:f01... 32934 (FACEBOOK)
2 2 66.117.28.86 15224 (OMNITURE)
1 1 172.217.22.66 15169 (GOOGLE)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
1 1 172.217.21.226 15169 (GOOGLE)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1288:110... 34010 (YAHOO-IRD)
2 172.217.22.102 15169 (GOOGLE)
1 23.60.198.210 16625 (AKAMAI-AS)
1 54.154.93.90 16509 (AMAZON-02)
3 151.101.120.134 54113 (FASTLY)
2 2a03:2880:f11... 32934 (FACEBOOK)
1 2a00:1450:400... 15169 (GOOGLE)
38 2.18.235.40 16625 (AKAMAI-AS)
1 104.94.183.192 16625 (AKAMAI-AS)
3 23.67.129.200 20940 (AKAMAI-ASN1)
15 151.101.194.2 54113 (FASTLY)
4 213.19.162.71 26667 (RUBICONPR...)
3 2400:cb00:204... 13335 (CLOUDFLAR...)
2 151.101.0.134 54113 (FASTLY)
3 213.19.162.67 26667 (RUBICONPR...)
1 52.54.117.157 14618 (AMAZON-AES)
14 2a00:1450:400... 15169 (GOOGLE)
4 104.111.230.142 16625 (AKAMAI-AS)
3 2a00:1450:400... 15169 (GOOGLE)
3 2a00:1450:400... 15169 (GOOGLE)
1 34.202.248.102 14618 (AMAZON-AES)
1 213.19.162.27 26667 (RUBICONPR...)
8 18.130.107.65 16509 (AMAZON-02)
4 151.101.193.181 54113 (FASTLY)
2 2a00:1450:400... 15169 (GOOGLE)
349 71
Apex Domain
Subdomains
Transfer
62 cbsistatic.com
zdnet3.cbsistatic.com
zdnet2.cbsistatic.com
zdnet1.cbsistatic.com
zdnet4.cbsistatic.com
773 KB
32 googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
509 KB
26 moatads.com
z.moatads.com
geo.moatads.com
px.moatads.com
700 KB
23 doubleclick.net
securepubads.g.doubleclick.net
cm.g.doubleclick.net
googleads.g.doubleclick.net
205 KB
20 moatpixel.com
cbsdfp5832910442.s.moatpixel.com
8 KB
17 rubiconproject.com
ads.rubiconproject.com
optimized-by.rubiconproject.com
beacon-eu-ams3.rubiconproject.com
eus.rubiconproject.com
s.update.rubiconproject.com
37 KB
16 tiqcdn.com
tags.tiqcdn.com
92 KB
15 taboola.com
cdn.taboola.com
trc.taboola.com
images.taboola.com
320 KB
9 ml314.com
ml314.com
in.ml314.com
15 KB
8 imrworldwide.com
cdn-gl.imrworldwide.com
secure-us.imrworldwide.com
secure-dcr-cert.imrworldwide.com
65 KB
8 cbsi.com
dw.cbsi.com
saa.cbsi.com
rev.cbsi.com
14 KB
8 viglink.com
cdn.viglink.com
api.viglink.com
58 KB
7 scorecardresearch.com
sb.scorecardresearch.com
5 KB
7 demdex.net
dpm.demdex.net
cbsi.demdex.net
6 KB
7 google.com
adservice.google.com
www.google.com
2 KB
7 google.de
adservice.google.de
www.google.de
1 KB
6 everesttech.net
pixel.everesttech.net
cm.everesttech.net
3 KB
6 evidon.com
c.evidon.com
25 KB
6 zdnet.com
www.zdnet.com
67 KB
5 disqus.com
zdnet-1.disqus.com
disqus.com
26 KB
5 adnxs.com
secure.adnxs.com
3 KB
5 cbsinteractive.com
vidtech.cbsinteractive.com
299 KB
4 perfectmarket.com
widget.perfectmarket.com
94 KB
4 pagefair.com
asset.pagefair.com
stats.pagefair.com
6 KB
4 lightboxcdn.com
www.lightboxcdn.com
122 KB
4 go-mpulse.net
c.go-mpulse.net
58 KB
3 disquscdn.com
c.disquscdn.com
194 KB
3 facebook.com
graph.facebook.com
www.facebook.com
1 KB
3 eyeota.net
ps.eyeota.net
853 B
3 tru.am
tru.am
beacon.tru.am
16 KB
3 everestjs.net
www.everestjs.net
6 KB
3 betrad.com
l.betrad.com
360 B
2 google-analytics.com
www.google-analytics.com
17 KB
2 2mdn.net
s0.2mdn.net
90 KB
2 facebook.net
connect.facebook.net
31 KB
2 casalemedia.com
as-sec.casalemedia.com
1 KB
2 pagefair.net
asset.pagefair.net
886 B
2 akstat.io
36e4f0eb.akstat.io
22ffabbe.akstat.io
708 B
2 crwdcntrl.net
sync.crwdcntrl.net
1 KB
2 mathtag.com
pixel.mathtag.com
1 KB
2 rlcdn.com
idsync.rlcdn.com
594 B
2 bluekai.com
tags.bluekai.com
1 KB
2 agkn.com
js.agkn.com
d.agkn.com
3 KB
2 googletagservices.com
www.googletagservices.com
17 KB
1 googleapis.com
imasdk.googleapis.com
1 yieldmanager.com
ad.yieldmanager.com
1 KB
1 googleadservices.com
www.googleadservices.com
311 B
1 urbanairship.com
web-sdk.urbanairship.com
17 KB
1 qualtrics.com
zn_3xebfjduss0srw5-cbs.siteintercept.qualtrics.com
13 KB
1 linkedin.com
www.linkedin.com
518 B
1 akamaihd.net
iicbsi-a.akamaihd.net
268 B
1 sharethrough.com
native.sharethrough.com
105 KB
1 indexww.com
js-sec.indexww.com
24 KB
349 53
Domain Requested by
20 cbsdfp5832910442.s.moatpixel.com
20 pagead2.googlesyndication.com securepubads.g.doubleclick.net
optimized-by.rubiconproject.com
pagead2.googlesyndication.com
20 zdnet3.cbsistatic.com www.zdnet.com
zdnet2.cbsistatic.com
16 tags.tiqcdn.com zdnet2.cbsistatic.com
tags.tiqcdn.com
16 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
www.zdnet.com
16 zdnet4.cbsistatic.com www.zdnet.com
zdnet2.cbsistatic.com
zdnet3.cbsistatic.com
14 zdnet1.cbsistatic.com www.zdnet.com
zdnet2.cbsistatic.com
12 tpc.googlesyndication.com securepubads.g.doubleclick.net
www.zdnet.com
12 zdnet2.cbsistatic.com www.zdnet.com
zdnet2.cbsistatic.com
zdnet3.cbsistatic.com
10 z.moatads.com securepubads.g.doubleclick.net
8 images.taboola.com
8 px.moatads.com
8 geo.moatads.com z.moatads.com
8 ml314.com 2 redirects tags.tiqcdn.com
ml314.com
www.zdnet.com
7 sb.scorecardresearch.com 2 redirects tags.tiqcdn.com
cdn.taboola.com
widget.perfectmarket.com
6 googleads.g.doubleclick.net 1 redirects pagead2.googlesyndication.com
6 cdn-gl.imrworldwide.com tags.tiqcdn.com
cdn-gl.imrworldwide.com
vidtech.cbsinteractive.com
6 adservice.google.com www.googletagservices.com
pagead2.googlesyndication.com
6 adservice.google.de www.googletagservices.com
pagead2.googlesyndication.com
6 c.evidon.com www.zdnet.com
c.evidon.com
6 www.zdnet.com 1 redirects zdnet3.cbsistatic.com
vidtech.cbsinteractive.com
5 secure.adnxs.com js-sec.indexww.com
5 dpm.demdex.net 1 redirects www.zdnet.com
tags.tiqcdn.com
vidtech.cbsinteractive.com
5 vidtech.cbsinteractive.com zdnet2.cbsistatic.com
vidtech.cbsinteractive.com
4 trc.taboola.com cdn.taboola.com
4 widget.perfectmarket.com cdn.taboola.com
widget.perfectmarket.com
4 eus.rubiconproject.com www.zdnet.com
4 beacon-eu-ams3.rubiconproject.com www.zdnet.com
4 optimized-by.rubiconproject.com ads.rubiconproject.com
4 ads.rubiconproject.com www.zdnet.com
4 pixel.everesttech.net 1 redirects
4 api.viglink.com cdn.viglink.com
4 dw.cbsi.com tags.tiqcdn.com
www.zdnet.com
4 www.lightboxcdn.com www.zdnet.com
www.lightboxcdn.com
4 cdn.viglink.com tags.tiqcdn.com
www.zdnet.com
4 c.go-mpulse.net www.zdnet.com
c.go-mpulse.net
zdnet1.cbsistatic.com
3 c.disquscdn.com zdnet-1.disqus.com
3 cdn.taboola.com zdnet2.cbsistatic.com
cdn.taboola.com
3 zdnet-1.disqus.com zdnet2.cbsistatic.com
zdnet-1.disqus.com
3 asset.pagefair.com zdnet3.cbsistatic.com
asset.pagefair.com
3 saa.cbsi.com tags.tiqcdn.com
3 ps.eyeota.net 2 redirects www.zdnet.com
3 www.everestjs.net tags.tiqcdn.com
www.everestjs.net
3 l.betrad.com www.zdnet.com
2 www.google-analytics.com widget.perfectmarket.com
2 disqus.com zdnet-1.disqus.com
2 www.facebook.com connect.facebook.net
2 s0.2mdn.net zdnet2.cbsistatic.com
s0.2mdn.net
2 cm.everesttech.net 2 redirects
2 connect.facebook.net tags.tiqcdn.com
connect.facebook.net
2 as-sec.casalemedia.com js-sec.indexww.com
2 asset.pagefair.net zdnet3.cbsistatic.com
2 cbsi.demdex.net tags.tiqcdn.com
2 sync.crwdcntrl.net 2 redirects
2 pixel.mathtag.com 2 redirects
2 idsync.rlcdn.com 2 redirects
2 tags.bluekai.com 2 redirects
2 tru.am tags.tiqcdn.com
tru.am
2 www.googletagservices.com www.zdnet.com
rev.cbsi.com
1 s.update.rubiconproject.com www.zdnet.com
1 secure-dcr-cert.imrworldwide.com
1 rev.cbsi.com www.zdnet.com
1 imasdk.googleapis.com s0.2mdn.net
1 22ffabbe.akstat.io c.go-mpulse.net
1 stats.pagefair.com zdnet3.cbsistatic.com
1 ad.yieldmanager.com
1 www.google.de
1 www.google.com 1 redirects
1 www.googleadservices.com 1 redirects
1 web-sdk.urbanairship.com zdnet3.cbsistatic.com
1 cm.g.doubleclick.net 1 redirects
1 secure-us.imrworldwide.com
1 zn_3xebfjduss0srw5-cbs.siteintercept.qualtrics.com tags.tiqcdn.com
1 www.linkedin.com zdnet3.cbsistatic.com
1 graph.facebook.com zdnet3.cbsistatic.com
1 36e4f0eb.akstat.io zdnet1.cbsistatic.com
1 beacon.tru.am tru.am
1 in.ml314.com ml314.com
1 d.agkn.com js.agkn.com
1 js.agkn.com tags.tiqcdn.com
1 iicbsi-a.akamaihd.net tags.tiqcdn.com
1 native.sharethrough.com www.zdnet.com
1 js-sec.indexww.com www.zdnet.com
349 83
Subject Issuer Validity Valid
www.cbs.com
GeoTrust RSA CA 2018
2018-08-28 -
2019-06-22
10 months crt.sh
cc.cnetcontent.com
DigiCert SHA2 Secure Server CA
2018-10-05 -
2020-01-04
a year crt.sh
*.evidon.com
DigiCert ECC Secure Server CA
2018-02-02 -
2019-04-02
a year crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2018-04-16 -
2019-02-06
10 months crt.sh
akstat.io
DigiCert ECC Secure Server CA
2018-03-12 -
2019-05-11
a year crt.sh
*.g.doubleclick.net
Google Internet Authority G3
2018-09-18 -
2018-12-11
3 months crt.sh
*.sharethrough.com
Go Daddy Secure Certificate Authority - G2
2017-09-18 -
2018-11-17
a year crt.sh
l.betrad.com
Go Daddy Secure Certificate Authority - G2
2017-04-25 -
2019-06-24
2 years crt.sh
*.google.com
Google Internet Authority G3
2018-09-18 -
2018-12-11
3 months crt.sh
*.tiqcdn.com
DigiCert SHA2 Secure Server CA
2017-10-25 -
2020-05-13
3 years crt.sh
a248.e.akamai.net
DigiCert ECC Secure Server CA
2018-01-23 -
2019-01-19
a year crt.sh
ssl418259.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-09-22 -
2019-03-31
6 months crt.sh
ssl516460.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-10-06 -
2019-04-14
6 months crt.sh
*.ml314.com
Amazon
2018-04-14 -
2019-05-14
a year crt.sh
*.cbsi.com
DigiCert SHA2 High Assurance Server CA
2017-11-07 -
2021-02-04
3 years crt.sh
www.everestjs.net
DigiCert SHA2 Secure Server CA
2018-05-21 -
2020-05-28
2 years crt.sh
ssl389962.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-08-08 -
2019-02-14
6 months crt.sh
*.imrworldwide.com
DigiCert SHA2 Secure Server CA
2018-02-15 -
2019-07-11
a year crt.sh
*.agkn.com
RapidSSL RSA CA 2018
2018-06-21 -
2020-09-16
2 years crt.sh
www.eyeota.com
COMODO RSA Domain Validation Secure Server CA
2018-02-12 -
2021-02-11
3 years crt.sh
*.demdex.net
DigiCert SHA2 High Assurance Server CA
2018-01-09 -
2021-02-12
3 years crt.sh
viglink.com
Amazon
2018-03-09 -
2019-04-09
a year crt.sh
saa.cbsi.com
DigiCert SHA2 High Assurance Server CA
2018-05-19 -
2019-08-22
a year crt.sh
asset.pagefair.com
Let's Encrypt Authority X3
2018-07-30 -
2018-10-28
3 months crt.sh
asset.pagefair.net
Let's Encrypt Authority X3
2018-07-30 -
2018-10-28
3 months crt.sh
*.adnxs.com
DigiCert ECC Secure Server CA
2018-01-25 -
2019-01-25
a year crt.sh
tpc.googlesyndication.com
Google Internet Authority G3
2018-09-18 -
2018-12-11
3 months crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2017-12-15 -
2019-03-22
a year crt.sh
www.linkedin.com
DigiCert SHA2 Secure Server CA
2018-05-30 -
2020-09-01
2 years crt.sh
*.scorecardresearch.com
COMODO RSA Organization Validation Secure Server CA
2017-12-06 -
2018-12-26
a year crt.sh
*.qualtrics.com
DigiCert SHA2 Secure Server CA
2018-10-08 -
2021-01-06
2 years crt.sh
*.everesttech.net
DigiCert SHA2 Secure Server CA
2017-04-13 -
2020-04-17
3 years crt.sh
*.urbanairship.com
DigiCert SHA2 Secure Server CA
2018-04-17 -
2019-07-17
a year crt.sh
www.google.de
Google Internet Authority G3
2018-09-25 -
2018-12-18
3 months crt.sh
*.ads.yahoo.com
DigiCert SHA2 High Assurance Server CA
2018-07-05 -
2019-01-10
6 months crt.sh
*.doubleclick.net
Google Internet Authority G3
2018-09-18 -
2018-12-11
3 months crt.sh
*.pagefair.com
Gandi Standard SSL CA 2
2016-11-02 -
2018-11-20
2 years crt.sh
*.disqus.com
DigiCert SHA2 Secure Server CA
2018-03-28 -
2020-04-27
2 years crt.sh
*.googleapis.com
Google Internet Authority G3
2018-09-18 -
2018-12-11
3 months crt.sh
moatads.com
DigiCert ECC Secure Server CA
2018-01-09 -
2019-01-09
a year crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2016-01-12 -
2019-03-01
3 years crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2018-09-06 -
2019-09-07
a year crt.sh
ssl565697.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-10-07 -
2019-04-15
6 months crt.sh
kazfv.com
COMODO ECC Domain Validation Secure Server CA
2018-07-20 -
2019-07-20
a year crt.sh
*.moatads.com
DigiCert SHA2 Secure Server CA
2018-04-27 -
2019-04-27
a year crt.sh
p.ssl.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2018-03-02 -
2018-12-28
10 months crt.sh
*.google-analytics.com
Google Internet Authority G3
2018-09-18 -
2018-12-11
3 months crt.sh

This page contains 37 frames:

Primary Page: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Frame ID: FC2E5A2B9A082B2EB5BE588E517862CB
Requests: 247 HTTP requests in this frame

Frame: https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Frame ID: 204EB2F50B12969E825D1B3AABC50791
Requests: 2 HTTP requests in this frame

Frame: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/lightbox.js?cb=1539175738989&lv=1
Frame ID: 6E619EC3017CE080907CC8CBFC5EDB3E
Requests: 2 HTTP requests in this frame

Frame: https://d.agkn.com/iframe/8613/?che=433741523&c=%7B%22bpid%22%3A%22cbsinteractive%22%2C%22loc%22%3A%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F%22%2C%22ref%22%3A%22-1%22%2C%22cid%22%3A%22-1%22%2C%22sid%22%3A%22-1%22%2C%22gen%22%3A%22-1%22%2C%22age%22%3A%22-1%22%2C%22cat%22%3A%22-1%22%2C%22brd%22%3A%22-1%22%7D
Frame ID: 30BFE4D36D6983F60B44B43720033924
Requests: 1 HTTP requests in this frame

Frame: https://cdn-gl.imrworldwide.com/novms/html/ls.html
Frame ID: 36D2806B52BFD13B288D084690A3F41E
Requests: 1 HTTP requests in this frame

Frame: https://cbsi.demdex.net/dest5.html?d_nsid=undefined
Frame ID: 6289B14A6B71BB7853797A5A813EA2C5
Requests: 1 HTTP requests in this frame

Frame: https://www.everestjs.net/static/pixel_details.html
Frame ID: 4D97B7BBC10E6AC128FEFC033FC9D3BD
Requests: 1 HTTP requests in this frame

Frame: https://www.lightboxcdn.com/lclst/a1583f50-579b-41d0-8c4e-1cd1790d945c/ls.html?purl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&vid=a1583f50-579b-41d0-8c4e-1cd1790d945c&se=1&prev=0&cb=636730487871673517
Frame ID: EB0FD626D0079B1552DA19882EFC4832
Requests: 1 HTTP requests in this frame

Frame: https://cbsi.demdex.net/dest5.html?d_nsid=0
Frame ID: 61D8A61FA6F5889B57D109C2E5C0A6AD
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.242.3_en.html
Frame ID: 0B3E84EC53B98DCC59E2D3DE152DC9FC
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/osd_listener.js
Frame ID: DEDB6F1D2D931045FB399C01C90134B4
Requests: 4 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/osd_listener.js
Frame ID: 03848854C0B28A28F59BE2807AF08DBE
Requests: 4 HTTP requests in this frame

Frame: https://ads.rubiconproject.com/ad/9818.js
Frame ID: F33E9A7F4DEE9E4AF418B2A1B64EB2EF
Requests: 14 HTTP requests in this frame

Frame: https://ads.rubiconproject.com/ad/9818.js
Frame ID: 73126A784C3FB7FDC09353892536C1F7
Requests: 14 HTTP requests in this frame

Frame: https://ads.rubiconproject.com/ad/9818.js
Frame ID: 0E18CC532B0D6E819CF05097288FFC65
Requests: 14 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/osd_listener.js
Frame ID: 945DF2D62579585C178B95BBA3E00823
Requests: 4 HTTP requests in this frame

Frame: https://ads.rubiconproject.com/ad/9818.js
Frame ID: 2FA4BCA602009CD1F0DD945AE11CD8AE
Requests: 13 HTTP requests in this frame

Frame: https://rev.cbsi.com/common/js/adKit.min.js?136957480
Frame ID: 5BA5BBD991ACDC854AA3DF6B31B8BF5C
Requests: 13 HTTP requests in this frame

Frame: https://www.facebook.com/tr/
Frame ID: 1B2119F07697D2501CF5911F45A323C1
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20181008/r20180604/zrt_lookup.html
Frame ID: 2423C1E72C6351A18A4990CF8B6EB2D4
Requests: 1 HTTP requests in this frame

Frame: https://pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/show_ads_impl.js
Frame ID: 655259156A1373AC569A4C4FCB038D6D
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Frame ID: 267DC126670D8097DC59835DE2C3C560
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Frame ID: 084A77BE13A9FFDEA646F68E5D29B589
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Frame ID: 9AD0A62AF572B29D37C34B451982EBF5
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Frame ID: 89061F385383FEA56400EF2546FDCE15
Requests: 1 HTTP requests in this frame

Frame: https://disqus.com/embed/comments/?base=default&f=zdnet-1&t_i=7a12161d-2a5f-4793-b0a4-9fac038733de&t_u=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&t_e=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks&t_d=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks&t_t=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks&s_o=default
Frame ID: 90BEF1010BBC6AE1AA9AE396AF2F91AA
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=90&slotname=3084619100&adk=3828543735&adf=4077151315&w=728&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1539175741678&bpp=54&bdt=1198&fdt=60&idt=1162&shv=r20181008&cbv=r20180604&saldr=sa&correlator=5564504658635&frm=23&ife=5&pv=2&ga_vid=1393442137.1539175743&ga_sid=1539175743&ga_hid=545914389&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=429&ady=5554&biw=1585&bih=1200&isw=728&ish=90&ifk=1649710351&scr_x=0&scr_y=0&eid=21060853%2C828064255&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C728%2C90&vis=1&rsz=%7C%7CopeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=4066913089&ifi=1&fsb=1&dtd=1198
Frame ID: 4B4B8F675CF254167E496E2D487D8A16
Requests: 1 HTTP requests in this frame

Frame: https://pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/show_ads_impl.js
Frame ID: 9A07106748ED4D85DFC1A6B1243E8739
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=250&slotname=8385808081&adk=1919950094&adf=4077151325&w=300&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1539175741771&bpp=37&bdt=1293&fdt=1340&idt=1342&shv=r20181008&cbv=r20180604&saldr=sa&correlator=5564504658635&frm=23&ife=5&pv=1&ga_vid=768515829.1539175743&ga_sid=1539175743&ga_hid=1354558742&ga_fc=0&iag=3&icsg=693856&nhd=1&dssz=21&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1043&ady=1501&biw=1585&bih=1200&isw=300&ish=250&ifk=1789179933&scr_x=0&scr_y=0&eid=21060853%2C214678100%2C828064255&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=3832671437&ifi=1&fsb=1&dtd=1365
Frame ID: 4720E365A97A9F3BB961CC32585D830B
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/osd_listener.js
Frame ID: E06B63AD9C04ABDEEC55993BB88CD5F5
Requests: 3 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/osd_listener.js
Frame ID: CAACA2375BC30137674A5680574B0054
Requests: 3 HTTP requests in this frame

Frame: https://pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/show_ads_impl.js
Frame ID: 99324FD48E8FFF43BDB2AE11A9476D04
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=90&slotname=3084619100&adk=3828543735&adf=4077151327&w=728&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1539175741840&bpp=20&bdt=1364&fdt=1444&idt=1445&shv=r20181008&cbv=r20180604&saldr=sa&correlator=5564504658635&frm=23&ife=5&pv=1&ga_vid=17796702.1539175743&ga_sid=1539175743&ga_hid=1152038625&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=429&ady=393&biw=1585&bih=1200&isw=728&ish=90&ifk=2834320770&scr_x=0&scr_y=0&eid=21060853%2C828064255%2C20196256&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C728%2C90&vis=1&rsz=%7C%7CoeE%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=4066913089&ifi=1&fsb=1&dtd=1454
Frame ID: 6583F99A8866021E55C5F00BB473FD3E
Requests: 1 HTTP requests in this frame

Frame: https://pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/show_ads_impl.js
Frame ID: 92EF8979792621322F3790BD893F0545
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=250&slotname=8385808081&adk=1919950094&adf=4077151324&w=300&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1539175741887&bpp=12&bdt=1409&fdt=1524&idt=1531&shv=r20181008&cbv=r20180604&saldr=sa&correlator=5564504658635&frm=23&ife=5&pv=1&ga_vid=1952706785.1539175743&ga_sid=1539175743&ga_hid=1604975321&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1043&ady=513&biw=1585&bih=1200&isw=300&ish=250&ifk=2180882631&scr_x=0&scr_y=0&eid=21060853%2C828064255&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CoeE%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=3832671437&ifi=1&fsb=1&dtd=1556
Frame ID: DFB3BEC6C788C61419FE9F10C8C9C5B0
Requests: 1 HTTP requests in this frame

Frame: https://widget.perfectmarket.com/opt/tboptevent.html?v=2&a=u&d=%7B%22stp%22%3A%7B%22a%22%3A1%7D%7D
Frame ID: 3BBCA231E4A6B5A8487BEA43D67371B5
Requests: 1 HTTP requests in this frame

Frame: https://widget.perfectmarket.com/opt/tboptevent.html?v=2&a=u&d=%7B%22stp%22%3A%7B%22v%22%3A1%7D%7D
Frame ID: 027D582103E63FF5D62A32C36AB9B805
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazi... HTTP 301
    https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazi... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • env /^requirejs$/i

Overall confidence: 100%
Detected patterns
  • env /pbjs/i

Overall confidence: 100%
Detected patterns
  • env /^DISQUS/i

Overall confidence: 100%
Detected patterns
  • script /2mdn\.net/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^\/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • script /googlesyndication\.com\//i
  • script /2mdn\.net/i
  • env /^__google_ad_/i
  • env /^Goog_AdSense_/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|(analytics))\.js/i
  • env /^gaGlobal$/i

Overall confidence: 100%
Detected patterns
  • env /^googletag$/i

Overall confidence: 100%
Detected patterns
  • env /^Modernizr$/i

Overall confidence: 100%
Detected patterns
  • env /^optimizely$/i

Overall confidence: 100%
Detected patterns
  • env /^SWFObject$/i

Overall confidence: 100%
Detected patterns
  • env /^s_(?:account|objectID|code|INST)$/i


Overall confidence: 100%
Detected patterns
  • html /<iframe[^>]* (?:id="comscore"|scr=[^>]+comscore)|\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • script /\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • env /^_?COMSCORE$/i

Overall confidence: 100%
Detected patterns
  • env /^jQuery$/i

Page Statistics

349
Requests

100 %
HTTPS

31 %
IPv6

53
Domains

83
Subdomains

71
IPs

6
Countries

4050 kB
Transfer

13651 kB
Size

24
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks HTTP 301
    https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 101
  • https://tags.bluekai.com/site/20486?limit=0&id=5978151440201526240&redir=https://ml314.com/csync.ashx%3Ffp=$_BK_UUID%26person_id=5978151440201526240%26eid=50056 HTTP 302
  • https://tags.bluekai.com/site/20486?dt=0&r=2061585571&sig=1541381440&bkca=KJh+pnLvQY9D9BY43zSXZ+GeUYvYSsbV1Y1Cu2uCdgfSZyIzlPQEOVHZWSyrvXyyoD991X/JCzpghUihhKCYQ8e5Y6hp5P3Ay7tG49fqkHq2bAxitNam62YkCeF+yl7/ddaNdxA9Tyd0EYmD HTTP 302
  • https://ml314.com/csync.ashx?fp=1JnjEQ999992oqNq&person_id=5978151440201526240&eid=50056
Request Chain 102
  • https://idsync.rlcdn.com/395886.gif?partner_uid=5978151440201526240 HTTP 307
  • https://idsync.rlcdn.com/1000.gif?memo=CO6UGBIeChoIARCuXxoTNTk3ODE1MTQ0MDIwMTUyNjI0MBAAGg0Iu-r33QUSBQjoBxAA HTTP 307
  • https://ml314.com/csync.ashx?fp=&person_id=5978151440201526240&eid=50082
Request Chain 103
  • https://pixel.mathtag.com/sync/img?redir=https://ml314.com/csync.ashx%3Ffp=[MM_UUID]%26person_id=5978151440201526240%26eid=50220 HTTP 302
  • https://pixel.mathtag.com/sync/img?redir=https://ml314.com/csync.ashx%3Ffp=[MM_UUID]%26person_id=5978151440201526240%26eid=50220&mm_bnc&mm_bct HTTP 302
  • https://ml314.com/csync.ashx?fp=34ad5bbd-ed4e-4100-8ae2-c1c9135ec559&person_id=5978151440201526240&eid=50220
Request Chain 104
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D5978151440201526240 HTTP 302
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D5978151440201526240 HTTP 302
  • https://ml314.com/csync.ashx?fp=9ecd85e1824080a6c08182f1ac7fcc7f&eid=50146&person_id=5978151440201526240
Request Chain 105
  • https://ps.eyeota.net/pixel?pid=r8hrb20&t=gif HTTP 302
  • https://ps.eyeota.net/pixel/bounce/?pid=r8hrb20&t=gif HTTP 302
  • https://ml314.com/utsync.ashx?eid=50052&et=0&fp=2jBdw91K9vln_g84fBGvaekjHGEGuxzeGR_oD55kgCKQ&return=https%3A%2F%2Fps.eyeota.net%2Fmatch%3Fbid%3Dr8hrb20%26uid%3Dnil HTTP 302
  • https://ml314.com/csync.ashx?fp=2jBdw91K9vln_g84fBGvaekjHGEGuxzeGR_oD55kgCKQ&person_id=5978151440201526240&eid=50052&return=https%3a%2f%2fps.eyeota.net%2fmatch%3fbid%3dr8hrb20%26uid%3dnil HTTP 302
  • https://ps.eyeota.net/match?bid=r8hrb20&uid=nil
Request Chain 106
  • https://dpm.demdex.net/ibs:dpid=22052&dpuuid=5978151440201526240&redir= HTTP 302
  • https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=5978151440201526240&redir=
Request Chain 134
  • https://pixel.everesttech.net/4083/gr?ev_gb=0&url=https%3A%2F%2Fwww.everestjs.net%2Fstatic%2Fpixel_details.html%23google%3D__EFGCK__%26gsurfer%3D__EFGSURFER__%26optout%3D__EFOPTOUT__%26throttleCookie%3D__EFSYNC__%26time%3D__EFTIME__ HTTP 302
  • https://www.everestjs.net/static/pixel_details.html
Request Chain 155
  • https://sb.scorecardresearch.com/b?c1=2&c2=3005086&ns__t=1539175740447&ns_c=UTF-8&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=3005086&ns__t=1539175740447&ns_c=UTF-8&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c9=
Request Chain 161
  • https://cm.everesttech.net/cm HTTP 302
  • https://cm.g.doubleclick.net/pixel?google_nid=everest&google_cm&google_sc&ev_rs=1&url=/1x1&google_hm=VzczMVBBQUFCYVp0ZUQyQg HTTP 302
  • https://cm.everesttech.net/cm/ax?cookieid=&ev_rs=1&url=/1x1&google_gid=CAESEOHTnlyAk0FrG39EGep1kbg&google_cver=1 HTTP 302
  • https://pixel.everesttech.net/1x1
Request Chain 171
  • https://www.googleadservices.com/pagead/conversion/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&amp;guid=ON&amp;script=0 HTTP 302
  • https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&amp;guid=ON&amp;script=0&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&ocp_id=PPW9W_P4IY_b7gOct6jQAw&random=2140728472&sscte=1&crd=CKrPGw&gtd= HTTP 302
  • https://www.google.com/pagead/1p-user-list/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&random=2140728472&crd=CKrPGwiE0Bs&cdct=2&is_vtc=1&random=3194097376 HTTP 302
  • https://www.google.de/pagead/1p-user-list/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&random=2140728472&crd=CKrPGwiE0Bs&cdct=2&is_vtc=1&random=3194097376&ipr=y
Request Chain 298
  • https://sb.scorecardresearch.com/b?c1=7&c2=13739933&c3=20121515121&ns__t=1539175742729&ns_c=UTF-8&cv=3.1&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1539175742729&ns_c=UTF-8&cv=3.1&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c9=

349 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Redirect Chain
  • https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks
  • https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
234 KB
58 KB
Document
General
Full URL
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
9d1b2690aafa1bd28b7850421ad4597b326605b32f16f2c445559ad1204c6f4c
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.zdnet.com
:scheme
https
:path
/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
accept-encoding
gzip, deflate
cookie
fly_device=desktop; fly_geo={"countryCode": "de"}; fly_preferred_edition=eu; fly_default_edition=eu
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
server
nginx
content-type
text/html; charset=UTF-8
set-cookie
ak_bmsc=21652E0F42AE36A22D41C60605527CB20210BAB7BB6E000039F5BD5B134E6177~ple3zye2qyX3sG1crl51BK6zB/NJ10pitIothApA7mL0m5whaJjtGYd5Cburb98lz9YenmbxbGNl5QaamaQKyXkIlbZsVLmZsR7sMM+Fr8xx+oHcYqOeiVyULinF/w6FFtZ7v8C37BfOxkxqFGzmetE30SA+B9Pn9SMxhw01ed/65Un2mRE3gx99DO4/fLat7zmiCH39MUzzDMO+Upvl/H1EN4OiVT2TEr0oIiszeqUi8=; expires=Wed, 10 Oct 2018 14:48:57 GMT; max-age=7200; path=/; domain=.zdnet.com; HttpOnly nemo_highlander-vilynx_gallery=vilynx_gallery%3a1%3aexclude; expires=Thu, 18 Oct 2018 06:59:59 GMT; path=/; domain=.zdnet.com; secure; bm_mi=0125990DC8907A562C4321FEAE9663B8~XLt/G+EHzBjc+KbqpdegqnfUSCQ8KF1a69pk6TV+bNU6jQYfycPbkIcdW4RTku8gGmKW0gPEMXqMqjqlPQCTm/0ivYAY9nH7iRyI35VmyspOuOp8N277PrPPUk0yUri5mcvG/hH9Wuui0bG9H1//x/V0G0D5gxZNHkrkk2gsDZheLE11fBkkEmxYZd0C7YX+K2rV5KUTIOHhzvb1DgtxWpuU47zJqJRxNjVgrVdKYt/Y6wgLgUmkzy/FWMaI7mOQ2BCwSTrw3/mt7vdZadrEUsFSfu5YT+Bp1HLMi6f0oNJOKQuzRRWzpWqUOMjEUv4GTQgejid/sBPGhssnMU7qqw==; Domain=.zdnet.com; Path=/; Max-Age=0; HttpOnly bm_mi=0125990DC8907A562C4321FEAE9663B8~XLt/G+EHzBjc+KbqpdegqnfUSCQ8KF1a69pk6TV+bNU6jQYfycPbkIcdW4RTku8gGmKW0gPEMXqMqjqlPQCTm/0ivYAY9nH7iRyI35Vmysp+75H/Ar4nP9JO4SJLtgnPIxbjPi0DO8WQWRQNtrmUaYpgwf96XeNt9VJoHW/JwGntXytx2vmMSnN820O8dzf2mlyvwwhns917evbXEgg1fi5KRR8XKA8zpYkm4ZLTWZ4t5WzWm2IApO3uy+W2J8n9XoAGTGLbdovFcqcqTzs6nfafnwTSZn+C6waP+Pe2Om4yB5ECXxRzyAIhf3j8VK068Pn3vL2Ili91ekRrN2NqJg==; Domain=.zdnet.com; Path=/; Max-Age=0; HttpOnly
x-enable-esi
true
strict-transport-security
max-age=63072000; includeSubDomains; preload
vary
Accept-Encoding, User-Agent
x-akamai-transformed
9 2882 0 pmb=mTOE,4
access-control-allow-origin
https://www.zdnet.com
x-frame-options
SAMEORIGIN
content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
expires
Wed, 10 Oct 2018 14:18:57 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
referrer-policy
no-referrer-when-downgrade
x-content-type-options
nosniff
x-xss-protection
1; mode=block
x-tx-id
c63bd721-df53-4c07-96a0-b23d6d2ae555
content-encoding
gzip
date
Wed, 10 Oct 2018 12:48:58 GMT

Redirect headers

status
301
server
nginx
content-type
text/html
content-length
178
location
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
access-control-allow-origin
https://www.zdnet.com
date
Wed, 10 Oct 2018 12:48:56 GMT
set-cookie
fly_device=desktop; expires=Wed, 17-Oct-2018 12:48:56 GMT; path=/; domain=.zdnet.com; secure fly_geo={"countryCode": "de"}; expires=Wed, 17-Oct-2018 12:48:56 GMT; path=/; domain=.zdnet.com; secure fly_preferred_edition=eu; path=/; domain=.zdnet.com; secure fly_default_edition=eu; path=/; domain=.zdnet.com; secure
vary
Accept-Encoding, User-Agent
strict-transport-security
max-age=63072000; includeSubDomains; preload
main-56b495240a-rev.css
zdnet3.cbsistatic.com/fly/1497-fly/css/core/
353 KB
63 KB
Stylesheet
General
Full URL
https://zdnet3.cbsistatic.com/fly/1497-fly/css/core/main-56b495240a-rev.css
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
2878ff666c483955cf0a6bccc97934d7ac50b1115fa5a53532ca6565bb94af0d

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Tue, 09 Oct 2018 09:00:00 GMT
server
nginx
etag
W/"5bbc6e10-58333"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
64453
expires
Wed, 17 Oct 2018 12:48:58 GMT
controls-b0b722187e-rev.css
zdnet2.cbsistatic.com/fly/css/video/htmlPlayerControls/
42 KB
7 KB
Stylesheet
General
Full URL
https://zdnet2.cbsistatic.com/fly/css/video/htmlPlayerControls/controls-b0b722187e-rev.css
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
f6f4c12d0bf24de5540b1d7d92514d071ceeafd73a0e9b1a570408e09de78649

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Tue, 09 Oct 2018 09:00:11 GMT
server
nginx
etag
W/"5bbc6e1b-a8ec"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
6696
expires
Wed, 17 Oct 2018 12:48:58 GMT
catalin-cimpanu.jpg
zdnet3.cbsistatic.com/hub/i/r/2018/08/21/a59867e9-8d75-40af-a87c-690638f8afa4/thumbnail/40x40/e9e4d21a35e101b1402c656cf979114c/
910 B
1 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/08/21/a59867e9-8d75-40af-a87c-690638f8afa4/thumbnail/40x40/e9e4d21a35e101b1402c656cf979114c/catalin-cimpanu.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
ba2fa15976662b87f31dccdd53d415b927f2118760fdafc4ac21dd2c1b234ff3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
server
nginx
status
200
etag
"c3829e4116c9d009ce51c32b304b9e46"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
public, max-age=28302251, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
868
5b72aa0160b2e1568893d64a-1280x7201aug152018113829poster.jpg
zdnet1.cbsistatic.com/hub/i/r/2018/08/15/691aecd3-728b-47a4-abe2-3742b658b4b1/thumbnail/570x322/444fcf3d71222b689b04787946295715/
7 KB
7 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2018/08/15/691aecd3-728b-47a4-abe2-3742b658b4b1/thumbnail/570x322/444fcf3d71222b689b04787946295715/5b72aa0160b2e1568893d64a-1280x7201aug152018113829poster.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
0d6baa46c3cd463a5d3f967d89f7cf48d5909c34b22f6d671cc9f0c4f929611c

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Wed, 15 Aug 2018 11:52:32 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=28930897
timing-allow-origin
*
content-length
6765
expires
Tue, 10 Sep 2019 09:10:35 GMT
advertisement.js
zdnet2.cbsistatic.com/fly/bundles/zdnetjs/js/utils/
53 B
280 B
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/bundles/zdnetjs/js/utils/advertisement.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
07b69027231d985f5bdcd4d5a539f120d26003feef6e9dc0a6b77a4b43a9b21f

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Wed, 20 Jun 2018 16:56:03 GMT
server
nginx
etag
"5b2a8723-35"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
71
expires
Wed, 17 Oct 2018 12:48:58 GMT
brazil-botnet-log.png
zdnet4.cbsistatic.com/hub/i/r/2018/09/30/7555210c-aeb1-48bb-946b-3f8e992d040c/resize/370xauto/40b9a8e2f51fd67c056d19136e0bf20e/
150 KB
150 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/hub/i/r/2018/09/30/7555210c-aeb1-48bb-946b-3f8e992d040c/resize/370xauto/40b9a8e2f51fd67c056d19136e0bf20e/brazil-botnet-log.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
61fdf37d30bf412dd87c52565f2b227ce9c3b57030950437fd0bd650d11bc035

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
server
nginx
status
200
etag
"c25007eca40e6838db7ef8e80145c70f"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
public, max-age=30727836, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
153106
a-1-dhs.jpg
zdnet4.cbsistatic.com/hub/i/r/2018/07/24/7aa8a1bb-780a-4d41-9464-2427956f7a6d/thumbnail/170x128/67b517226b29a2c342262671913d5966/
8 KB
9 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/hub/i/r/2018/07/24/7aa8a1bb-780a-4d41-9464-2427956f7a6d/thumbnail/170x128/67b517226b29a2c342262671913d5966/a-1-dhs.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
4ab6a27e7fab0d1aa86e5fb3cef44c53865862b2c8d6c076ee44409a12e6b644

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Tue, 24 Jul 2018 13:43:38 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=24800341
timing-allow-origin
*
content-length
8605
expires
Wed, 24 Jul 2019 13:47:59 GMT
a-2-fedex.jpg
zdnet3.cbsistatic.com/hub/i/r/2018/07/24/dd303a4a-5b12-4709-bef7-a35b361d8799/thumbnail/170x128/340415a9086f0e182e4b49fa34c6e277/
6 KB
6 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/07/24/dd303a4a-5b12-4709-bef7-a35b361d8799/thumbnail/170x128/340415a9086f0e182e4b49fa34c6e277/a-2-fedex.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
d05a0088d1a2c67e0707be3f7ff1823683ba849a3d3d4004d971cb58eb40d08a

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:16 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=25316454
timing-allow-origin
*
content-length
6301
expires
Tue, 30 Jul 2019 13:09:52 GMT
a-3-orbitz.jpg
zdnet1.cbsistatic.com/hub/i/r/2018/07/24/a80ee1f5-4daa-4d79-9f51-e490df5e4e78/thumbnail/170x128/5b7f27009156f63c204e0bb342bf80e2/
5 KB
5 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2018/07/24/a80ee1f5-4daa-4d79-9f51-e490df5e4e78/thumbnail/170x128/5b7f27009156f63c204e0bb342bf80e2/a-3-orbitz.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
6777cc97d90b6e3773b62f12dfc047362dd55f7610369239eafd46c109cd5380

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:16 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=25316432
timing-allow-origin
*
content-length
5115
expires
Tue, 30 Jul 2019 13:09:30 GMT
a-4-aadhaar.jpg
zdnet3.cbsistatic.com/hub/i/r/2018/07/24/3c85daea-5f11-4c91-a118-4fb0e51a1436/thumbnail/170x128/3f448909d2b440331eb0428dccbd624b/
6 KB
6 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/07/24/3c85daea-5f11-4c91-a118-4fb0e51a1436/thumbnail/170x128/3f448909d2b440331eb0428dccbd624b/a-4-aadhaar.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
2651576977d18928324a68a053a929a1acddffbbc6a04c8face239c5b489b34a

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:16 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=25316325
timing-allow-origin
*
content-length
5937
expires
Tue, 30 Jul 2019 13:07:43 GMT
a-5-lexpress.jpg
zdnet2.cbsistatic.com/hub/i/r/2018/07/24/474ea969-3cc4-4e1c-bc66-a98fe8264033/thumbnail/170x128/5aee2ed8558e0adb2c8e84b318597a04/
6 KB
6 KB
Image
General
Full URL
https://zdnet2.cbsistatic.com/hub/i/r/2018/07/24/474ea969-3cc4-4e1c-bc66-a98fe8264033/thumbnail/170x128/5aee2ed8558e0adb2c8e84b318597a04/a-5-lexpress.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
ee58d451d4c826e171525a0fb417343a42ae338fd8afb6b77613235476f89dfe

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:16 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=25316403
timing-allow-origin
*
content-length
5631
expires
Tue, 30 Jul 2019 13:09:01 GMT
whatsapplogo7.png
zdnet4.cbsistatic.com/hub/i/r/2017/09/06/18489e7d-003b-4191-944d-ac67a583a34f/thumbnail/170x128/9d2fd62b1e4eda6b83121ed567059f28/
7 KB
7 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/hub/i/r/2017/09/06/18489e7d-003b-4191-944d-ac67a583a34f/thumbnail/170x128/9d2fd62b1e4eda6b83121ed567059f28/whatsapplogo7.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
eed342f5fd266dccb9324da37a8dc1f0c2caf2bb6255bda2fc6fcd800c2e4994

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Wed, 06 Sep 2017 15:16:03 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=31490440
timing-allow-origin
*
content-length
7275
expires
Thu, 10 Oct 2019 00:09:38 GMT
dod-next-gen-weapons-systems.png
zdnet4.cbsistatic.com/hub/i/r/2018/10/09/4986c2ba-15d7-4f4b-a0fb-2da7143233d4/thumbnail/170x128/c51006aba7f1ef78f663723165c476fe/
22 KB
22 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/hub/i/r/2018/10/09/4986c2ba-15d7-4f4b-a0fb-2da7143233d4/thumbnail/170x128/c51006aba7f1ef78f663723165c476fe/dod-next-gen-weapons-systems.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
a655d81d8ad72b044230c21f4fd017087f463325fc5af8c1f92e86c947c2dea1

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
server
nginx
status
200
etag
"38dadc9fae7b5a4415d01986ee4907fe"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
public, max-age=31484283, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
22474
windows-update.jpg
zdnet1.cbsistatic.com/hub/i/r/2018/10/09/fa4f0ed7-e860-4855-bb84-0b2f9cc81778/thumbnail/170x128/a51b7a9aa5cfa6e79924ee013a50197d/
4 KB
4 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2018/10/09/fa4f0ed7-e860-4855-bb84-0b2f9cc81778/thumbnail/170x128/a51b7a9aa5cfa6e79924ee013a50197d/windows-update.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
6826810f7f7d189b5550504dea39ce83042dd812224f9f283eba6ab048f25855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
server
nginx
status
200
etag
"c04c19c2c2474dbf5f7ac4372c5b9af1"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
public, max-age=31473264, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
3809
surveillance-camera.jpg
zdnet3.cbsistatic.com/hub/i/r/2018/10/09/6886222d-b368-4820-98cf-dda20db316ed/thumbnail/170x128/0bebdec884f9057700f113f806d5a115/
5 KB
5 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/10/09/6886222d-b368-4820-98cf-dda20db316ed/thumbnail/170x128/0bebdec884f9057700f113f806d5a115/surveillance-camera.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
24ddb1e7998c41d0d2dea6443309dcb34105f7a95a09b8254a5bf6ea12c42854

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
server
nginx
status
200
etag
"43975bc2dfc84641a2a8c4d3fe653176"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
public, max-age=31459674, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
4902
screen-shot-2018-10-10-at-12-29-03.png
zdnet1.cbsistatic.com/hub/i/r/2018/10/10/92e8c872-7671-49ac-8479-96eb0a31f1e4/thumbnail/170x128/c96305eb907f0fa9f3f4e62b3f11bc3f/
40 KB
40 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2018/10/10/92e8c872-7671-49ac-8479-96eb0a31f1e4/thumbnail/170x128/c96305eb907f0fa9f3f4e62b3f11bc3f/screen-shot-2018-10-10-at-12-29-03.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
219a1313e277e6c9fc2e5ef7a34daea9af7d2a851e7b836868368b90e145a9b2

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
server
nginx
status
200
etag
"8c6dfa6b68fce0253f547f8dc6646714"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
public, max-age=31534761, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
41108
windows-10-hero-gif.jpg
zdnet1.cbsistatic.com/hub/i/r/2018/10/05/628e0f11-0157-426b-af16-80aa0ef653d3/thumbnail/170x128/640ea44060c22b87b91c88b8aeea736b/
5 KB
5 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2018/10/05/628e0f11-0157-426b-af16-80aa0ef653d3/thumbnail/170x128/640ea44060c22b87b91c88b8aeea736b/windows-10-hero-gif.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
f784b7c64047cb16a3fcd2f82a08698f8a6d4998958b523ded8c7338b612dadb

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
server
nginx
status
200
etag
"c678aec6e828c899b32a099c14ee882c"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
public, max-age=31174881, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
4746
screen-shot-2018-10-10-at-10-48-29.png
zdnet4.cbsistatic.com/hub/i/r/2018/10/10/2d6cc490-b62e-41ae-aef4-8d415556bfdd/thumbnail/170x128/40a4b44c7b86c8eaa3703d7c96e7618a/
34 KB
34 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/hub/i/r/2018/10/10/2d6cc490-b62e-41ae-aef4-8d415556bfdd/thumbnail/170x128/40a4b44c7b86c8eaa3703d7c96e7618a/screen-shot-2018-10-10-at-10-48-29.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
fd70bab239c9d65f4888b44b6a1b252d4ba0aa67753817125876691ac15a5ba3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
server
nginx
status
200
etag
"378271842c95b7894122b598f9874a14"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
public, max-age=31525331, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
34418
dutton.png
zdnet1.cbsistatic.com/hub/i/r/2018/09/20/813f3fab-1a09-45cd-bae0-0ea4add20933/thumbnail/170x128/0cb36efff59208aee756b6daec30e5b2/
34 KB
35 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2018/09/20/813f3fab-1a09-45cd-bae0-0ea4add20933/thumbnail/170x128/0cb36efff59208aee756b6daec30e5b2/dutton.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
aec839b665ab4a769060992e9328632de9c8a4f616f9825715e573e256243dfa

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Thu, 20 Sep 2018 06:51:28 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=31508539
timing-allow-origin
*
content-length
35083
expires
Thu, 10 Oct 2019 05:11:17 GMT
parliament-house-side-view-from-front-canberra-government-australia.png
zdnet3.cbsistatic.com/hub/i/r/2018/08/19/00bd0f6c-8f36-45f1-9962-8c663047ffb7/thumbnail/170x128/45b73d1b2b95ca4b4d052a9d296787ae/
31 KB
31 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/08/19/00bd0f6c-8f36-45f1-9962-8c663047ffb7/thumbnail/170x128/45b73d1b2b95ca4b4d052a9d296787ae/parliament-house-side-view-from-front-canberra-government-australia.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
f62f8e7378afebe6a25a25b6d0a3eff643ade87ebacc322d50b57dfdc07653d9

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Sun, 26 Aug 2018 07:47:26 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=30131755
timing-allow-origin
*
content-length
31407
expires
Tue, 24 Sep 2019 06:44:53 GMT
singapore-merlion-thumb620x465.jpg
zdnet4.cbsistatic.com/hub/i/r/2013/07/09/3028aab8-1d15-11e4-8c7f-00505685119a/thumbnail/170x128/36877b0cd042da88f7363b79187e5916/
5 KB
5 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/hub/i/r/2013/07/09/3028aab8-1d15-11e4-8c7f-00505685119a/thumbnail/170x128/36877b0cd042da88f7363b79187e5916/singapore-merlion-thumb620x465.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
cc6f129a8ddc918de02e07edd5e6a7d758de307610daca01adb676b30d8b2db2

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Fri, 03 Oct 2014 15:45:24 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=31256838
timing-allow-origin
*
content-length
5116
expires
Mon, 07 Oct 2019 07:16:16 GMT
require-2.1.2.js
zdnet2.cbsistatic.com/fly/1497-fly/js/libs/
16 KB
6 KB
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
f96f203f5605c9f56e7f6f97caf6ea84f122872ec3c5ac1f9037a1b508c706ee

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Tue, 09 Oct 2018 08:59:53 GMT
server
nginx
etag
W/"5bbc6e09-3f09"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
6305
expires
Wed, 17 Oct 2018 12:48:58 GMT
evidon-sitenotice-tag.js
c.evidon.com/sitenotice/
35 KB
10 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.38.48.113 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-38-48-113.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
81254e92ced106ae73ebe5e9428d0a9fdc64292cd1198bc3b5288b23c8df9198

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:48:58 GMT
Content-Encoding
gzip
Last-Modified
Wed, 12 Sep 2018 18:51:40 GMT
Server
Apache
ETag
"5f4ea94fb3fb6b1f963cadd525a5c3ac:1536778300"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=86400, private;max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
9398
Expires
Thu, 11 Oct 2018 12:48:58 GMT
country.js
c.evidon.com/geo/
260 B
490 B
Script
General
Full URL
https://c.evidon.com/geo/country.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.38.48.113 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-38-48-113.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
f9784f57729f84391b084eed9e944e048f771129d65e9b58f34095fdfba86473

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:48:58 GMT
Content-Encoding
gzip
Last-Modified
Wed, 30 May 2018 22:23:16 GMT
Server
Apache
ETag
"c1e367d098d326049811561575dbda4a:1527718996"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
165
snthemes.js
c.evidon.com/sitenotice/425/
61 KB
3 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/425/snthemes.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.38.48.113 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-38-48-113.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
8190f953a646f8fd1144f2c5609fc4c7bcf041fde59c2906039baefe5ff465cb

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:48:58 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 19:07:42 GMT
Server
Apache
ETag
"c65f9b44096f0c692d6af5b3654d2097:1532027262"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=86400, private;max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
3096
Expires
Thu, 11 Oct 2018 12:48:58 GMT
settings.js
c.evidon.com/sitenotice/425/zdnet/
15 KB
2 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/425/zdnet/settings.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.38.48.113 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-38-48-113.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
1b91058b5969c2319ee3f3efb2b91ccf388c64fe22f806e59b0edb43694150d4

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:48:58 GMT
Content-Encoding
gzip
Last-Modified
Tue, 28 Aug 2018 21:08:55 GMT
Server
Apache
ETag
"09891370db88cdd3a58c49f5cd396b85:1535490535"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=86400, private;max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1239
Expires
Thu, 11 Oct 2018 12:48:58 GMT
truncated
/
917 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d2fe67ecc4354b214728e0a7d75b67536a78f6b575080b589d54a1937fc46b41

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/jpeg
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1724d7fd70903754d6f29172f2ac879dc6dab79df6c4c78ed06f45c0f117e15c

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/jpeg
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ceffb891c3e1891757ead2e7e41497adc13abca0d14d7f58d20e3aa8d5aee108

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/jpeg
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1c0ccb11374e2374cb7a52c792ffe07d9203d28d4ad97623bcf27bc58d2513f9

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/jpeg
mag-white01.png
zdnet4.cbsistatic.com/fly/1539075444-fly/bundles/zdnetcss/images/core/
1 KB
1 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/fly/1539075444-fly/bundles/zdnetcss/images/core/mag-white01.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
69721aa2f1085046c84d1943a1daa0515be8e2f060c21063024ea117789e425c

Request headers

Referer
https://zdnet3.cbsistatic.com/fly/1497-fly/css/core/main-56b495240a-rev.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Tue, 09 Oct 2018 08:57:24 GMT
server
nginx
etag
W/"5bbc6d74-4f1"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
936
expires
Wed, 17 Oct 2018 12:48:58 GMT
Raleway-Bold.woff2
zdnet3.cbsistatic.com/bundles/zdnetcss/fonts/raleway/
25 KB
25 KB
Font
General
Full URL
https://zdnet3.cbsistatic.com/bundles/zdnetcss/fonts/raleway/Raleway-Bold.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
bf413671ac4278a51bc9621af98e7f5a6cdbb228ecda66602f7e02ea27b28d13

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://zdnet3.cbsistatic.com/fly/1497-fly/css/core/main-56b495240a-rev.css
Origin
https://www.zdnet.com

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
last-modified
Wed, 20 Jun 2018 16:56:01 GMT
server
nginx
etag
"5b2a8721-6348"
status
200
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=25571144
accept-ranges
bytes
timing-allow-origin
*
content-length
25416
expires
Fri, 02 Aug 2019 11:54:42 GMT
Raleway-Regular.woff2
zdnet3.cbsistatic.com/bundles/zdnetcss/fonts/raleway/
25 KB
25 KB
Font
General
Full URL
https://zdnet3.cbsistatic.com/bundles/zdnetcss/fonts/raleway/Raleway-Regular.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
6987f5dab3ced7612887b80ca2de81041654a6434970e1cbbb03c293dd47ce0b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://zdnet3.cbsistatic.com/fly/1497-fly/css/core/main-56b495240a-rev.css
Origin
https://www.zdnet.com

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
last-modified
Wed, 20 Jun 2018 16:56:01 GMT
server
nginx
etag
"5b2a8721-6398"
status
200
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=25571122
accept-ranges
bytes
timing-allow-origin
*
content-length
25496
expires
Fri, 02 Aug 2019 11:54:20 GMT
Raleway-Light.woff2
zdnet3.cbsistatic.com/bundles/zdnetcss/fonts/raleway/
25 KB
25 KB
Font
General
Full URL
https://zdnet3.cbsistatic.com/bundles/zdnetcss/fonts/raleway/Raleway-Light.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
7017fe26514320eea8b02069a2ec814953fc7f78d3513ab52c4c80108d112b56

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://zdnet3.cbsistatic.com/fly/1497-fly/css/core/main-56b495240a-rev.css
Origin
https://www.zdnet.com

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
last-modified
Wed, 20 Jun 2018 16:56:01 GMT
server
nginx
etag
"5b2a8721-63ac"
status
200
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=25571236
accept-ranges
bytes
timing-allow-origin
*
content-length
25516
expires
Fri, 02 Aug 2019 11:56:14 GMT
ring-animated.svg
zdnet2.cbsistatic.com/fly/1539075444-fly/bundles/zdnetcss/images/video/
704 B
575 B
Image
General
Full URL
https://zdnet2.cbsistatic.com/fly/1539075444-fly/bundles/zdnetcss/images/video/ring-animated.svg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
0025565f0cddfceb7ebdbc4b21d2552c894998e443153f97a6e8b353dfd9bebd

Request headers

Referer
https://zdnet2.cbsistatic.com/fly/css/video/htmlPlayerControls/controls-b0b722187e-rev.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Tue, 09 Oct 2018 08:57:24 GMT
server
nginx
status
200
etag
"5bbc6d74-2c0"
vary
Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
max-age=31451406
accept-ranges
bytes
timing-allow-origin
*
content-length
364
expires
Wed, 09 Oct 2019 13:19:04 GMT
play.svg
zdnet4.cbsistatic.com/fly/1539075444-fly/bundles/zdnetcss/images/video/
299 B
424 B
Image
General
Full URL
https://zdnet4.cbsistatic.com/fly/1539075444-fly/bundles/zdnetcss/images/video/play.svg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
d5e9dfd6066c2872be4f85c25aa0186402b124ea3f80152e2e2b767906793284

Request headers

Referer
https://zdnet2.cbsistatic.com/fly/css/video/htmlPlayerControls/controls-b0b722187e-rev.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Tue, 09 Oct 2018 08:57:24 GMT
server
nginx
status
200
etag
"5bbc6d74-12b"
vary
Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
max-age=31451471
accept-ranges
bytes
timing-allow-origin
*
content-length
213
expires
Wed, 09 Oct 2019 13:20:09 GMT
en.js
c.evidon.com/sitenotice/425/translations/
205 KB
7 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/425/translations/en.js
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.38.48.113 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-38-48-113.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
2b4b44954ecddf65e5391cb2df9f86cffc2979ebe88399bac1d61e5e918b8ed6

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:48:58 GMT
Content-Encoding
gzip
Last-Modified
Tue, 18 Sep 2018 15:06:56 GMT
Server
Apache
ETag
"c0ff937f678b15708f165faee2bf7d8f:1537283216"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=86400, private;max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
6758
Expires
Thu, 11 Oct 2018 12:48:58 GMT
Raleway-Black.woff2
zdnet3.cbsistatic.com/bundles/zdnetcss/fonts/raleway/
25 KB
25 KB
Font
General
Full URL
https://zdnet3.cbsistatic.com/bundles/zdnetcss/fonts/raleway/Raleway-Black.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
c9f9ded1c66d9f290eeb0fadad73f3bba0d8cc2c784b078e9b00eca200eca125

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://zdnet3.cbsistatic.com/fly/1497-fly/css/core/main-56b495240a-rev.css
Origin
https://www.zdnet.com

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
last-modified
Wed, 20 Jun 2018 16:56:01 GMT
server
nginx
etag
"5b2a8721-624c"
status
200
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=25571181
accept-ranges
bytes
timing-allow-origin
*
content-length
25164
expires
Fri, 02 Aug 2019 11:55:19 GMT
truncated
/
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/gif
logo.png
zdnet3.cbsistatic.com/fly/1539075444-fly/bundles/zdnetcss/images/core/
4 KB
4 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/fly/1539075444-fly/bundles/zdnetcss/images/core/logo.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
ff2ae991ac0efdb5ae8b4428ba8555a0aeb0fd94b8014ce290c484242c524097

Request headers

Referer
https://zdnet3.cbsistatic.com/fly/1497-fly/css/core/main-56b495240a-rev.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Tue, 09 Oct 2018 08:57:24 GMT
server
nginx
etag
W/"5bbc6d74-1009"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
4128
expires
Wed, 17 Oct 2018 12:48:58 GMT
ls-zdnet.js
js-sec.indexww.com/ht/
77 KB
24 KB
Script
General
Full URL
https://js-sec.indexww.com/ht/ls-zdnet.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
ed2c3c51640ce6884fdbe34181ccd48f0208fab69bd793cc25d02abedbfab104

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:48:58 GMT
Content-Encoding
gzip
Last-Modified
Wed, 10 Oct 2018 12:05:05 GMT
Server
Apache
ETag
"903719-13582-577deaa2e5e7e"
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=1091
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
text/javascript
Content-Length
24010
Expires
Wed, 10 Oct 2018 13:07:09 GMT
YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
c.go-mpulse.net/boomerang/ Frame 204E
187 KB
55 KB
Script
General
Full URL
https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
184.30.223.226 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-223-226.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e0b8436d50fb200de76d7a25cf450ea238cd100197f8e9d462e9228153da873f

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:48:58 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/javascript;charset=UTF-8
Cache-Control
max-age=604800, s-maxage=604800
Transfer-Encoding
chunked
Connection
keep-alive, Transfer-Encoding
Timing-Allow-Origin
*
gpt.js
www.googletagservices.com/tag/js/
23 KB
9 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:80b::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
f4012f44fe8fae63a9c9b688e946ae24565e59d553a63d913e467e6a96da28e9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"8 / 46 of 1000 / last-modified: 1539109419"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
8595
x-xss-protection
1; mode=block
expires
Wed, 10 Oct 2018 12:48:58 GMT
sfp.js
native.sharethrough.com/assets/
363 KB
105 KB
Script
General
Full URL
https://native.sharethrough.com/assets/sfp.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.93.44 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-93-44.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
78b8e2cfa98cc2d313040e871be0ed8c17c243adfef756fb43132e247fe02a03

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 09 Oct 2018 23:26:31 GMT
content-encoding
gzip
last-modified
Tue, 09 Oct 2018 23:26:29 GMT
server
AmazonS3
age
1348
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=3600
x-amz-cf-id
cWLRnxW6m2xZhGQSlhMs80p4O-5SexojvdiOQel9Ud2h3ml253i_3w==
via
1.1 28edd995979e84232ebdb595b33d9deb.cloudfront.net (CloudFront)
expires
Wed, 10 Oct 2018 00:26:27 GMT
evidon-banner.js
c.evidon.com/sitenotice/
8 KB
3 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/evidon-banner.js
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.38.48.113 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-38-48-113.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
233eb8fa0af13188d0e329bd19c5796382c469f88e8ff9a632e862fc30a14f32

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:48:58 GMT
Content-Encoding
gzip
Last-Modified
Wed, 12 Sep 2018 18:51:41 GMT
Server
Apache
ETag
"813c7817a1ab11618f423d4e0ef7ddf5:1536778301"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=86400, private;max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2495
Expires
Thu, 11 Oct 2018 12:48:58 GMT
2
l.betrad.com/site/v3/425/3445/3/1/2/
0
120 B
Image
General
Full URL
https://l.betrad.com/site/v3/425/3445/3/1/2/2?consent=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.201.183.1 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-201-183-1.compute-1.amazonaws.com
Software
/ Express
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
x-powered-by
Express
etag
W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI"
vary
Accept-Encoding
18863
l.betrad.com/site/v3/425/3445/3/1/2/2/
0
120 B
Image
General
Full URL
https://l.betrad.com/site/v3/425/3445/3/1/2/2/18863?consent=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.201.183.1 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-201-183-1.compute-1.amazonaws.com
Software
/ Express
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
x-powered-by
Express
etag
W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI"
vary
Accept-Encoding
main.default.js
zdnet3.cbsistatic.com/fly/1497-fly/js/
204 KB
69 KB
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/1497-fly/js/main.default.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
b12afb403b9f2b0b9e11c9b9934253b51c4afd42c68b8c721ed9150ddc1335f4

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Tue, 09 Oct 2018 08:59:55 GMT
server
nginx
etag
W/"5bbc6e0b-32ec5"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
70453
expires
Wed, 17 Oct 2018 12:48:58 GMT
18863
l.betrad.com/site/v3/425/3445/3/4/2/2/
0
120 B
Image
General
Full URL
https://l.betrad.com/site/v3/425/3445/3/4/2/2/18863?consent=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.201.183.1 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-201-183-1.compute-1.amazonaws.com
Software
/ Express
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
x-powered-by
Express
etag
W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI"
vary
Accept-Encoding
integrator.js
adservice.google.de/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:824::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
integrator.js
adservice.google.com/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:821::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
pubads_impl_263.js
securepubads.g.doubleclick.net/gpt/
183 KB
63 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_263.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.98 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
sffe /
Resource Hash
bcd0d6f89ee2ad9481cf968b22efbf3875bd703103ad1d6b1111f61629b0a213
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 05 Oct 2018 14:07:02 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
63777
x-xss-protection
1; mode=block
expires
Wed, 10 Oct 2018 12:48:58 GMT
require.optional-dependency.js
zdnet4.cbsistatic.com/fly/js/libs/
582 B
518 B
Script
General
Full URL
https://zdnet4.cbsistatic.com/fly/js/libs/require.optional-dependency.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
f27c0c9f284c6959dd7db1e768c6e43a518ea650afc69d7a60383f3a963cde7b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 16:42:46 GMT
server
nginx
etag
"5b5f4006-246"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
307
expires
Wed, 17 Oct 2018 12:48:58 GMT
utag.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
94 KB
19 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/418F) /
Resource Hash
e2cbc206f6909ffa75f10fdbbd6525d1bcf5621840e0262d26738aa7c8a6b3f7

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Wed, 19 Sep 2018 19:09:02 GMT
server
ECS (fcn/418F)
etag
"3089044913"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=300
accept-ranges
bytes
content-length
19514
expires
Wed, 10 Oct 2018 12:53:58 GMT
config.json
c.go-mpulse.net/api/ Frame 204E
2 KB
1 KB
XHR
General
Full URL
https://c.go-mpulse.net/api/config.json?key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&d=www.zdnet.com&t=5130586&v=1.571.0&if=&sl=0&si=4m0thkwzeqm-NaN&plugins=ConfigOverride,Continuity,PageParams,IFrameDelay,AutoXHR,SPA,Angular,Backbone,Ember,History,RT,CrossDomain,BW,PaintTiming,NavigationTiming,ResourceTiming,Memory,CACHE_RELOAD,Errors,TPAnalytics,UserTiming,LOGN&acao=
Requested by
Host: c.go-mpulse.net
URL: https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
184.30.223.226 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-223-226.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7c34c163e8652ddcea1991bb3843a51892d83b626ba9773c861265c4e97c48b7

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com

Response headers

Date
Wed, 10 Oct 2018 12:48:58 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/json
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
private, max-age=300, stale-while-revalidate=60, stale-if-error=120
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
694
isInternalUser.js
iicbsi-a.akamaihd.net/common/js/esi/
28 B
268 B
Script
General
Full URL
https://iicbsi-a.akamaihd.net/common/js/esi/isInternalUser.js?cb=cbsiInternal
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2a02:26f0:6c00::210:ba12 , European Union, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
Apache /
Resource Hash
3c599ef176cecdb3de25c6c36bc2945b92c12bcbc2ab03350729f4de296b53b8

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:48:58 GMT
Cache-Control
max-age=432344
Server
Apache
Connection
keep-alive
ETag
"fb25287978f1b619e801f164a2dfd9ea:1473886414"
Content-Length
28
Content-Type
application/x-javascript
vglnk.js
cdn.viglink.com/api/
79 KB
28 KB
Script
General
Full URL
https://cdn.viglink.com/api/vglnk.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:a20d , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
6bf6a92a50156df8d8018b0916a7c98b22e9d2201e42c32dcf9d6d7187df8ab0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
cf-cache-status
HIT
x-amz-request-id
584FD101F20B21A8
status
200
content-length
27815
x-amz-id-2
2F26vcnfO+4Y0DxW92N50Wtf+t4AJ9JA/issbY2HVBQIVqT/dK/B597g0li/pfmnKDTHFhyL2hU=
last-modified
Tue, 18 Sep 2018 20:37:04 GMT
server
cloudflare
etag
"15468e63d7aba3f957c1cb44354bddfa"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=1800
accept-ranges
bytes
cf-ray
467934502fe6c305-FRA
expires
Wed, 10 Oct 2018 13:18:58 GMT
utag.1783.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
1 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1783.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41AA) /
Resource Hash
4d049d83eef469c1f2cc0f5df820144ff6c5eb896b4e4aa2e681a1cba7d622a9

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Wed, 15 Mar 2017 15:25:15 GMT
server
ECS (fcn/41AA)
etag
"3913321605"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1130
expires
Thu, 25 Oct 2018 12:48:58 GMT
utag.1779.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
3 KB
2 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1779.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/4197) /
Resource Hash
cd5e6512fdbb698425174148dba05f72357a3b1944413f8812c55c4025d3d562

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Mon, 11 Jul 2016 20:43:57 GMT
server
ECS (fcn/4197)
etag
"392561602"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1785
expires
Thu, 25 Oct 2018 12:48:58 GMT
utag.1782.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
1 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1782.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FA) /
Resource Hash
255edb1f0d3fb5a7d930c19a27388967ec3141a3fce88d7507b336a8ae27ba97

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Wed, 15 Mar 2017 15:25:15 GMT
server
ECS (fcn/40FA)
etag
"3651177669"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1058
expires
Thu, 25 Oct 2018 12:48:58 GMT
utag.1787.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
142 KB
48 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FA) /
Resource Hash
694d40f6c8eb9760993e74b773dbb2cf3822ccb7f14a6d28320927cc5f9bad90

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Wed, 19 Sep 2018 18:08:20 GMT
server
ECS (fcn/40FA)
etag
"2497861228"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
48637
expires
Thu, 25 Oct 2018 12:48:58 GMT
utag.1790.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
956 B
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1790.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/4199) /
Resource Hash
10113bad06fefd5698a45480ffaedd421c6e06f9dbd0d1c772b7128bbea0842d

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Mon, 01 Aug 2016 14:31:10 GMT
server
ECS (fcn/4199)
etag
"2267415266"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
872
expires
Thu, 25 Oct 2018 12:48:58 GMT
utag.1791.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
1 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1791.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/4185) /
Resource Hash
7eae865fd7c820936603897a072b7ddd77b2c74e8022160fd19792291a63fac8

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Mon, 01 Aug 2016 14:31:10 GMT
server
ECS (fcn/4185)
etag
"3334871598"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1196
expires
Thu, 25 Oct 2018 12:48:58 GMT
utag.1792.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
4 KB
2 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1792.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40E2) /
Resource Hash
dabf73474662398f4f686a1b3103542f53384dd6241e6ac13f8ba535c6372aff

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Thu, 28 Jul 2016 14:28:47 GMT
server
ECS (fcn/40E2)
etag
"2022868805"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1664
expires
Thu, 25 Oct 2018 12:48:58 GMT
utag.1797.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
967 B
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1797.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40D6) /
Resource Hash
3ff065de0d90b0510727a72c173d05652c30967c5e6561dbf1d82fa077cabb22

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Wed, 25 Jan 2017 20:07:58 GMT
server
ECS (fcn/40D6)
etag
"1907756232"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
883
expires
Thu, 25 Oct 2018 12:48:58 GMT
utag.1800.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
995 B
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1800.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41A7) /
Resource Hash
e9b3eb7f022396e969766ad5e908b21df0b646c943e149902c64de590e9549d9

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Mon, 07 Aug 2017 22:40:35 GMT
server
ECS (fcn/41A7)
etag
"3890296134"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
912
expires
Thu, 25 Oct 2018 12:48:58 GMT
utag.1805.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
5 KB
2 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1805.js?utv=ut4.43.201809191808
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41B0) /
Resource Hash
31339d41db5d60b32d3fbe3ce8453bd1ef2b4a9ece60f0d35e62560e11159adf

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Wed, 19 Sep 2018 18:08:21 GMT
server
ECS (fcn/41B0)
etag
"1792691704"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1988
expires
Thu, 25 Oct 2018 12:48:58 GMT
article-e4efc265d5-rev.js
zdnet4.cbsistatic.com/fly/js/pages/
125 KB
35 KB
Script
General
Full URL
https://zdnet4.cbsistatic.com/fly/js/pages/article-e4efc265d5-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
5ba22cddcc8cf58dd43b9591aa7d690a0ae548f5aaaaf82bbb366bf4e30f27e5

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
last-modified
Mon, 01 Oct 2018 20:29:46 GMT
server
nginx
etag
W/"5bb283ba-1f519"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
35381
expires
Wed, 17 Oct 2018 12:48:58 GMT
lightbox.js
www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/ Frame 6E61
321 B
448 B
Script
General
Full URL
https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/lightbox.js?cb=1539175738989&lv=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:50a5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
bd6b34b1424d866bf89130646476b5c128777ae73e4a6ff1b6bfdce497d07203

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:58 GMT
content-encoding
gzip
cf-cache-status
HIT
cf-bgj
minify
server
cloudflare
x-powered-by
ASP.NET
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cf-ray
46793450ba66bf02-FRA
tag.aspx
ml314.com/
23 KB
11 KB
Script
General
Full URL
https://ml314.com/tag.aspx?1092018
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1782.js?utv=ut4.43.201805241512
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.31.106.135 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-31-106-135.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
2ccd728594ce65fa7e6651109e3bbd61877e548c4dab5480cafa6965f358a4e0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:48:59 GMT
Content-Encoding
gzip
Last-Modified
Wed, 10 Oct 2018 08:47:11 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, max-age=71892
Connection
keep-alive
Content-Length
11039
Expires
Thu, 11 Oct 2018 08:47:11 GMT
pixel.gif
cdn.viglink.com/images/
43 B
286 B
Image
General
Full URL
https://cdn.viglink.com/images/pixel.gif?ch=1&rn=9.673368003860705
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:a20d , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
89fe0ee6020314794fc2cfeacf3d10c31050cfe56f8ebddf1ed0a33fbe941fa7

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:59 GMT
cf-cache-status
HIT
last-modified
Tue, 10 Feb 2015 03:29:39 GMT
server
cloudflare
x-amz-request-id
40B2715987E1B24A
etag
"221d8352905f2c38b3cb2bd191d630b0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=15, must-revalidate
accept-ranges
bytes
cf-ray
46793450c9a5c305-FRA
content-length
43
x-amz-id-2
5hXuMsHv0JB9hPUCxQC8GZcLoA1KT9W+DEgd3gQjL1CnvNte49l+3MZyWbzydZDY6XZQZPE0bKY=
pixel.gif
cdn.viglink.com/images/
43 B
102 B
Image
General
Full URL
https://cdn.viglink.com/images/pixel.gif?ch=2&rn=9.673368003860705
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:a20d , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
89fe0ee6020314794fc2cfeacf3d10c31050cfe56f8ebddf1ed0a33fbe941fa7

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:59 GMT
cf-cache-status
HIT
last-modified
Tue, 10 Feb 2015 03:29:39 GMT
server
cloudflare
x-amz-request-id
40B2715987E1B24A
etag
"221d8352905f2c38b3cb2bd191d630b0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=15, must-revalidate
accept-ranges
bytes
cf-ray
46793450c9aac305-FRA
content-length
43
x-amz-id-2
5hXuMsHv0JB9hPUCxQC8GZcLoA1KT9W+DEgd3gQjL1CnvNte49l+3MZyWbzydZDY6XZQZPE0bKY=
ds.js
dw.cbsi.com/js/cbsi/
18 KB
7 KB
Script
General
Full URL
https://dw.cbsi.com/js/cbsi/ds.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1790.js?utv=ut4.43.201805241512
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.30.224.172 Fort Lauderdale, United States, ASN6623 (CBSI-1 - CBS Interactive Inc., US),
Reverse DNS
phx1-dw-cbsi-xw-lb.cnet.com
Software
Apache/2.4.25 /
Resource Hash
d696da403b0169c2191d0ec0b0fcdaa85487b21b19fd58f4b1fb5b9edf40b153

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:48:59 GMT
Content-Encoding
gzip
Last-Modified
Wed, 13 Sep 2017 19:06:40 GMT
Server
Apache/2.4.25
ETag
"1917-55916dc13f000"
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=43200, s-maxage=1800
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=80, max=245
Content-Length
6423
Expires
Wed, 10 Oct 2018 13:18:59 GMT
st.v3.js
www.everestjs.net/static/
17 KB
6 KB
Script
General
Full URL
https://www.everestjs.net/static/st.v3.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.67.133.222 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-67-133-222.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
35733dd71de077b039d2bac6614c78eb3ab7d3879cb307cc10cc1907d2f61eb6

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:48:59 GMT
Content-Encoding
gzip
Last-Modified
Tue, 09 Oct 2018 10:27:09 GMT
Server
Apache
ETag
"12803d6-4205-577c92e263c39"
Vary
Accept-Encoding
Content-Type
text/javascript
Cache-Control
max-age=69453
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
5509
Expires
Thu, 11 Oct 2018 08:06:32 GMT
cbsinteractive.js
tru.am/scripts/custom/
2 KB
1 KB
Script
General
Full URL
https://tru.am/scripts/custom/cbsinteractive.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1797.js?utv=ut4.43.201805241512
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700:20::6819:a222 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
8a27fab6c5a0b1db438219c7d24ce2fff95e0910378fe4bdeb64b4f970eebccc

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:59 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Tue, 23 Jan 2018 19:10:31 GMT
server
cloudflare
etag
"8c3752e674fdabefc911d5c40f71780d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=14400
cf-ray
46793450fb8727aa-FRA
expires
Wed, 10 Oct 2018 16:48:59 GMT
TF410621A-6337-4D08-955D-E14C11D5FFA5.js
cdn-gl.imrworldwide.com/conf/
33 KB
7 KB
Script
General
Full URL
https://cdn-gl.imrworldwide.com/conf/TF410621A-6337-4D08-955D-E14C11D5FFA5.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1805.js?utv=ut4.43.201809191808
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.19 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-19.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
c41728d473335d237791584d6d3b43b505c5b615611f2d6055bf69ff1fd9b503

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 11:24:16 GMT
Content-Encoding
gzip
Last-Modified
Wed, 10 Oct 2018 11:06:08 GMT
Server
AmazonS3
Age
1477
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
x-amz-version-id
021tbyAn.4F5ANpPw.HygbULjROcNdi2
Via
1.1 0d37b2e69745cd9f0c5457fbf1a83129.cloudfront.net (CloudFront)
Transfer-Encoding
chunked
Connection
keep-alive
Content-Type
application/javascript
X-Amz-Cf-Id
-J5TFYzCPvSwXw2peuI-UAYQ8IxiH56HtrmQGqBMkpHKKyBQhPRLtQ==
tag.js
js.agkn.com/prod/v0/
3 KB
3 KB
Script
General
Full URL
https://js.agkn.com/prod/v0/tag.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1800.js?utv=ut4.43.201805241512
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:200c:7a00:15:efbc:e300:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
33e5e19bca3a0cd6eb3c73b7160afe3a752ddefc95b05e82f74fce1f727e14cd

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Jun 2018 23:55:39 GMT
via
1.1 281d5965f165d7acaf2c52921da12d67.cloudfront.net (CloudFront)
last-modified
Thu, 28 Jun 2018 23:51:37 GMT
server
AmazonS3
age
46373
etag
"0a19c06e5266e3e9e572f723610708ba"
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
3111
x-amz-cf-id
s9cdsbg1AfgQ8a_NwustBerzaeeDNTYYdjiQIrMi4gy6wqjsRTD3QA==
zdnet-video-508c605fd4-rev.js
zdnet1.cbsistatic.com/fly/js/components/
22 KB
7 KB
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/components/zdnet-video-508c605fd4-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
51f7ba80561b12836d6cb192f62a5524649820805db7242e15b34ff10b0222d5

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:59 GMT
content-encoding
gzip
last-modified
Mon, 01 Oct 2018 20:29:40 GMT
server
nginx
etag
W/"5bb283b4-5899"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
7244
expires
Wed, 17 Oct 2018 12:48:59 GMT
video-playlist-connector-008b49b7a1-rev.js
zdnet2.cbsistatic.com/fly/js/components/
4 KB
2 KB
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/js/components/video-playlist-connector-008b49b7a1-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
a20c788fad1957d4bcd135b761c2ede3fd3ddc4a1b9a5ed0c565be047fe7e3f0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:59 GMT
content-encoding
gzip
last-modified
Thu, 30 Aug 2018 18:58:31 GMT
server
nginx
etag
W/"5b883e57-1194"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
1560
expires
Wed, 17 Oct 2018 12:48:59 GMT
anonc.js
dw.cbsi.com/
73 B
620 B
Script
General
Full URL
https://dw.cbsi.com/anonc.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.30.230.22 Fort Lauderdale, United States, ASN6623 (CBSI-1 - CBS Interactive Inc., US),
Reverse DNS
phx2-dw-cbsi-xw-ext-lb.cnet.com
Software
Apache/2.4.25 /
Resource Hash
1a85c966ebfcaa2151acd6709eb9ef150dda916e2c1d104b52636497fdaa7559

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:48:59 GMT
Server
Apache/2.4.25
Etag
KRfWEFu99TvT4Nk+3NM.1.dw_anonc
P3P
CP="CAO DSP COR CURa ADMa DEVa PSAa PSDa IVAi IVDi CONi OUR OTRi IND PHY ONL UNI FIN COM NAV INT DEM STA"
Cache-control
private, max-age=43200, s-max-age=0
Connection
Keep-Alive
Content-Type
application/javascript
Keep-Alive
timeout=80, max=366
Content-Length
73
Expires
Mon, 05 Jan 1970 12:12:12 GMT
user.js
www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/ Frame 6E61
550 KB
120 KB
Script
General
Full URL
https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/user.js?cb=636730487877169813
Requested by
Host: www.lightboxcdn.com
URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/lightbox.js?cb=1539175738989&lv=1
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:50a5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
387c1b11d5fae57258cc89ed599f03b8a65c64077c934019373b9b6e36a3c103

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Wed, 10 Oct 2018 12:48:59 GMT
content-encoding
gzip
cf-cache-status
HIT
content-md5
rxzPok4I+3c97t5dK4SHPA==
cf-polished
origSize=915151
status
200
last-modified
Thu, 20 Sep 2018 13:59:47 GMT
x-ms-lease-status
unlocked
cf-bgj
minify
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
x-ms-request-id
712aa9e0-301e-00ad-270c-5775ab000000
cache-control
public, max-age=31536000
x-ms-version
2009-09-19
cf-ray
467934516af8bf02-FRA
expires
Thu, 10 Oct 2019 12:48:59 GMT
Cookie set /
d.agkn.com/iframe/8613/ Frame 30BF
0
0
Document
General
Full URL
https://d.agkn.com/iframe/8613/?che=433741523&c=%7B%22bpid%22%3A%22cbsinteractive%22%2C%22loc%22%3A%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F%22%2C%22ref%22%3A%22-1%22%2C%22cid%22%3A%22-1%22%2C%22sid%22%3A%22-1%22%2C%22gen%22%3A%22-1%22%2C%22age%22%3A%22-1%22%2C%22cat%22%3A%22-1%22%2C%22brd%22%3A%22-1%22%7D
Requested by
Host: js.agkn.com
URL: https://js.agkn.com/prod/v0/tag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.3.8.119 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-3-8-119.compute-1.amazonaws.com
Software
Apache-Coyote/1.1 /
Resource Hash

Request headers

Host
d.agkn.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Cache-Control
no-cache, must-revalidate
Content-Type
text/html;charset=UTF-8
Date
Wed, 10 Oct 2018 12:48:58 GMT
Expires
Sat, 01 Jan 2000 00:00:00 GMT
P3P
CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Pragma
no-cache
Server
Apache-Coyote/1.1
Set-Cookie
ab=0001%3A54ao3GGWsJZ1eywfqdhIl0pcugDHV06z;Max-Age=31536000;domain=agkn.com;path=/ u=C|0AEAjULG7I1CxuwAAAAAAAg1RAQCADVIBAIA;Max-Age=31536000;domain=agkn.com;path=/
Content-Length
503
Connection
keep-alive
ta-pagesocial-sdk.js
tru.am/scripts/
34 KB
14 KB
Script
General
Full URL
https://tru.am/scripts/ta-pagesocial-sdk.js
Requested by
Host: tru.am
URL: https://tru.am/scripts/custom/cbsinteractive.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700:20::6819:a222 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
fb9007c254c493be4a067de535b19a30f5e5aef3d5b19f58b1c72d2c65a04f79

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:59 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Mon, 21 May 2018 10:49:23 GMT
server
cloudflare
etag
"8761e04182a1c11ff30f706f8052c8d6"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
467934517bdb27aa-FRA
expires
Thu, 11 Oct 2018 12:48:59 GMT
nlsSDK600.bundle.min.js
cdn-gl.imrworldwide.com/novms/js/2/
147 KB
43 KB
Script
General
Full URL
https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js
Requested by
Host: cdn-gl.imrworldwide.com
URL: https://cdn-gl.imrworldwide.com/conf/TF410621A-6337-4D08-955D-E14C11D5FFA5.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.19 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-19.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
266f769c26eaf0afda122baeec73cf9548eaba0d1fb8c78d65b1e45f91a3f96e

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 04 Oct 2018 18:49:04 GMT
Content-Encoding
gzip
Last-Modified
Thu, 04 Oct 2018 18:47:32 GMT
Server
AmazonS3
Age
64795
x-amz-server-side-encryption
AES256
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
x-amz-version-id
C1gVxaNX19wG9EEU40WT0QV_bbnCuEg.
Via
1.1 0d37b2e69745cd9f0c5457fbf1a83129.cloudfront.net (CloudFront)
Cache-Control
max-age=86400
Transfer-Encoding
chunked
Connection
keep-alive
Content-Type
application/javascript
X-Amz-Cf-Id
FqipA4Wg_nfEGD15YZMt1w45GtrSoUEb0MQerK78BUuVQSodUXYN7Q==
uvpjs-0826cffc14-rev.js
zdnet1.cbsistatic.com/fly/js/managers/
800 B
631 B
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/managers/uvpjs-0826cffc14-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
9242cae28bc65d0b14fc566242452e05bdce12813551d6bb027c066d54bbf2f7

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:59 GMT
content-encoding
gzip
last-modified
Thu, 24 May 2018 15:16:43 GMT
server
nginx
etag
"5b06d75b-320"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
419
expires
Wed, 17 Oct 2018 12:48:59 GMT
video-28e1825085-rev.js
zdnet1.cbsistatic.com/fly/js/translations/
702 B
650 B
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/translations/video-28e1825085-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
f8ab45ee0969bb98916fa2ba950a26e40d4039a8d402bc661bd99ee0392edbc0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:59 GMT
content-encoding
gzip
last-modified
Thu, 12 Jul 2018 13:43:48 GMT
server
nginx
etag
"5b475b14-2be"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
438
expires
Wed, 17 Oct 2018 12:48:59 GMT
video-controls-5a9f3af54f-rev.js
zdnet4.cbsistatic.com/fly/js/components/
21 KB
6 KB
Script
General
Full URL
https://zdnet4.cbsistatic.com/fly/js/components/video-controls-5a9f3af54f-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
4715b676fc8f3d17ca222d01999768a2ecba1ccf2b5223e332d9a0015f72b793

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:59 GMT
content-encoding
gzip
last-modified
Thu, 13 Sep 2018 19:29:28 GMT
server
nginx
etag
W/"5b9aba98-52bc"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
5615
expires
Wed, 17 Oct 2018 12:48:59 GMT
swfobject-c3dea6a493-rev.js
zdnet3.cbsistatic.com/fly/js/components/
9 KB
4 KB
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/js/components/swfobject-c3dea6a493-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
40c707d407e524f6e535fe307be27c3d79067da9cbf8fa9eef3c9ec1933e12df

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:59 GMT
content-encoding
gzip
last-modified
Tue, 04 Sep 2018 15:22:12 GMT
server
nginx
etag
W/"5b8ea324-245c"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
3904
expires
Wed, 17 Oct 2018 12:48:59 GMT
mpulse-1.0.2.js
zdnet1.cbsistatic.com/fly/js/libs/
12 KB
5 KB
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/libs/mpulse-1.0.2.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
763fa0bd7eff816d0a5f8c3e4075f9173a5cebf51a1e2c0d1174f841de10b9dd

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:59 GMT
content-encoding
gzip
last-modified
Wed, 30 May 2018 18:14:04 GMT
server
nginx
etag
"5b0ee9ec-2fdf"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
4822
expires
Wed, 17 Oct 2018 12:48:59 GMT
ad-ef5cb79eaf-rev.js
zdnet2.cbsistatic.com/fly/js/managers/
7 KB
3 KB
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/js/managers/ad-ef5cb79eaf-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
56bf714084093ce2762a223acbaee3f925b631b6fb24aee9f2f96c09bcc94c66

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:59 GMT
content-encoding
gzip
last-modified
Thu, 09 Aug 2018 17:36:29 GMT
server
nginx
etag
W/"5b6c7b9d-1ad5"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
2431
expires
Wed, 17 Oct 2018 12:48:59 GMT
utsync.ashx
ml314.com/
906 B
1 KB
Script
General
Full URL
https://ml314.com/utsync.ashx?pub=&adv=&et=0&eid=50070&ct=js&pi=&fp=&clid=&ps=&cl=&mlt=&data=&&cp=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&pv=1539175739163_xyckedlix&bl=en-us&cb=5574230&return=https%3A%2F%2Fdpm.demdex.net%2Fibs%3Adpid%3D22052%26dpuuid%3D%5BPersonID%5D%26redir%3D&ht=&d=&dc=&si=1539175739163_xyckedlix&cid=&s=1600x1200&rp=
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?1092018
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.31.106.135 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-31-106-135.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
ea5bbf70fc479a9f2f9e93417cc5fa75e5372e5fd0a095ad540dc3b08f348afe

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:48:58 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
p3P
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
Cache-Control
private
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Content-Length
519
Expires
0
ud.ashx
in.ml314.com/
20 B
698 B
Script
General
Full URL
https://in.ml314.com/ud.ashx?topiclimit=&cb=1092018
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?1092018
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.231.154.145 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-231-154-145.compute-1.amazonaws.com
Software
Microsoft-IIS/8.5 / ASP.NET
Resource Hash
d0e4a6372d6fb5ffe9505dbe9e94aee8f1b9b96ec8e5e20684cce8b4c5a88fa7

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:48:59 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/8.5
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, no-cache="set-cookie"
Connection
keep-alive
Content-Length
138
Expires
Thu, 11 Oct 2018 12:48:59 GMT
jquery.ui.position-1.9.2.js
zdnet3.cbsistatic.com/fly/js/libs/jquery/ui/
7 KB
3 KB
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/js/libs/jquery/ui/jquery.ui.position-1.9.2.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
ee221041a905f4b0fbe76dc05e44575523fd26a93f9e038bcb19d16e4155ee5b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:59 GMT
content-encoding
gzip
last-modified
Tue, 07 Aug 2018 13:46:06 GMT
server
nginx
etag
W/"5b69a29e-1a3e"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
2661
expires
Wed, 17 Oct 2018 12:48:59 GMT
jquery.ui.draggable-1.9.2.js
zdnet4.cbsistatic.com/fly/js/libs/jquery/ui/
18 KB
5 KB
Script
General
Full URL
https://zdnet4.cbsistatic.com/fly/js/libs/jquery/ui/jquery.ui.draggable-1.9.2.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
6d4dc28c491ca7ff1c86fa292821d3174e2c7638170628e1daa411da61d10684

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:59 GMT
content-encoding
gzip
last-modified
Tue, 07 Aug 2018 13:46:06 GMT
server
nginx
etag
W/"5b69a29e-48d5"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
4875
expires
Wed, 17 Oct 2018 12:48:59 GMT
CBSI-PLAYER.js
vidtech.cbsinteractive.com/uvpjs/2.8.3/
760 KB
203 KB
Script
General
Full URL
https://vidtech.cbsinteractive.com/uvpjs/2.8.3/CBSI-PLAYER.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
1491a1594a4058a62ea4c08441cfcbbfe82a0916b4f26b55f3605af896766dd7

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:59 GMT
content-encoding
gzip
last-modified
Mon, 26 Mar 2018 15:42:34 GMT
server
Apache
etag
"ffe80da4a589534ffbb17f46d6ef50a3:1522078954"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=2592000
accept-ranges
bytes
expires
Fri, 09 Nov 2018 12:48:59 GMT
autoplay-controls-9036c48538-rev.js
zdnet3.cbsistatic.com/fly/js/components/
3 KB
1 KB
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/js/components/autoplay-controls-9036c48538-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
1796f036c4e278df7d21459095a77b5d24546503e9849f744bfc868f23ad3f38

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:59 GMT
content-encoding
gzip
last-modified
Tue, 11 Sep 2018 14:37:33 GMT
server
nginx
etag
W/"5b97d32d-cb1"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
1154
expires
Wed, 17 Oct 2018 12:48:59 GMT
beacon
beacon.tru.am/
17 B
413 B
Fetch
General
Full URL
https://beacon.tru.am/beacon
Requested by
Host: tru.am
URL: https://tru.am/scripts/ta-pagesocial-sdk.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700:20::6819:a322 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
27676ea482895bdddd3f3796f430a812e11364efc224227c86973a52398966c2

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded;charset=UTF-8

Response headers

pragma
no-cache
date
Wed, 10 Oct 2018 12:48:59 GMT
content-encoding
gzip
server
cloudflare
status
200
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, private, max-age=0
cf-ray
467934521c5597ce-FRA
content-length
41
expires
Thu, 01 Jan 1970 00:00:00 UTC
config.json
c.go-mpulse.net/api/v2/
2 KB
1 KB
XHR
General
Full URL
https://c.go-mpulse.net/api/v2/config.json?key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&t=1539175739193&s=3d3b825b6831d0a400b613d26784b37504a3388c1ec2646552ab66184e7e9a11
Requested by
Host: zdnet1.cbsistatic.com
URL: https://zdnet1.cbsistatic.com/fly/js/libs/mpulse-1.0.2.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
184.30.223.226 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-223-226.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
0afdf211a710009eac6280dacf001688d711062c95d51ae8affe3e8cc43a3cfa

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com

Response headers

Date
Wed, 10 Oct 2018 12:48:59 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
private, max-age=300, stale-while-revalidate=60, stale-if-error=120
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
715
jquery.ui.slider-1.9.2.js
zdnet1.cbsistatic.com/fly/js/libs/jquery/ui/
10 KB
3 KB
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/libs/jquery/ui/jquery.ui.slider-1.9.2.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
fa107680c3e0cfd1620aebe62462103703993ada997d84aa6d5f55ce0ea3cba0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:59 GMT
content-encoding
gzip
last-modified
Tue, 07 Aug 2018 13:46:06 GMT
server
nginx
etag
W/"5b69a29e-278e"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
2914
expires
Wed, 17 Oct 2018 12:48:59 GMT
ls.html
cdn-gl.imrworldwide.com/novms/html/ Frame 36D2
0
0
Document
General
Full URL
https://cdn-gl.imrworldwide.com/novms/html/ls.html
Requested by
Host: cdn-gl.imrworldwide.com
URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.19 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-19.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Host
cdn-gl.imrworldwide.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
Date
Thu, 04 Oct 2018 18:49:04 GMT
Last-Modified
Wed, 03 Oct 2018 17:26:14 GMT
x-amz-server-side-encryption
AES256
Cache-Control
max-age=86400
x-amz-version-id
bOFcZJzsYy1.aHYIvu.ftVKtYXxJ9BCk
Server
AmazonS3
Content-Encoding
gzip
Vary
Accept-Encoding
Age
64795
X-Cache
Hit from cloudfront
Via
1.1 0d37b2e69745cd9f0c5457fbf1a83129.cloudfront.net (CloudFront)
X-Amz-Cf-Id
n4V0wqfHaAVoIElHgpmSXgH6LOxw5IZvAK8ag7a9kasYeJAGlu38yw==
ad-2.0.js
zdnet3.cbsistatic.com/fly/bundles/flyjs/js/managers/
19 KB
5 KB
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/bundles/flyjs/js/managers/ad-2.0.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
de749bdbeeb7bb7f79cb31ff00fe6830004064419f73fe9a6ec982e9de8bf19d

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:59 GMT
content-encoding
gzip
last-modified
Thu, 19 Apr 2018 09:47:08 GMT
server
nginx
etag
"5ad8659c-4c22"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
4885
expires
Wed, 17 Oct 2018 12:48:59 GMT
csync.ashx
ml314.com/
Redirect Chain
  • https://tags.bluekai.com/site/20486?limit=0&id=5978151440201526240&redir=https://ml314.com/csync.ashx%3Ffp=$_BK_UUID%26person_id=5978151440201526240%26eid=50056
  • https://tags.bluekai.com/site/20486?dt=0&r=2061585571&sig=1541381440&bkca=KJh+pnLvQY9D9BY43zSXZ+GeUYvYSsbV1Y1Cu2uCdgfSZyIzlPQEOVHZWSyrvXyyoD991X/JCzpghUihhKCYQ8e5Y6hp5P3Ay7tG49fqkHq2bAxitNam62YkCeF...
  • https://ml314.com/csync.ashx?fp=1JnjEQ999992oqNq&person_id=5978151440201526240&eid=50056
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=1JnjEQ999992oqNq&person_id=5978151440201526240&eid=50056
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.31.106.135 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-31-106-135.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:48:59 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Thu, 11 Oct 2018 08:48:59 GMT

Redirect headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:48:59 GMT
P3P
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV", policyref="http://tags.bluekai.com/w3c/p3p.xml"
Location
https://ml314.com/csync.ashx?fp=1JnjEQ999992oqNq&person_id=5978151440201526240&eid=50056
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Content-Length
0
BK-Server
f4f7
Expires
Thu, 01 Dec 1994 16:00:00 GMT
csync.ashx
ml314.com/
Redirect Chain
  • https://idsync.rlcdn.com/395886.gif?partner_uid=5978151440201526240
  • https://idsync.rlcdn.com/1000.gif?memo=CO6UGBIeChoIARCuXxoTNTk3ODE1MTQ0MDIwMTUyNjI0MBAAGg0Iu-r33QUSBQjoBxAA
  • https://ml314.com/csync.ashx?fp=&person_id=5978151440201526240&eid=50082
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=&person_id=5978151440201526240&eid=50082
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.31.106.135 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-31-106-135.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:48:59 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Thu, 11 Oct 2018 08:48:59 GMT

Redirect headers

status
307
date
Wed, 10 Oct 2018 12:48:59 GMT
cache-control
no-cache, no-store
timing-allow-origin
*
content-length
0
location
https://ml314.com/csync.ashx?fp=&person_id=5978151440201526240&eid=50082
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
csync.ashx
ml314.com/
Redirect Chain
  • https://pixel.mathtag.com/sync/img?redir=https://ml314.com/csync.ashx%3Ffp=[MM_UUID]%26person_id=5978151440201526240%26eid=50220
  • https://pixel.mathtag.com/sync/img?redir=https://ml314.com/csync.ashx%3Ffp=[MM_UUID]%26person_id=5978151440201526240%26eid=50220&mm_bnc&mm_bct
  • https://ml314.com/csync.ashx?fp=34ad5bbd-ed4e-4100-8ae2-c1c9135ec559&person_id=5978151440201526240&eid=50220
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=34ad5bbd-ed4e-4100-8ae2-c1c9135ec559&person_id=5978151440201526240&eid=50220
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.246.247.78 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-246-247-78.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:48:59 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Thu, 11 Oct 2018 08:48:59 GMT

Redirect headers

Date
Wed, 10 Oct 2018 12:48:59 GMT
Server
MT3 1.26.12.0 f85fe72 RELEASE cdg-pixel-x10
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Location
https://ml314.com/csync.ashx?fp=34ad5bbd-ed4e-4100-8ae2-c1c9135ec559&person_id=5978151440201526240&eid=50220
Cache-Control
no-cache
Connection
keep-alive
Content-Type
image/gif
Content-Length
0
Expires
Wed, 10 Oct 2018 12:48:58 GMT
csync.ashx
ml314.com/
Redirect Chain
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D5978151440201526240
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D5978151440201526240
  • https://ml314.com/csync.ashx?fp=9ecd85e1824080a6c08182f1ac7fcc7f&eid=50146&person_id=5978151440201526240
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=9ecd85e1824080a6c08182f1ac7fcc7f&eid=50146&person_id=5978151440201526240
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.31.106.135 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-31-106-135.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:48:59 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Thu, 11 Oct 2018 08:48:59 GMT

Redirect headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:48:59 GMT
P3P
CP=NOI DSP COR NID PSAa PSDa OUR UNI COM NAV
Location
https://ml314.com/csync.ashx?fp=9ecd85e1824080a6c08182f1ac7fcc7f&eid=50146&person_id=5978151440201526240
Cache-Control
no-cache
X-Server
10.26.15.73
Connection
keep-alive
Content-Length
0
Expires
Thu, 01 Jan 1970 00:00:00 GMT
match
ps.eyeota.net/
Redirect Chain
  • https://ps.eyeota.net/pixel?pid=r8hrb20&t=gif
  • https://ps.eyeota.net/pixel/bounce/?pid=r8hrb20&t=gif
  • https://ml314.com/utsync.ashx?eid=50052&et=0&fp=2jBdw91K9vln_g84fBGvaekjHGEGuxzeGR_oD55kgCKQ&return=https%3A%2F%2Fps.eyeota.net%2Fmatch%3Fbid%3Dr8hrb20%26uid%3Dnil
  • https://ml314.com/csync.ashx?fp=2jBdw91K9vln_g84fBGvaekjHGEGuxzeGR_oD55kgCKQ&person_id=5978151440201526240&eid=50052&return=https%3a%2f%2fps.eyeota.net%2fmatch%3fbid%3dr8hrb20%26uid%3dnil
  • https://ps.eyeota.net/match?bid=r8hrb20&uid=nil
70 B
171 B
Image
General
Full URL
https://ps.eyeota.net/match?bid=r8hrb20&uid=nil
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
35.156.121.57 Frankfurt, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-156-121-57.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
de9d3fd0eb948bd294477d0eda60a73b85caff1794803530d0463193a113da98

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:48:59 GMT
Content-Length
70
Content-Type
image/gif

Redirect headers

Date
Wed, 10 Oct 2018 12:48:59 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
text/html; charset=utf-8
Location
https://ps.eyeota.net/match?bid=r8hrb20&uid=nil
Cache-Control
private
Connection
keep-alive
Content-Length
168
Expires
Thu, 11 Oct 2018 08:48:59 GMT
demconf.jpg
dpm.demdex.net/
Redirect Chain
  • https://dpm.demdex.net/ibs:dpid=22052&dpuuid=5978151440201526240&redir=
  • https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=5978151440201526240&redir=
42 B
769 B
Image
General
Full URL
https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=5978151440201526240&redir=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.86.186 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-86-186.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

DCS
dcs-prod-irl1-v005-08cdb908e.edge-irl1.demdex.com 5.40.0.20180927094806 4ms
Pragma
no-cache
X-TID
y+jzxA/OQTI=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT

Redirect headers

Pragma
no-cache
X-TID
Yf0EvYp0T5Y=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Location
https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=5978151440201526240&redir=
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Length
0
Expires
Thu, 01 Jan 1970 00:00:00 GMT
jquery.ui.core-1.9.2.js
zdnet3.cbsistatic.com/fly/js/libs/jquery/ui/
5 KB
2 KB
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/js/libs/jquery/ui/jquery.ui.core-1.9.2.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
965b325924d7bd803f6fb1007b982eeb412ebfd696a20986fd4e6bc221daf413

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:59 GMT
content-encoding
gzip
last-modified
Tue, 07 Aug 2018 13:46:06 GMT
server
nginx
etag
W/"5b69a29e-128b"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
2096
expires
Wed, 17 Oct 2018 12:48:59 GMT
jquery.ui.mouse-1.9.2.js
zdnet4.cbsistatic.com/fly/js/libs/jquery/ui/
3 KB
1 KB
Script
General
Full URL
https://zdnet4.cbsistatic.com/fly/js/libs/jquery/ui/jquery.ui.mouse-1.9.2.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
ddfc91f954a7df70ddb1b6d0265eb1792d1c7922d50463d968159e7a4403fb1c

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:59 GMT
content-encoding
gzip
last-modified
Tue, 07 Aug 2018 13:46:06 GMT
server
nginx
etag
W/"5b69a29e-bca"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
1002
expires
Wed, 17 Oct 2018 12:48:59 GMT
gpt-4.3.js
zdnet4.cbsistatic.com/fly/bundles/flyjs/js/managers/
52 KB
10 KB
Script
General
Full URL
https://zdnet4.cbsistatic.com/fly/bundles/flyjs/js/managers/gpt-4.3.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
d48e0904f1b40972f1fc6dac3f358719e080fab3291d13d2ca4a60405707a88b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:59 GMT
content-encoding
gzip
last-modified
Thu, 19 Apr 2018 09:47:08 GMT
server
nginx
etag
"5ad8659c-d143"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
10133
expires
Wed, 17 Oct 2018 12:48:59 GMT
fb_digioh.2.1.5.css
www.lightboxcdn.com/static/
4 KB
1 KB
Stylesheet
General
Full URL
https://www.lightboxcdn.com/static/fb_digioh.2.1.5.css?cb=636730487871673517
Requested by
Host: www.lightboxcdn.com
URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/user.js?cb=636730487877169813
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:50a5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
802446cd0aefe1f43030cf3e02eddbbbec61e27e62479d990d8889266943a650

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Wed, 10 Oct 2018 12:48:59 GMT
content-encoding
gzip
cf-cache-status
HIT
content-md5
SPXkOHRrmvkdtUVAkMsWtg==
cf-polished
origSize=5365
status
200
last-modified
Thu, 22 Jun 2017 21:54:44 GMT
x-ms-lease-status
unlocked
cf-bgj
minify
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
x-ms-request-id
e98baa5b-201e-013e-480c-57a5b5000000
cache-control
public, max-age=31536000
x-ms-version
2009-09-19
cf-ray
46793452abcbbf02-FRA
expires
Thu, 10 Oct 2019 12:48:59 GMT
ping
api.viglink.com/api/
264 B
944 B
XHR
General
Full URL
https://api.viglink.com/api/ping
Requested by
Host: cdn.viglink.com
URL: https://cdn.viglink.com/api/vglnk.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.76.79.78 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-76-79-78.eu-west-1.compute.amazonaws.com
Software
Apache-Coyote/1.1 /
Resource Hash
5b4dd54f2e8f12f8c8c9c2a993cb3644608f894d6b034792952d95051fd64aae

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:48:59 GMT
Server
Apache-Coyote/1.1
P3P
CP="ALL IND DSP COR CUR ADM TAIo PSDo OUR COM INT NAV PUR STA UNI"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript;charset=UTF-8
Content-Length
264
Expires
Thu, 01 Jan 1970 00:00:00 GMT
/
36e4f0eb.akstat.io/
0
354 B
XHR
General
Full URL
https://36e4f0eb.akstat.io/?h.pg=article&when=1539175739561&t_other=custom4%7C1884&d=zdnet.com&h.key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&h.d=zdnet.com&h.cr=d739774c9754ad0e264885d21363e3ed2bbea786&h.t=1539175739214&http.initiator=api&rt.start=api&rt.si=7545d5b8-988b-4e0f-9109-085535a1c3f0&rt.ss=1539175742083&rt.sl=0&api=1&api.v=2&api.l=js&api.lv=0.0.1
Requested by
Host: zdnet1.cbsistatic.com
URL: https://zdnet1.cbsistatic.com/fly/js/libs/mpulse-1.0.2.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
184.30.223.226 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-223-226.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:48:59 GMT
Content-Type
image/gif
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
X-XSS-Protection
0
Expires
Wed, 10 Oct 2018 12:48:59 GMT
c.gif
dw.cbsi.com/clear/
42 B
346 B
Image
General
Full URL
https://dw.cbsi.com/clear/c.gif?rsid=cnetzdnetglobalsite&sid=2&siteid=2&pagetype=article&assetguid=7a12161d-2a5f-4793-b0a4-9fac038733de&assettitle=gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20brazilian%20banks&assettype=content_article&pubdate=2018-10-01%2004%3A20%3A22&viewguid=7162bf48-0ccd-4007-b28c-e5153fda4868&devicetype=desktop&sitetype=responsive%20web&author=catalin%20cimpanu&authorid=85fd8691-f525-4ea2-a601-af296f629f7f&topicguid=113c25b6-ec91-11e3-95d2-02911863765e&topic=security&topicbrcrm=security&ts=1539175739571&ld=www.zdnet.com&ldc=7c6d8adf-70e7-4f33-86a8-6fee7fc90c0a&brwinsz=1600x1200&brscrsz=1600x1200&brlang=en-US&tcset=utf8&im=dsjs&clgf=KRfWEFu99TvT4Nk%2B3NM&srcurl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&title=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.30.230.22 Fort Lauderdale, United States, ASN6623 (CBSI-1 - CBS Interactive Inc., US),
Reverse DNS
phx2-dw-cbsi-xw-ext-lb.cnet.com
Software
Apache/2.4.25 /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:48:59 GMT
Server
Apache/2.4.25
Vary
*
Content-Type
image/gif
Cache-control
no-cache, must-revalidate, no-transform
Connection
Keep-Alive
Keep-Alive
timeout=80, max=178
Content-Length
42
Expires
Mon, 05 Jan 1970 12:12:12 GMT
id
dpm.demdex.net/
2 KB
1 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=2.3.0&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_orgid=10D31225525FF5790A490D4D%40AdobeOrg&d_nsid=0&ts=1539175739612
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.86.186 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-86-186.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
dd6c40b4ff365af50a301cd50565ca33cbd1aff479d2680c96179f5ee471aaee

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v005-0d8cf6c77.edge-irl1.demdex.com 5.40.0.20180927094806 4ms
Pragma
no-cache
Content-Encoding
gzip
X-TID
aWYaisCGR/8=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
699
Expires
Thu, 01 Jan 1970 00:00:00 GMT
utag.v.js
tags.tiqcdn.com/utag/tiqapp/
2 B
138 B
Script
General
Full URL
https://tags.tiqcdn.com/utag/tiqapp/utag.v.js?a=cbsi/zdnetglobalsite/201809191908&cb=1539175739616
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FC) /
Resource Hash
a2c2339691fc48fbd14fb307292dff3e21222712d9240810742d7df0c6d74dfb

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:48:59 GMT
last-modified
Thu, 14 Apr 2016 16:59:33 GMT
server
ECS (fcn/40FC)
etag
"2243872957"
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=600
accept-ranges
bytes
content-length
2
expires
Wed, 10 Oct 2018 12:58:59 GMT
Cookie set dest5.html
cbsi.demdex.net/ Frame 6289
0
0
Document
General
Full URL
https://cbsi.demdex.net/dest5.html?d_nsid=undefined
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.17.182.129 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-17-182-129.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash

Request headers

Host
cbsi.demdex.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Cookie
demdex=81058010229352235421889480821828399836
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Accept-Ranges
bytes
Cache-Control
max-age=21600
Content-Encoding
gzip
Content-Type
text/html
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified
Wed, 03 Oct 2018 16:46:31 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Pragma
no-cache
Set-Cookie
demdex=81058010229352235421889480821828399836;Path=/;Domain=.demdex.net;Expires=Mon, 08-Apr-2019 12:48:59 GMT;Max-Age=15552000
Vary
Accept-Encoding, User-Agent
X-TID
rO83sTJvQYo=
Content-Length
2766
Connection
keep-alive
id
saa.cbsi.com/
90 B
716 B
XHR
General
Full URL
https://saa.cbsi.com/id?d_visid_ver=2.3.0&d_fieldgroup=A&mcorgid=10D31225525FF5790A490D4D%40AdobeOrg&mid=80823053500865929101904813987310434212&ts=1539175739661
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.140.43.37 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
cbsi.com.ssl.sc.omtrdc.net
Software
Omniture DC/2.0.0 /
Resource Hash
c173b6c415b1ead2c128bb71c185513230135ebc835b475219dbe4069672d7d3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Date
Wed, 10 Oct 2018 12:48:59 GMT
X-Content-Type-Options
nosniff
Server
Omniture DC/2.0.0
xserver
www31
Vary
Origin
X-C
ms-6.5.1
P3P
CP="This is not a P3P policy"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/x-javascript
Keep-Alive
timeout=15
Content-Length
90
X-XSS-Protection
1; mode=block
domains
api.viglink.com/api/
76 B
521 B
XHR
General
Full URL
https://api.viglink.com/api/domains
Requested by
Host: cdn.viglink.com
URL: https://cdn.viglink.com/api/vglnk.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.76.79.78 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-76-79-78.eu-west-1.compute.amazonaws.com
Software
Apache-Coyote/1.1 /
Resource Hash
d60a091754d5fd9c6685e121d9c32aeb2ef35e0dd21674004b542c087570e7ba

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:48:59 GMT
Server
Apache-Coyote/1.1
P3P
CP="ALL IND DSP COR CUR ADM TAIo PSDo OUR COM INT NAV PUR STA UNI"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript;charset=UTF-8
Content-Length
76
Expires
Thu, 01 Jan 1970 00:00:00 GMT
id
dpm.demdex.net/
2 KB
1 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=2.3.0&d_fieldgroup=AAM&d_rtbd=json&d_ver=2&d_orgid=10D31225525FF5790A490D4D%40AdobeOrg&d_nsid=0&d_mid=80823053500865929101904813987310434212&d_blob=RKhpRz8krg2tLO6pguXWp5olkAcUniQYPHaMWWgdJ3xzPWQmdj0y&d_cid_ic=AVID%012DDEFA9D85312B44-40000103E0000BB2&ts=1539175739795
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.86.186 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-86-186.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
bfa0d28e0d61c79f7586a7c9dccc28356c568f7a2225ba6b844e70a4ae599460

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v005-0427d0066.edge-irl1.demdex.com 5.40.0.20180927094806 10ms
Pragma
no-cache
Content-Encoding
gzip
X-TID
5kY70mzsT5E=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
700
Expires
Thu, 01 Jan 1970 00:00:00 GMT
s65033066783656
saa.cbsi.com/b/ss/cnetzdnetglobalsite/10/JS-2.3.0/
2 KB
2 KB
Script
General
Full URL
https://saa.cbsi.com/b/ss/cnetzdnetglobalsite/10/JS-2.3.0/s65033066783656?AQB=1&ndh=1&pf=1&callback=s_c_il[0].doPostbacks&et=1&t=10%2F9%2F2018%2012%3A48%3A59%203%200&d.&nsid=0&jsonv=1&.d&mid=80823053500865929101904813987310434212&aid=2DDEFA9D85312B44-40000103E0000BB2&aamlh=6&ce=UTF-8&ns=cbsinteractive&pageName=zdnet%3A%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&g=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&cc=USD&ch=editorial&server=www.zdnet.com&aamb=RKhpRz8krg2tLO6pguXWp5olkAcUniQYPHaMWWgdJ3xzPWQmdj0y&c1=zdnet&v1=zdnet&h1=editorial%7Carticle&c2=D%3Dv2&v2=eu&l2=113c25b6-ec91-11e3-95d2-02911863765e%7C54795830-f620-4b12-bd83-5740537be838&c3=D%3Dv3&v3=responsive%20web%7Cdesktop&l3=85fd8691-f525-4ea2-a601-af296f629f7f&c4=D%3Dv4&c5=D%3Dv5&v5=cnetzdnetglobalsite&c6=D%3Dv6&v6=editorial%7Carticle&c7=D%3Dv7&v7=D%3Dg&c8=D%3Dv8&v8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c9=D%3DUser-Agent&c10=D%3Dv10&v10=article&c11=D%3Dv11&v11=D%3Dch%2B%22%3A%22%2Bv10&v15=not%20authenticated%7Canon&c20=D%3Dv20&v20=gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20brazilian%20banks&c22=D%3Dv22&v22=content_article&c23=D%3Dv23&v23=113c25b6-ec91-11e3-95d2-02911863765e&c24=D%3Dv24&v24=7162bf48-0ccd-4007-b28c-e5153fda4868&c25=D%3Dv25&c26=D%3Dv26&v26=bfccdd23-ed4a-11e3-95d2-02911863765e&c28=D%3Dv28&c30=D%3Dv30&v30=7a12161d-2a5f-4793-b0a4-9fac038733de&c31=D%3Dv31&c33=D%3Dv33&c34=D%3Dv34&c35=D%3Dv35&v35=KRfWEFu99TvT4Nk%2B3NM&v44=zdnet&c50=D%3Dv50&v50=8%3A30AM&c51=D%3Dv51&v51=Wednesday&c52=D%3Dv52&v52=1&c53=D%3Dv53&v53=New&c54=D%3Dv54&v54=First%20Visit&c65=D%3Dv65&v65=discover&c69=D%3Dv69&v85=true&s=1600x1200&c=24&j=1.6&v=N&k=Y&bw=1600&bh=1200&mcorgid=10D31225525FF5790A490D4D%40AdobeOrg&AQE=1
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.140.43.37 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
cbsi.com.ssl.sc.omtrdc.net
Software
Omniture DC/2.0.0 /
Resource Hash
ffc2ab65ae087ecc6d00ace6175aa7360ccd78c79d79e49418c3bea0f4f4adc2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

X-AAM-TID
NRxanOcmRUY=
Date
Wed, 10 Oct 2018 12:48:59 GMT
X-Content-Type-Options
nosniff
X-C
ms-6.5.1
P3P
CP="This is not a P3P policy"
Connection
Keep-Alive
Content-Length
1721
X-XSS-Protection
1; mode=block
DCS
dcs-prod-irl1-v005-0343d80cf.edge-irl1.demdex.com 5.40.0.20180927094806 11ms
Pragma
no-cache
Last-Modified
Thu, 11 Oct 2018 12:48:59 GMT
Server
Omniture DC/2.0.0
xserver
www31
ETag
"3305354730987913216-5391724663791422434"
Vary
*
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Keep-Alive
timeout=15
Expires
Tue, 09 Oct 2018 12:48:59 GMT
measure.min.js
asset.pagefair.com/
11 KB
4 KB
Script
General
Full URL
https://asset.pagefair.com/measure.min.js?_=1539175740077
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1497-fly/js/main.default.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
94.31.29.248 , United Kingdom, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
94.31.29.248.IPYX-077437-ZYO.above.net
Software
NetDNA-cache/2.2 /
Resource Hash
6ac72fa11e76ea6fdbb1b310f67b3b9b24c11da94774a89323b71930ae544eee

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Mon, 11 Jun 2018 11:42:29 GMT
server
NetDNA-cache/2.2
x-amz-request-id
57A690A7D845C5A4
etag
W/"5631e8df5abfee420cd07a2737665a78"
x-cache
MISS
content-type
application/x-javascript
status
200
cache-control
max-age=86400
x-amz-id-2
QK8aYhgEDZfT912nMebt7ShQFcoUkrtgXR/szN/J01uU6am/+ArrXQPb1SpKK7KeczrkTfF07aI=
expires
Thu, 11 Oct 2018 12:49:00 GMT
ads.min.js
asset.pagefair.net/
0
347 B
Script
General
Full URL
https://asset.pagefair.net/ads.min.js?_=1539175740078
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1497-fly/js/main.default.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
94.31.29.96 , United Kingdom, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
94.31.29.96.IPYX-077437-ZYO.above.net
Software
NetDNA-cache/2.2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Fri, 09 Mar 2018 17:19:02 GMT
server
NetDNA-cache/2.2
x-amz-request-id
815F2B8F834FBEA2
etag
"263dfc0b0e2e32b880781aa6f238a031"
x-cache
MISS
content-type
application/x-javascript
status
200
cache-control
max-age=7200
accept-ranges
bytes
content-length
31
x-amz-id-2
pVn1/r1c6VCAM6au6rov0cmAkek0ha8+BQ4DFDoDNQP5BVR65Sa2795tMmxWBM2/oomgWZ7Qq98=
jpt
secure.adnxs.com/
0
684 B
XHR
General
Full URL
https://secure.adnxs.com/jpt?id=11834629&size=728x90&callback=headertag.AppNexusHtb.adResponseCallback&callback_uid=DfHVqNGr&psa=0&promo_sizes=970x250&referrer=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.221 , European Union, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
Software
nginx/1.13.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
X-Proxy-Origin
148.251.45.254; 148.251.45.254; 316.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.223.138:80
AN-X-Request-Uuid
66810f50-4e08-457e-8c37-d85e6a27d492
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
jpt
secure.adnxs.com/
0
684 B
XHR
General
Full URL
https://secure.adnxs.com/jpt?id=11834625&size=300x250&callback=headertag.AppNexusHtb.adResponseCallback&callback_uid=mDn1uaET&psa=0&referrer=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.221 , European Union, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
Software
nginx/1.13.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
X-Proxy-Origin
148.251.45.254; 148.251.45.254; 316.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.101:80
AN-X-Request-Uuid
4c0bca06-61de-4950-9748-49fc6becfe3e
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
jpt
secure.adnxs.com/
0
683 B
XHR
General
Full URL
https://secure.adnxs.com/jpt?id=11834627&size=300x250&callback=headertag.AppNexusHtb.adResponseCallback&callback_uid=4aJu3taq&psa=0&referrer=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.221 , European Union, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
Software
nginx/1.13.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
X-Proxy-Origin
148.251.45.254; 148.251.45.254; 316.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.78:80
AN-X-Request-Uuid
614492a6-098d-4658-8717-e75508a43183
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
jpt
secure.adnxs.com/
0
683 B
XHR
General
Full URL
https://secure.adnxs.com/jpt?id=11834631&size=300x250&callback=headertag.AppNexusHtb.adResponseCallback&callback_uid=ySDLCj60&psa=0&promo_sizes=300x600&referrer=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.221 , European Union, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
Software
nginx/1.13.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
X-Proxy-Origin
148.251.45.254; 148.251.45.254; 316.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.223.44:80
AN-X-Request-Uuid
5b644bce-30f9-4459-a7f6-c37dd3732d91
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
jpt
secure.adnxs.com/
0
684 B
XHR
General
Full URL
https://secure.adnxs.com/jpt?id=11834632&size=728x90&callback=headertag.AppNexusHtb.adResponseCallback&callback_uid=EIDMbfBQ&psa=0&promo_sizes=970x250&referrer=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.221 , European Union, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
Software
nginx/1.13.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
X-Proxy-Origin
148.251.45.254; 148.251.45.254; 316.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.222.245:80
AN-X-Request-Uuid
47adb116-081b-4326-9f4d-e07fc8fa391c
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
cygnus
as-sec.casalemedia.com/
66 B
1001 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=182823&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A85843827%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22202%22%2C%22siteID%22%3A%22182829%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22220%22%2C%22siteID%22%3A%22183316%22%7D%2C%22id%22%3A%222%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22209%22%2C%22siteID%22%3A%22182828%22%7D%2C%22id%22%3A%223%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22210%22%2C%22siteID%22%3A%22182826%22%7D%2C%22id%22%3A%224%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22208%22%2C%22siteID%22%3A%22182824%22%7D%2C%22id%22%3A%225%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22222%22%2C%22siteID%22%3A%22182825%22%7D%2C%22id%22%3A%226%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22201%22%2C%22siteID%22%3A%22182823%22%7D%2C%22id%22%3A%227%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22219%22%2C%22siteID%22%3A%22183315%22%7D%2C%22id%22%3A%228%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.53.169.164 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-53-169-164.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
167731351db4d7e6a3cac4f70102e17695ecfab9db64cbb5d0bd483aa1f1555e

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:00 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript
Content-Length
86
Expires
Wed, 10 Oct 2018 12:49:00 GMT
vglnk.js
cdn.viglink.com/api/
79 KB
27 KB
Script
General
Full URL
https://cdn.viglink.com/api/vglnk.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:a20d , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
6bf6a92a50156df8d8018b0916a7c98b22e9d2201e42c32dcf9d6d7187df8ab0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
cf-cache-status
HIT
x-amz-request-id
584FD101F20B21A8
status
200
content-length
27815
x-amz-id-2
2F26vcnfO+4Y0DxW92N50Wtf+t4AJ9JA/issbY2HVBQIVqT/dK/B597g0li/pfmnKDTHFhyL2hU=
last-modified
Tue, 18 Sep 2018 20:37:04 GMT
server
cloudflare
etag
"15468e63d7aba3f957c1cb44354bddfa"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=1800
accept-ranges
bytes
cf-ray
46793457eb5ec305-FRA
expires
Wed, 10 Oct 2018 13:19:00 GMT
utag.1775.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
26 KB
9 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1775.js?utv=ut4.43.201809191908
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41AA) /
Resource Hash
0f4176807e149be9c6cc0e583699fffe630cccb37e57242ce5a7b1f7d63d859d

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Thu, 10 Nov 2016 20:41:55 GMT
server
ECS (fcn/41AA)
etag
"1112944691"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
8960
expires
Thu, 25 Oct 2018 12:49:00 GMT
utag.277.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
951 B
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.277.js?utv=ut4.43.201809191908
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40F9) /
Resource Hash
0e13cd6845611f0c419398a75b85ba014a7fffb1b9e9575c2e1b4cfefebd0017

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Mon, 11 Jul 2016 20:43:58 GMT
server
ECS (fcn/40F9)
etag
"461771432+gzip"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
863
expires
Thu, 25 Oct 2018 12:49:00 GMT
utag.1772.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
1020 B
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1772.js?utv=ut4.43.201809191908
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40B3) /
Resource Hash
e482ba089d973ca257acfd70b2d7541447d5d333449b106d5c3dffebe322566a

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Mon, 11 Jul 2016 20:43:58 GMT
server
ECS (fcn/40B3)
etag
"4198895974"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
959
expires
Thu, 25 Oct 2018 12:49:00 GMT
utag.1796.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
8 KB
3 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1796.js?utv=ut4.43.201809191908
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40F9) /
Resource Hash
9337d4f2ef8a00759da573e178e302712fec944ac54cfd808f48c526b9816d3b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Mon, 28 Nov 2016 15:09:53 GMT
server
ECS (fcn/40F9)
etag
"931235332"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
2762
expires
Thu, 25 Oct 2018 12:49:00 GMT
pixel_details.html
www.everestjs.net/static/ Frame 4D97
Redirect Chain
  • https://pixel.everesttech.net/4083/gr?ev_gb=0&url=https%3A%2F%2Fwww.everestjs.net%2Fstatic%2Fpixel_details.html%23google%3D__EFGCK__%26gsurfer%3D__EFGSURFER__%26optout%3D__EFOPTOUT__%26throttleCook...
  • https://www.everestjs.net/static/pixel_details.html
0
0
Document
General
Full URL
https://www.everestjs.net/static/pixel_details.html
Requested by
Host: www.everestjs.net
URL: https://www.everestjs.net/static/st.v3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.67.133.222 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-67-133-222.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Host
www.everestjs.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Server
Apache
Last-Modified
Tue, 04 Oct 2011 16:14:21 GMT
ETag
"8623-a6-4ae7b62583140"
Accept-Ranges
bytes
Content-Type
text/html
Content-Encoding
gzip
Content-Length
146
Cache-Control
max-age=82970
Expires
Thu, 11 Oct 2018 11:51:50 GMT
Date
Wed, 10 Oct 2018 12:49:00 GMT
Connection
keep-alive
Vary
Accept-Encoding

Redirect headers

Date
Wed, 10 Oct 2018 12:49:00 GMT
Server
Apache
Set-Cookie
everest_session_v2=W731PAAABaZteD2B; path=/; domain=.everesttech.net everest_g_v2=g_surferid~W731PAAABaZteD2B; path=/; domain=.everesttech.net; expires=Thu, 03-Sep-2020 23:29:00 GMT
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Cache-Control
no-cache
Location
https://www.everestjs.net/static/pixel_details.html#google=W731PAAABaZteD2B&gsurfer=W731PAAABaZteD2B&optout=0&throttleCookie=&time=20181010124900
Content-Length
345
Keep-Alive
timeout=15, max=997603
Connection
Keep-Alive
Content-Type
text/html; charset=iso-8859-1
ls.html
www.lightboxcdn.com/lclst/a1583f50-579b-41d0-8c4e-1cd1790d945c/ Frame EB0F
0
0
Document
General
Full URL
https://www.lightboxcdn.com/lclst/a1583f50-579b-41d0-8c4e-1cd1790d945c/ls.html?purl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&vid=a1583f50-579b-41d0-8c4e-1cd1790d945c&se=1&prev=0&cb=636730487871673517
Requested by
Host: www.lightboxcdn.com
URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/user.js?cb=636730487877169813
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:50a5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

:method
GET
:authority
www.lightboxcdn.com
:scheme
https
:path
/lclst/a1583f50-579b-41d0-8c4e-1cd1790d945c/ls.html?purl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&vid=a1583f50-579b-41d0-8c4e-1cd1790d945c&se=1&prev=0&cb=636730487871673517
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
cookie
__cfduid=d55b0b6c850cea8e268cdb939162727031539175739
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
date
Wed, 10 Oct 2018 12:49:00 GMT
content-type
text/html
content-md5
2QlVA6sVmgJp4XZ5c8SrrQ==
last-modified
Thu, 20 Sep 2018 13:59:47 GMT
x-ms-request-id
45e916ee-801e-0037-123f-59f96e000000
x-ms-version
2009-09-19
x-ms-lease-status
unlocked
x-ms-blob-type
BlockBlob
cf-cache-status
HIT
expires
Thu, 10 Oct 2019 12:49:00 GMT
cache-control
public, max-age=31536000
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
server
cloudflare
cf-ray
467934580fb2bf02-FRA
content-encoding
gzip
Cookie set dest5.html
cbsi.demdex.net/ Frame 61D8
0
0
Document
General
Full URL
https://cbsi.demdex.net/dest5.html?d_nsid=0
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.17.182.129 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-17-182-129.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash

Request headers

Host
cbsi.demdex.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Cookie
demdex=81058010229352235421889480821828399836; dextp=269-1-1539175739889|3-1-1539175739992|477-1-1539175740096
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Accept-Ranges
bytes
Cache-Control
max-age=21600
Content-Encoding
gzip
Content-Type
text/html
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified
Wed, 03 Oct 2018 16:46:04 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Pragma
no-cache
Set-Cookie
demdex=81058010229352235421889480821828399836;Path=/;Domain=.demdex.net;Expires=Mon, 08-Apr-2019 12:49:00 GMT;Max-Age=15552000
Vary
Accept-Encoding, User-Agent
X-TID
b0LS+LQERzI=
Content-Length
2766
Connection
keep-alive
ads
securepubads.g.doubleclick.net/gampad/
114 KB
17 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2375131839566842&correlator=3141033123401341&output=json_html&callback=googletag.impl.pubads.callbackProxy1&impl=fifs&adsid=NT&json_a=1&eid=21062153%2C21062578&vrg=263&guci=1.2.0.0.2.2.0&sc=1&sfv=1-0-29&iu_parts=8264%2Cuk-zdnet%2Csecurity&enc_prev_ius=%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2&prev_iu_szs=7x7%7C5x5%2C1x1%2C1600x1000%2C728x90%7C970x66%7C970x250%2C300x250%7C300x600%7C300x1050%2C300x250%2C300x250%2C728x90%7C970x66%7C970x250%2C371x771&ists=128&prev_scp=pos%3Dnav%7C%7Cpos%3Dtop%7Cpos%3Dtop%7Cpos%3Dtop%7Cpos%3Dmiddle%7Cpos%3Dbottom%7Cpos%3Dbottom%7Cpos%3Dtop&eri=1&cust_params=buyingcycle%3Ddiscover%26topic%3Dsecurity%252Cinternet-of-things%26device%3Ddesktop%26ptype%3Darticle%26cid%3Dgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%26env%3Dprod%26firstpg%3D1%26vguid%3D7162bf48-0ccd-4007-b28c-e5153fda4868%26session%3Dd%26subses%3D2&cookie_enabled=1&bc=7&abxe=1&lmt=1539175740&dt=1539175740303&dlt=1539175738184&idt=542&frm=20&biw=1585&bih=1200&oid=3&adxs=0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0&adys=0%2C116%2C0%2C0%2C0%2C0%2C0%2C0%2C0&adks=1918124744%2C1001626700%2C1651858423%2C3883059105%2C797870492%2C2557603172%2C3866509849%2C2472281634%2C2888488347&gut=v2&ifi=1&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&dssz=81&icsg=0&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1585x5651%7C1585x0%7C1585x-1%7C1585x-1%7C370x-1%7C370x-1%7C370x-1%7C1210x-1%7C370x-1&msz=7x30%7C1585x0%7C1600x-1%7C688x-1%7C300x-1%7C300x-1%7C300x-1%7C728x-1%7C371x-1&ga_vid=1830778820.1539175740&ga_sid=1539175740&ga_hid=1086664752&fws=128%2C4%2C128%2C128%2C128%2C128%2C128%2C128%2C128
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_263.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.98 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
cafe /
Resource Hash
bd8d68bd845218ea1277106872940927c850a8fb1f1b3a3072fe8a56ad0b96a5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2,-2,-2,-2,-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
16523
x-xss-protection
1; mode=block
google-lineitem-id
4745974454,-2,4745166436,253246569,253246569,241984809,4745571990,241984809,236907969
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138239360681,-2,138239321298,75374362809,75375443409,75375443409,138239321463,75374362809,72087703209
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_263.js
securepubads.g.doubleclick.net/gpt/
74 KB
27 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_263.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_263.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.98 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
sffe /
Resource Hash
ff287e4a1db7bfb5a09b28e0e651bd3c725971b6410fde44295d72e586143961
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 05 Oct 2018 14:07:02 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27514
x-xss-protection
1; mode=block
expires
Wed, 10 Oct 2018 12:49:00 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-29/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-29/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_263.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81d::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Purpose
prefetch
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

expires
Wed, 02 Oct 2019 10:29:16 GMT
cache-control
public, immutable, max-age=31536000
last-modified
Mon, 11 Jun 2018 14:38:59 GMT
content-type
text/html
/
www.zdnet.com/components/breaking-news/xhr/
1 KB
2 KB
XHR
General
Full URL
https://www.zdnet.com/components/breaking-news/xhr/?slug=breaking-news-banner
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1497-fly/js/main.default.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
c6796c3c9dd09874fda3e46c5b277a4fb65f34f8e62522264ef6c10d0f0e5eb8
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/components/breaking-news/xhr/?slug=breaking-news-banner
pragma
no-cache
cookie
_ccmsi=1539175739163_xyckedlix|1539175739163; _ccmaid=5978151440201526240; zdnet_ad=%7B%22type%22%3A%22gpt%22%2C%22region%22%3A%22uk%22%2C%22session%22%3A%22d%22%2C%22subSession%22%3A%222%22%7D; first_page_today=false; LDCLGFbrowser=7c6d8adf-70e7-4f33-86a8-6fee7fc90c0a; XCLGFbrowser=KRfWEFu99TvT4Nk+3NM; s_vnum=1541767739602%26vn%3D1; s_invisit=true; s_getNewRepeat=1539175739603-New; s_lv_zdnet=1539175739603; s_lv_zdnet_s=First%20Visit; AMCVS_10D31225525FF5790A490D4D%40AdobeOrg=1; AMCV_10D31225525FF5790A490D4D%40AdobeOrg=-894706358%7CMCMID%7C80823053500865929101904813987310434212%7CMCAAMLH-1539780539%7C6%7CMCAAMB-1539780539%7CRKhpRz8krg2tLO6pguXWp5olkAcUniQYPHaMWWgdJ3xzPWQmdj0y%7CMCOPTOUT-1539182939s%7CNONE%7CMCAID%7C2DDEFA9D85312B44-40000103E0000BB2%7CvVersion%7C2.3.0; s_cc=true; aam_uuid=81058010229352235421889480821828399836; viewGuid=7162bf48-0ccd-4007-b28c-e5153fda4868; utag_main=_sn:1$_ss:0$_st:1539177540140$ses_id:1539175738870%3Bexp-session$_pn:1%3Bexp-session$linktag:undefined%3Bexp-session; RT="sl=1&ss=1539175736302&tt=3863&obo=0&bcn=%2F%2F22ffabbe.akstat.io%2F&sh=1539175740170%3D1%3A0%3A3863&dm=zdnet.com&si=8b5454d7-9766-40fa-b597-187afe316cb3&ld=1539175740170"
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
application/json, text/javascript, */*; q=0.01
cache-control
no-cache
:authority
www.zdnet.com
x-requested-with
XMLHttpRequest
:scheme
https
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
:method
GET
Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Accept-Encoding, User-Agent
content-length
509
x-xss-protection
1; mode=block
referrer-policy
no-referrer-when-downgrade
last-modified
Wed, 10 Oct 2018 12:47:51 GMT
server
nginx
x-frame-options
SAMEORIGIN
date
Wed, 10 Oct 2018 12:49:00 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-tx-id
1060a55a-997c-4f73-af06-bb6b4f76eb60
content-type
application/json
access-control-allow-origin
https://www.zdnet.com
cache-control
max-age=5400, private
set-cookie
fly_device=desktop; expires=Wed, 17-Oct-2018 12:49:00 GMT; path=/; domain=.zdnet.com; secure fly_geo={"countryCode": "de"}; expires=Wed, 17-Oct-2018 12:49:00 GMT; path=/; domain=.zdnet.com; secure fly_preferred_edition=eu; path=/; domain=.zdnet.com; secure fly_default_edition=eu; path=/; domain=.zdnet.com; secure ak_bmsc=54663559300ED6C6D3D13A2A146E2B990210BAB7BB6E00003CF5BD5BA371321E~pl5pvAF3Ur1DkadQ20+2i6W1o4pM4n1j4Pt5DxROW4yFxyzhtJUnw7iFEY6MQOM9lshn5WXAaCYMOdWFDsKA0F9gqEig42JYw8Y9kGeNToo42180CxDQk5IeiAosiVQkt0XDRiSbZpdbk2/qRz+OGTD+wU5IK4jqwjMw6ijaaAsNs01Pw7xPBpF2mOD5iCQN1HwLPe7KSiZJk9v9N2FSBTJ5OU0iQkNGil5yKAa2BPJsI=; expires=Wed, 10 Oct 2018 14:49:00 GMT; max-age=7200; path=/; domain=.zdnet.com; HttpOnly
accept-ranges
bytes
expires
Wed, 10 Oct 2018 14:17:51 GMT
/
graph.facebook.com/
572 B
781 B
Script
General
Full URL
https://graph.facebook.com/?id=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&callback=jQuery183010218628972638855_1539175738569&_=1539175740349
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1497-fly/js/main.default.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a03:2880:f01a:1:face:b00c:0:1 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
125e6c3c2707b416e55d847535b5f1755cb6fb24d14d7efab8abd8e436051a0d
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=15552000; preload
content-encoding
gzip
etag
"f0f036633b39a80db220e53279001601b6b747ec"
x-app-usage
{"call_count":0,"total_cputime":0,"total_time":0}
status
200
x-fb-rev
4404124
content-length
370
pragma
no-cache
x-fb-debug
tWzlfaRjDvusNkBaCnQFsrsdjfo+aWPDCi2A6HQcgD4Gtc6D5Ta/ZciKlUbWVj7hW6at84i2oUxpO4HBd1yGHg==
x-fb-trace-id
AqhSOXZXpb0
date
Wed, 10 Oct 2018 12:49:00 GMT
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, no-cache, no-store, must-revalidate
facebook-api-version
v2.8
expires
Sat, 01 Jan 2000 00:00:00 GMT
share
www.linkedin.com/countserv/count/
207 B
518 B
Script
General
Full URL
https://www.linkedin.com/countserv/count/share?url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&callback=jQuery183010218628972638855_1539175738570&_=1539175740350
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1497-fly/js/main.default.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2620:109:c00c:104::b93f:9001 , United States, ASN14413 (LINKEDIN - LinkedIn Corporation, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
12fd73f35398adab23c87f1109e0990205a9f68a34181f95592331cefafb0fc8
Security Headers
Name Value
Content-Security-Policy default-src *; connect-src 'self' static.licdn.com media.licdn.com static-exp1.licdn.com static-exp2.licdn.com media-exp1.licdn.com media-exp2.licdn.com https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' platform.linkedin.com spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'; report-uri https://www.linkedin.com/platform-telemetry/csp?f=l
Strict-Transport-Security max-age=2592000
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Accept-Encoding
x-li-uuid
RSTwUi5AXBVgFQSNkCsAAA==
server
Apache-Coyote/1.1
pragma
no-cache
x-li-pop
prod-tln1
x-frame-options
sameorigin
strict-transport-security
max-age=2592000
content-type
text/javascript;charset=UTF-8
x-xss-protection
1; mode=block
cache-control
no-cache, no-store
content-security-policy
default-src *; connect-src 'self' static.licdn.com media.licdn.com static-exp1.licdn.com static-exp2.licdn.com media-exp1.licdn.com media-exp2.licdn.com https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' platform.linkedin.com spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'; report-uri https://www.linkedin.com/platform-telemetry/csp?f=l
x-li-proto
http/2
x-li-fabric
prod-lor1
expires
Thu, 01 Jan 1970 00:00:00 GMT
disqus-count-5922ea1c53-rev.js
zdnet2.cbsistatic.com/fly/js/components/
406 B
480 B
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/js/components/disqus-count-5922ea1c53-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
b8c15c61feffdfe68b168cf2ac8cf58867f38547da3b15d7971a75c44f16bc26

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 16:42:34 GMT
server
nginx
etag
"5b5f3ffa-196"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
270
expires
Wed, 17 Oct 2018 12:49:00 GMT
controls-b0b722187e-rev.css
zdnet2.cbsistatic.com/fly/css/video/htmlPlayerControls/
42 KB
7 KB
Stylesheet
General
Full URL
https://zdnet2.cbsistatic.com/fly/css/video/htmlPlayerControls/controls-b0b722187e-rev.css
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1497-fly/js/main.default.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
f6f4c12d0bf24de5540b1d7d92514d071ceeafd73a0e9b1a570408e09de78649

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Tue, 09 Oct 2018 09:00:11 GMT
server
nginx
etag
W/"5bbc6e1b-a8ec"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
6696
expires
Wed, 17 Oct 2018 12:49:00 GMT
image-gallery-modal-6c21b7dcbf-rev.js
zdnet1.cbsistatic.com/fly/js/components/
5 KB
2 KB
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/components/image-gallery-modal-6c21b7dcbf-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
b34a764a54cd042f769a2e1a002a27c14132167d8ab9967bc49419c87b694d99

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 16:42:34 GMT
server
nginx
etag
W/"5b5f3ffa-1503"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
2003
expires
Wed, 17 Oct 2018 12:49:00 GMT
a-6-cambridge.jpg
zdnet3.cbsistatic.com/hub/i/r/2018/07/24/7846cf7a-419e-4111-8a58-6119d0635e38/thumbnail/170x128/374809ede18d88b93f6aaa16332611b4/
4 KB
4 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/07/24/7846cf7a-419e-4111-8a58-6119d0635e38/thumbnail/170x128/374809ede18d88b93f6aaa16332611b4/a-6-cambridge.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
3abead375bb8d384d18dd455d548fa9d94dfd5a876dd8be9b3a5235c771abfec

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:18 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=25316470
timing-allow-origin
*
content-length
4321
expires
Tue, 30 Jul 2019 13:10:10 GMT
a-7-twitter.jpg
zdnet1.cbsistatic.com/hub/i/r/2018/07/24/43d0ec30-3aa9-4aa6-a680-9d91b6093b8d/thumbnail/170x128/9bd5990d0c901cf70c41161c1762e64b/
6 KB
6 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2018/07/24/43d0ec30-3aa9-4aa6-a680-9d91b6093b8d/thumbnail/170x128/9bd5990d0c901cf70c41161c1762e64b/a-7-twitter.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
31f2502985cd82156618c2842decdd66226091e4f616c8cd3867a9ead2c8a9e3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Fri, 27 Jul 2018 14:03:05 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=25060756
timing-allow-origin
*
content-length
5716
expires
Sat, 27 Jul 2019 14:08:16 GMT
a-8-tmobile.jpg
zdnet2.cbsistatic.com/hub/i/r/2018/07/24/c7a2b93b-8e6f-4c7e-a63c-7b4301d2a618/thumbnail/170x128/0d2049ff0b22993517383a83b1615952/
8 KB
8 KB
Image
General
Full URL
https://zdnet2.cbsistatic.com/hub/i/r/2018/07/24/c7a2b93b-8e6f-4c7e-a63c-7b4301d2a618/thumbnail/170x128/0d2049ff0b22993517383a83b1615952/a-8-tmobile.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
b2816ae41889388360482588c8af317634fce4179e6cfdad21f26e23ab6a9f7e

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:18 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=25316473
timing-allow-origin
*
content-length
7820
expires
Tue, 30 Jul 2019 13:10:13 GMT
b-1-jira.jpg
zdnet4.cbsistatic.com/hub/i/r/2018/07/24/0d4315b4-d3f1-49b0-85f5-b29eeacbd413/thumbnail/170x128/feaaa90fe1d813c719d7f9508ea15efe/
3 KB
4 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/hub/i/r/2018/07/24/0d4315b4-d3f1-49b0-85f5-b29eeacbd413/thumbnail/170x128/feaaa90fe1d813c719d7f9508ea15efe/b-1-jira.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
2dbd42e5d6b936274e0cf1688678f567784f89ae4f350d3eaee2dd6b86f65075

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:18 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=25316381
timing-allow-origin
*
content-length
3425
expires
Tue, 30 Jul 2019 13:08:41 GMT
b-2-raileurope.jpg
zdnet3.cbsistatic.com/hub/i/r/2018/07/24/6f624ea0-dabf-4ae6-a828-b863f83d7f07/thumbnail/170x128/5040b91fae3f612b107fbd27ad2cb882/
7 KB
7 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/07/24/6f624ea0-dabf-4ae6-a828-b863f83d7f07/thumbnail/170x128/5040b91fae3f612b107fbd27ad2cb882/b-2-raileurope.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
35c04e5b7a4044d3d19a6ccd99871a0e7d999570e2c5cfca5c91837e54ebfc9f

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:18 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=25316385
timing-allow-origin
*
content-length
6847
expires
Tue, 30 Jul 2019 13:08:45 GMT
/
www.zdnet.com/newsletter/xhr/widget-login/
2 KB
2 KB
XHR
General
Full URL
https://www.zdnet.com/newsletter/xhr/widget-login/?topic=security
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1497-fly/js/main.default.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
319acc673d1efa63333355a29d8862d45f548c314dd5351b65f32ab2d660de05
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/newsletter/xhr/widget-login/?topic=security
pragma
no-cache
cookie
_ccmsi=1539175739163_xyckedlix|1539175739163; _ccmaid=5978151440201526240; zdnet_ad=%7B%22type%22%3A%22gpt%22%2C%22region%22%3A%22uk%22%2C%22session%22%3A%22d%22%2C%22subSession%22%3A%222%22%7D; first_page_today=false; LDCLGFbrowser=7c6d8adf-70e7-4f33-86a8-6fee7fc90c0a; XCLGFbrowser=KRfWEFu99TvT4Nk+3NM; s_vnum=1541767739602%26vn%3D1; s_invisit=true; s_getNewRepeat=1539175739603-New; s_lv_zdnet=1539175739603; s_lv_zdnet_s=First%20Visit; AMCVS_10D31225525FF5790A490D4D%40AdobeOrg=1; AMCV_10D31225525FF5790A490D4D%40AdobeOrg=-894706358%7CMCMID%7C80823053500865929101904813987310434212%7CMCAAMLH-1539780539%7C6%7CMCAAMB-1539780539%7CRKhpRz8krg2tLO6pguXWp5olkAcUniQYPHaMWWgdJ3xzPWQmdj0y%7CMCOPTOUT-1539182939s%7CNONE%7CMCAID%7C2DDEFA9D85312B44-40000103E0000BB2%7CvVersion%7C2.3.0; s_cc=true; aam_uuid=81058010229352235421889480821828399836; viewGuid=7162bf48-0ccd-4007-b28c-e5153fda4868; utag_main=_sn:1$_ss:0$_st:1539177540140$ses_id:1539175738870%3Bexp-session$_pn:1%3Bexp-session$linktag:undefined%3Bexp-session; RT="sl=1&ss=1539175736302&tt=3863&obo=0&bcn=%2F%2F22ffabbe.akstat.io%2F&sh=1539175740170%3D1%3A0%3A3863&dm=zdnet.com&si=8b5454d7-9766-40fa-b597-187afe316cb3&ld=1539175740170"
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
application/json, text/javascript, */*; q=0.01
cache-control
no-cache
:authority
www.zdnet.com
x-requested-with
XMLHttpRequest
:scheme
https
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
:method
GET
Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Accept-Encoding, User-Agent
content-length
733
x-xss-protection
1; mode=block
pragma
no-cache
referrer-policy
no-referrer-when-downgrade
server
nginx
x-frame-options
SAMEORIGIN
date
Wed, 10 Oct 2018 12:49:00 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-tx-id
f1f5fe5e-66cc-4381-9c06-3e1693db2443
content-type
application/json
access-control-allow-origin
https://www.zdnet.com
cache-control
max-age=0, no-cache, no-store
set-cookie
fly_session=dbip1ubtoev0veoojgjftolp84; path=/; domain=.zdnet.com; secure; HttpOnly fly_device=desktop; expires=Wed, 17-Oct-2018 12:49:00 GMT; path=/; domain=.zdnet.com; secure fly_geo={"countryCode": "de"}; expires=Wed, 17-Oct-2018 12:49:00 GMT; path=/; domain=.zdnet.com; secure fly_preferred_edition=eu; path=/; domain=.zdnet.com; secure fly_default_edition=eu; path=/; domain=.zdnet.com; secure ak_bmsc=FC99A44076F5F3ACE8917C40B53F41680210BAB7BB6E00003CF5BD5BF5176D71~pliASsMmpgZqzqnwuDwiNdQmhD5UFLbOQa+L8vwgnGEUh4HIxHYCz+ieRzH6IHvcR24U2q4tpFuMm1Vp8lpqnxNH2smU58/XnBFW5AS+RKW5X6Py50lotlvfKIFe8y7IP5e4BsPUKN4W5J7xKapnmQYmt0W/4VUHTGP/AmZMi9bhKNyeVSV4rc38r5zrik7NR/5fRDIkiRVYAPM4vNfbjbi8s0RHwWGalWBB1EB9Ff89M=; expires=Wed, 10 Oct 2018 14:49:00 GMT; max-age=7200; path=/; domain=.zdnet.com; HttpOnly
accept-ranges
bytes
expires
Wed, 10 Oct 2018 12:49:00 GMT
front-door-carousel-56427878d9-rev.js
zdnet1.cbsistatic.com/fly/js/components/
5 KB
2 KB
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/components/front-door-carousel-56427878d9-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
5ecc6a93ec2939faa8dbf80084346c7d940f5a2181ee69343810da52902eb92d

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Thu, 16 Aug 2018 13:35:07 GMT
server
nginx
etag
W/"5b757d8b-124a"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
cneonction
close
timing-allow-origin
*
content-length
1564
expires
Wed, 17 Oct 2018 12:49:00 GMT
urban-airship-29ae327ed0-rev.js
zdnet3.cbsistatic.com/fly/js/components/
1 KB
1 KB
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/js/components/urban-airship-29ae327ed0-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
fa33d1db535d783b0baf4e74bdc7ce9e54633f87a03669b2803e567088d64ccb

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Wed, 29 Aug 2018 13:13:23 GMT
server
nginx
etag
W/"5b869bf3-514"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
827
expires
Wed, 17 Oct 2018 12:49:00 GMT
cs.js
sb.scorecardresearch.com/c2/3005086/
0
400 B
Script
General
Full URL
https://sb.scorecardresearch.com/c2/3005086/cs.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1775.js?utv=ut4.43.201809191908
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
172.227.85.103 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a172-227-85-103.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:00 GMT
Content-Encoding
gzip
Last-Modified
Fri, 08 Apr 2011 23:11:26 GMT
ETag
"d41d8cd98f00b204e9800998ecf8427e:1349196464"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=259200
Connection
keep-alive
Content-Length
20
Expires
Sat, 13 Oct 2018 12:49:00 GMT
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=3005086&ns__t=1539175740447&ns_c=UTF-8&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZD...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=3005086&ns__t=1539175740447&ns_c=UTF-8&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20Z...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=3005086&ns__t=1539175740447&ns_c=UTF-8&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c9=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
172.227.85.103 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a172-227-85-103.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:00 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=3005086&ns__t=1539175740447&ns_c=UTF-8&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c9=
Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:00 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
/
zn_3xebfjduss0srw5-cbs.siteintercept.qualtrics.com/WRSiteInterceptEngine/
51 KB
13 KB
Script
General
Full URL
https://zn_3xebfjduss0srw5-cbs.siteintercept.qualtrics.com/WRSiteInterceptEngine/?Q_ZID=ZN_3xeBFJDuSs0SRW5&Q_LOC=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.277.js?utv=ut4.43.201809191908
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.101.171 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-101-171.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
04e7d46ad177b7b15a7a35e790ab1a0ef2c55b96dfb953db195e6676eb1a1b41
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
server
Apache
vary
Accept-Encoding
p3p
CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
status
200
cache-control
public, max-age=60
strict-transport-security
max-age=31536000; includeSubDomains; preload
servershortname
content-type
application/javascript
content-length
12660
expires
Wed, 10 Oct 2018 12:50:00 GMT
m
secure-us.imrworldwide.com/cgi-bin/
44 B
332 B
Image
General
Full URL
https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-304254h&cg=0&cc=1&si=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp=&ts=compact&rnd=1539175740451
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.76.241.29 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-76-241-29.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
5ecb58845a9ac30e4eb4b18eb0e7431ba1fb195ce035309735efaee67421c7a3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 10 Oct 2018 12:49:00 GMT
server
nginx
status
200
access-control-allow-methods
POST, OPTIONS
p3p
P3P policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
access-control-allow-origin
*
cache-control
no-cache
content-type
image/gif
content-length
44
expires
Thu, 01 Dec 1994 16:00:00 GMT
fbevents.js
connect.facebook.net/en_US/
45 KB
14 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
5e4fb5563218c9d2c6548a50764e052853fe611f3bd3e9e6b353c079a16b618f
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
14117
x-xss-protection
0
pragma
public
x-fb-debug
ntkMkKlHeivDHkukKWf1DzQJPmxg8fzxlt3k6PWs67wEiqlfjBTHj4JblfE9noGukl08dX9FO2vqF/vGZ16U3g==
x-frame-options
DENY
date
Wed, 10 Oct 2018 12:49:00 GMT
strict-transport-security
max-age=31536000; preload; includeSubDomains
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
expires
Sat, 01 Jan 2000 00:00:00 GMT
4083-12969.js
www.everestjs.net/dl/4083/
484 B
655 B
Script
General
Full URL
https://www.everestjs.net/dl/4083/4083-12969.js
Requested by
Host: www.everestjs.net
URL: https://www.everestjs.net/static/st.v3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.67.133.222 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-67-133-222.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
1d4d518e1da495fb6d6d8b3d86bba79d7597b61b466e71c45cdb09ed79659c53

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:00 GMT
Content-Encoding
gzip
Last-Modified
Mon, 25 Nov 2013 14:23:10 GMT
Server
Apache
ETag
"4a5a49-1e4-4ec011a776f80"
Vary
Accept-Encoding
Content-Type
text/javascript
Cache-Control
max-age=52166
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
288
Expires
Thu, 11 Oct 2018 03:18:26 GMT
v
pixel.everesttech.net/4083/
128 B
716 B
Image
General
Full URL
https://pixel.everesttech.net/4083/v?ev___loc=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ev___ref=%2F%2F
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_CBC
Server
66.117.28.68 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
bf94db5c7d218f9a2a2edfff6c01bf65f5946a32000cd41835fee5b564efa62f

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:00 GMT
Last-Modified
Wed, 19 Oct 2016 22:11:25 GMT
Server
Apache
ETag
"9c37b1-80-53f3f17013d40"
Vary
Cookie
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Cache-Control
no-cache
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
image/png
Keep-Alive
timeout=15, max=998434
Content-Length
128
1x1
pixel.everesttech.net/
Redirect Chain
  • https://cm.everesttech.net/cm
  • https://cm.g.doubleclick.net/pixel?google_nid=everest&google_cm&google_sc&ev_rs=1&url=/1x1&google_hm=VzczMVBBQUFCYVp0ZUQyQg
  • https://cm.everesttech.net/cm/ax?cookieid=&ev_rs=1&url=/1x1&google_gid=CAESEOHTnlyAk0FrG39EGep1kbg&google_cver=1
  • https://pixel.everesttech.net/1x1
128 B
407 B
Image
General
Full URL
https://pixel.everesttech.net/1x1
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_CBC
Server
66.117.28.68 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
bf94db5c7d218f9a2a2edfff6c01bf65f5946a32000cd41835fee5b564efa62f

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:00 GMT
Last-Modified
Wed, 19 Oct 2016 22:11:25 GMT
Server
Apache
ETag
"4436fc-80-53f3f17013d40"
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=15, max=947228
Content-Length
128

Redirect headers

Date
Wed, 10 Oct 2018 12:49:00 GMT
Server
AMO-cookiemap/1.1
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Location
https://pixel.everesttech.net/1x1
Cache-Control
no-cache
Connection
Keep-Alive
Keep-Alive
timeout=15,max=100
Content-Length
0
headerstats
as-sec.casalemedia.com/
0
337 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=182823&u=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&v=2
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.53.169.164 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-53-169-164.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:00 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Wed, 10 Oct 2018 12:49:00 GMT
advertisement-d41d8cd98f-rev.js
zdnet2.cbsistatic.com/fly/js/utils/
0
178 B
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/js/utils/advertisement-d41d8cd98f-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
last-modified
Fri, 10 Aug 2018 18:33:06 GMT
server
nginx
etag
"5b6dda62-0"
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
0
expires
Wed, 17 Oct 2018 12:49:00 GMT
comscore.streaming.6.1.1.171219.min.js
vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/comscore/
104 KB
19 KB
Script
General
Full URL
https://vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/comscore/comscore.streaming.6.1.1.171219.min.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
081873caa83744b6d819ab294b08927e20b60841dd8f23a87c2a57e15f65591c

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Mon, 26 Mar 2018 15:42:35 GMT
server
Apache
etag
"c3c30c0ebfc35a9426296256fc3133d8:1522078959"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=2592000
accept-ranges
bytes
content-length
18881
expires
Fri, 09 Nov 2018 12:49:00 GMT
adsense.js
asset.pagefair.com/adimages/
0
378 B
Script
General
Full URL
https://asset.pagefair.com/adimages/adsense.js
Requested by
Host: asset.pagefair.com
URL: https://asset.pagefair.com/measure.min.js?_=1539175740077
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
94.31.29.248 , United Kingdom, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
94.31.29.248.IPYX-077437-ZYO.above.net
Software
NetDNA-cache/2.2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Fri, 09 Mar 2018 17:19:01 GMT
server
NetDNA-cache/2.2
x-amz-request-id
330B0BCBC6696909
etag
"8193452d6ae440ec23eff2e1559d5461"
x-cache
HIT
content-type
application/x-javascript
status
200
cache-control
max-age=86400
accept-ranges
bytes
content-length
31
x-amz-id-2
AunVNMKj+ZLeWYUNleCD9S6gaxmt07KfUJ7J033nQW8OSy97sqGJmTWEKsJQ7Qw/6tR012E0lAM=
expires
Thu, 11 Oct 2018 12:49:00 GMT
textlink-ads.jpg
asset.pagefair.net/adimages/
518 B
539 B
Image
General
Full URL
https://asset.pagefair.net/adimages/textlink-ads.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
94.31.29.96 , United Kingdom, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
94.31.29.96.IPYX-077437-ZYO.above.net
Software
NetDNA-cache/2.2 /
Resource Hash
87bc265dda5e31597442c420def76eeadb5c516d016213a47f570c65d5558b72

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Fri, 09 Mar 2018 17:19:02 GMT
server
NetDNA-cache/2.2
x-amz-request-id
E44A230D2F8ECFF0
etag
"262857636d8f02be18171bed8e10c82b"
x-cache
HIT
content-type
image/jpeg
status
200
cache-control
max-age=2592000
accept-ranges
bytes
content-length
229
x-amz-id-2
wsvwxTYmjF0JOMQl45wQOmhCh1Y1AIctaE+ajagOC2HdZdnUhC0qH1yqDHj0dcSFNr8zgibNiiQ=
textlink-ads.jpg
asset.pagefair.com/adimages/
518 B
567 B
Image
General
Full URL
https://asset.pagefair.com/adimages/textlink-ads.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
94.31.29.248 , United Kingdom, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
94.31.29.248.IPYX-077437-ZYO.above.net
Software
NetDNA-cache/2.2 /
Resource Hash
87bc265dda5e31597442c420def76eeadb5c516d016213a47f570c65d5558b72

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Fri, 09 Mar 2018 17:19:02 GMT
server
NetDNA-cache/2.2
x-amz-request-id
90B08B048B6AD730
etag
"262857636d8f02be18171bed8e10c82b"
x-cache
HIT
content-type
image/jpeg
status
200
cache-control
max-age=86400
accept-ranges
bytes
content-length
229
x-amz-id-2
17VbBv+Yr7f0LLY1It3a17QO+ckaVYYsoBnd04Fg8E7/sw7rz4oViq5MSjo1g+Dm1GLPqbBBVw8=
expires
Thu, 11 Oct 2018 12:49:00 GMT
fly-disqus-count-1f604770a3-rev.js
zdnet2.cbsistatic.com/fly/js/components/
882 B
671 B
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/js/components/fly-disqus-count-1f604770a3-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
b2ab8784d5ca4bc5e4e1990ba55c6d9f041b8fe8cf41ad9afa37bc1c3dd12756

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Fri, 25 May 2018 17:24:03 GMT
server
nginx
etag
"5b0846b3-372"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
460
expires
Wed, 17 Oct 2018 12:49:00 GMT
ua-sdk.min.js
web-sdk.urbanairship.com/notify/v1/
78 KB
17 KB
Script
General
Full URL
https://web-sdk.urbanairship.com/notify/v1/ua-sdk.min.js
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/js/components/urban-airship-29ae327ed0-rev.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:19d::e3d , European Union, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
UploadServer /
Resource Hash
1ff53412e0f7149ee0e54173d5681958ad656643e3213acdd588941c89642f9e

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
x-goog-meta-goog-reserved-file-mtime
1538677181
x-guploader-uploadid
AEnB2UqqNR4wk19g2tb73nuacsujibGNsep56eyKg2AAQHmN9zM-JuHosoBENlEbE24CHAOLBA7mSn6E37SJiiFRs5XWCq1sUA
x-goog-storage-class
MULTI_REGIONAL
status
200
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-length
16960
last-modified
Thu, 04 Oct 2018 18:57:14 GMT
server
UploadServer
etag
"66b301ea9923f38e2300df3d9e6b1156"
vary
Accept-Encoding
x-goog-hash
crc32c=1WWWOQ==, md5=ZrMB6pkj844jAN89nmsRVg==
x-goog-generation
1538679434316060
cache-control
public, max-age=300
x-goog-stored-content-length
79839
accept-ranges
bytes
content-type
application/x-javascript
expires
Wed, 10 Oct 2018 12:54:00 GMT
309391486091569
connect.facebook.net/signals/config/
88 KB
17 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/309391486091569?v=2.8.30&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
12e811cf604a5514565cf394ca1af4422204f1c766f58898cf4cd35d5ec1d9ac
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
17780
x-xss-protection
0
pragma
public
x-fb-debug
EpNqVDoGEbKxOvmEZ/ADiACRCLX7reE5y4QI9hZs9VOGBFwixyRhFp/ZzK6XpoBwTfXxD5LavSFU0SKvGgTehQ==
x-frame-options
DENY
date
Wed, 10 Oct 2018 12:49:00 GMT
strict-transport-security
max-age=31536000; preload; includeSubDomains
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
expires
Sat, 01 Jan 2000 00:00:00 GMT
/
www.google.de/pagead/1p-user-list/1036174608/
Redirect Chain
  • https://www.googleadservices.com/pagead/conversion/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&amp;guid=ON&amp;script=0
  • https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&amp;guid=ON&amp;script=0&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&ocp_id=PPW9W_P4IY_b7g...
  • https://www.google.com/pagead/1p-user-list/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&random=2140728472&crd=CKrPGwiE0Bs&cdct=2&is_vtc=1&random=3194097376
  • https://www.google.de/pagead/1p-user-list/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&random=2140728472&crd=CKrPGwiE0Bs&cdct=2&is_vtc=1&random=3194097376&i...
42 B
109 B
Image
General
Full URL
https://www.google.de/pagead/1p-user-list/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&random=2140728472&crd=CKrPGwiE0Bs&cdct=2&is_vtc=1&random=3194097376&ipr=y
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:806::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 10 Oct 2018 12:49:00 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 10 Oct 2018 12:49:00 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
image/gif
location
https://www.google.de/pagead/1p-user-list/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&random=2140728472&crd=CKrPGwiE0Bs&cdct=2&is_vtc=1&random=3194097376&ipr=y
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel
ad.yieldmanager.com/
0
1 KB
Image
General
Full URL
https://ad.yieldmanager.com/pixel?id=2447099&t=2
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1288:110:422::3000 , United Kingdom, ASN34010 (YAHOO-IRD, GB),
Reverse DNS
Software
ATS /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:00 GMT
X-Content-Type-Options
nosniff
Server
ATS
Age
0
Expect-CT
max-age=31536000, report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only"
Strict-Transport-Security
max-age=31536000
Public-Key-Pins-Report-Only
max-age=2592000; pin-sha256="2fRAUXyxl4A1/XHrKNBmc8bTkzA7y4FB/GLJuNAzCqY="; pin-sha256="I/Lt/z7ekCWanjD0Cvj5EqXls2lOaThEA0H2Bg4BT/o="; pin-sha256="K87oWBWM9UZfyddvDfoxL+8lpNyoUB2ptGtn0fv6G2Q="; pin-sha256="Wd8xe/qfTwq3ylFNd3IpaqLHZbh2ZNCLluVzmeNkcpw="; pin-sha256="WoiWRyIOVNa9ihaBciRSC7XHjliYS9VwUGOIud4PB18="; pin-sha256="cGuxAXyFXFkWm61cF4HPWX8S0srS9j0aSqN0k4AP+4A="; pin-sha256="dolnbtzEBnELx/9lOEQ22e6OZO/QNb6VSSX2XHA3E7A="; pin-sha256="i7WTqTvh0OioIruIfFR4kMPnBqrS2rdiVPl/s2uC/CY="; pin-sha256="r/mIkG3eEpVdm+u/ko/cwxzOMo1bk4TyHIlByibiA5E="; pin-sha256="uUwZgwDOxcBXrQcntwu+kYFpkiVkOaezL0WYEZ3anJc="; includeSubdomains; report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-hpkp-report-only"
Connection
keep-alive
Content-Length
0
X-XSS-Protection
1; mode=block
s
pixel.everesttech.net/4083/
128 B
716 B
Image
General
Full URL
https://pixel.everesttech.net/4083/s?s=12969
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_CBC
Server
66.117.28.68 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
bf94db5c7d218f9a2a2edfff6c01bf65f5946a32000cd41835fee5b564efa62f

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:00 GMT
Last-Modified
Wed, 19 Oct 2016 22:11:25 GMT
Server
Apache
ETag
"9c37b1-80-53f3f17013d40"
Vary
Cookie
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Cache-Control
no-cache
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
image/png
Keep-Alive
timeout=15, max=997518
Content-Length
128
ima3.js
s0.2mdn.net/instream/html5/
230 KB
79 KB
Script
General
Full URL
https://s0.2mdn.net/instream/html5/ima3.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.217.22.102 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s18-in-f102.1e100.net
Software
sffe /
Resource Hash
2733ab2f6e89790cd3e5bd7713164c8cf1bc46eeff0a37bdfb8f3b174980cc1f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
81114
x-xss-protection
1; mode=block
expires
Wed, 10 Oct 2018 12:49:00 GMT
config.json
c.go-mpulse.net/api/v2/
2 KB
1 KB
XHR
General
Full URL
https://c.go-mpulse.net/api/v2/config.json?key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&t=1539175740554&s=3d6401c4420d8a5406a012b359ee259f886b8f82bebeb11d442d0f7c8bf791ce
Requested by
Host: zdnet1.cbsistatic.com
URL: https://zdnet1.cbsistatic.com/fly/js/libs/mpulse-1.0.2.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.60.198.210 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-60-198-210.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b25aba3a1f58d22a338f7e7feb89930974e8c168d34e25f96dc278570a7657a5

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com

Response headers

Date
Wed, 10 Oct 2018 12:49:00 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
private, max-age=300, stale-while-revalidate=60, stale-if-error=120
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
719
a.js
stats.pagefair.com/stats/page_view_event/3393B7A52D1447DD/
25 B
723 B
XHR
General
Full URL
https://stats.pagefair.com/stats/page_view_event/3393B7A52D1447DD/a.js?wl_div_hid_t0=0&div_hid_t0=0&s_blk=0&wl_i_blk=0&i_blk=0&is_ab=0&is_wl=1&new_monthly=1&new_daily=1&_=1539175740624
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1497-fly/js/main.default.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.93.90 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-93-90.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
2671d72b96d6d9a1b8bbc1429048505ea6dbc3514daf22ab6dd6dfc8a70ce8d3

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:35 GMT
Server
nginx
Access-Control-Allow-Methods
GET, POST, OPTIONS
P3P
CP="NID DSP ALL COR"
Access-Control-Allow-Origin
https://www.zdnet.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/javascript
Access-Control-Allow-Headers
Authorization,Content-Type,Accept,Origin,User-Agent,Cache-Control,Keep-Alive,X-Requested-With,If-Modified-Since,X-CSRF-TOKEN
Content-Length
25
count.js
zdnet-1.disqus.com/
1 KB
1 KB
Script
General
Full URL
https://zdnet-1.disqus.com/count.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.120.134 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
3487ef2baf0c08ba660a8a143cdeb8ebeec961eea04bccd7c49096b4eb26b875
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:01 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Age
363919
P3P
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
871
X-XSS-Protection
1; mode=block
Last-Modified
Thu, 04 Oct 2018 19:13:56 GMT
Server
nginx
ETag
"5bb66674-367"
Strict-Transport-Security
max-age=300; includeSubdomains
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, max-age=86400
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
/
www.facebook.com/tr/
44 B
245 B
Image
General
Full URL
https://www.facebook.com/tr/?id=309391486091569&ev=PageView&dl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&rl=&if=false&ts=1539175740634&sw=1600&sh=1200&v=2.8.30&r=stable&a=tmtealium&ec=0&o=28&it=1539175740549&coo=false
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a03:2880:f11c:8083:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Wed, 10 Oct 2018 12:49:00 GMT
/
22ffabbe.akstat.io/
0
354 B
Other
General
Full URL
https://22ffabbe.akstat.io/
Requested by
Host: c.go-mpulse.net
URL: https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
184.30.223.226 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-223-226.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:00 GMT
Content-Type
image/gif
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
X-XSS-Protection
0
Expires
Wed, 10 Oct 2018 12:49:00 GMT
mux.js
vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/
70 KB
22 KB
Script
General
Full URL
https://vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/mux.js
Requested by
Host: vidtech.cbsinteractive.com
URL: https://vidtech.cbsinteractive.com/uvpjs/2.8.3/CBSI-PLAYER.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
3ae5d0f70dfeb1308462aaaa19d8326a6bd2d41781323b07db04cccffc09cf5f

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Mon, 26 Mar 2018 15:42:36 GMT
server
Apache
etag
"6ff5de35d5b5d1d667e341d5109a9c19:1522078959"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=2592000
accept-ranges
bytes
content-length
21978
expires
Fri, 09 Nov 2018 12:49:00 GMT
ggcmb510.js
cdn-gl.imrworldwide.com/novms/js/2/
12 KB
5 KB
Script
General
Full URL
https://cdn-gl.imrworldwide.com/novms/js/2/ggcmb510.js
Requested by
Host: vidtech.cbsinteractive.com
URL: https://vidtech.cbsinteractive.com/uvpjs/2.8.3/CBSI-PLAYER.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.19 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-19.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
f68ec7cf550e86cb14e4d992724157c4f625ea3f0cd7d06e9e533c17c735401d

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 04 Oct 2018 18:49:04 GMT
Content-Encoding
gzip
Last-Modified
Wed, 03 Oct 2018 17:26:15 GMT
Server
AmazonS3
Age
64796
x-amz-server-side-encryption
AES256
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
x-amz-version-id
DqBXYNAeWk9c9ecQe6fCjbgUkjUpFyFY
Via
1.1 0d37b2e69745cd9f0c5457fbf1a83129.cloudfront.net (CloudFront)
Cache-Control
max-age=86400
Transfer-Encoding
chunked
Connection
keep-alive
Content-Type
application/javascript
X-Amz-Cf-Id
vE9hgY1efW-M-QhPXvoaLeUk8WHxqUMJuTL26yVrA9xQfQbyw44I1Q==
AppMeasurement-2.3.0.min.js
vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/adobe/
77 KB
27 KB
Script
General
Full URL
https://vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/adobe/AppMeasurement-2.3.0.min.js
Requested by
Host: vidtech.cbsinteractive.com
URL: https://vidtech.cbsinteractive.com/uvpjs/2.8.3/CBSI-PLAYER.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
4974c54f5183f50fd1f3c3d49c496fd79602f8159b6d393d3fab09e4433555dd

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Mon, 26 Mar 2018 15:42:35 GMT
server
Apache
etag
"d71ba6c9a930b6864408830c3e2705f9:1522078958"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=2592000
accept-ranges
bytes
content-length
27260
expires
Fri, 09 Nov 2018 12:49:00 GMT
VideoHeartbeat-2.0.2.min.js
vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/adobe/
143 KB
29 KB
Script
General
Full URL
https://vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/adobe/VideoHeartbeat-2.0.2.min.js
Requested by
Host: vidtech.cbsinteractive.com
URL: https://vidtech.cbsinteractive.com/uvpjs/2.8.3/CBSI-PLAYER.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e08209b44a15fd9f6b9977d2580034e8d3da36542235802c2722ff8db4c0a461

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Mon, 26 Mar 2018 15:42:35 GMT
server
Apache
etag
"215943f0e77b4fcc9cc72b98a8ea1cfc:1522078958"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=2592000
accept-ranges
bytes
content-length
28977
expires
Fri, 09 Nov 2018 12:49:00 GMT
truncated
/
2 KB
0
Media
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7e9696aabfbb60803028b14636581f459404cea187d0c0c50b7d4d5cf8e1a3b1

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
video/mp4
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
glcfg510.js
cdn-gl.imrworldwide.com/novms/js/2/configs/
2 KB
1 KB
Script
General
Full URL
https://cdn-gl.imrworldwide.com/novms/js/2/configs/glcfg510.js
Requested by
Host: cdn-gl.imrworldwide.com
URL: https://cdn-gl.imrworldwide.com/novms/js/2/ggcmb510.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.19 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-19.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
acf3b5b3ade1391096f23120b725a032dce430448ba8aff2a6f0c3f9c598b2a3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 04 Oct 2018 18:49:04 GMT
Content-Encoding
gzip
Last-Modified
Wed, 03 Oct 2018 17:26:15 GMT
Server
AmazonS3
Age
64795
x-amz-server-side-encryption
AES256
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
x-amz-version-id
l2xJuxUC0tglEkdOi9HXoncecbKiMqKp
Via
1.1 0d37b2e69745cd9f0c5457fbf1a83129.cloudfront.net (CloudFront)
Cache-Control
max-age=86400
Transfer-Encoding
chunked
Connection
keep-alive
Content-Type
application/javascript
X-Amz-Cf-Id
cBirvHD5dt6wg2NkPtoUKPjbd-DoVzy9InIwg5oe_ZHYJ2hAd7GlAw==
id
dpm.demdex.net/
2 KB
1 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=2.3.0&d_fieldgroup=AAM&d_rtbd=json&d_ver=2&d_orgid=10D31225525FF5790A490D4D%40AdobeOrg&d_nsid=0&d_mid=80823053500865929101904813987310434212&d_blob=RKhpRz8krg2tLO6pguXWp5olkAcUniQYPHaMWWgdJ3xzPWQmdj0y&d_cid_ic=AVID%012DDEFA9D85312B44-40000103E0000BB2&d_cid_ic=userId%01&d_cid_ic=puuid%01&ts=1539175740817
Requested by
Host: vidtech.cbsinteractive.com
URL: https://vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/adobe/AppMeasurement-2.3.0.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.86.186 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-86-186.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ae018345fc970863ca42ade1fd94e08a594d2a17e2ed0053751e6b16e7829c69

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v005-0fdff9abb.edge-irl1.demdex.com 5.40.0.20180927094806 10ms
Pragma
no-cache
Content-Encoding
gzip
X-Error
300,300
X-TID
vRN9/MYfQIU=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
701
Expires
Thu, 01 Jan 1970 00:00:00 GMT
bridge3.242.3_en.html
imasdk.googleapis.com/js/core/ Frame 0B3E
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.242.3_en.html
Requested by
Host: s0.2mdn.net
URL: https://s0.2mdn.net/instream/html5/ima3.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81d::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.242.3_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
170620
date
Fri, 05 Oct 2018 23:20:35 GMT
expires
Sat, 05 Oct 2019 23:20:35 GMT
last-modified
Fri, 05 Oct 2018 23:15:41 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
1; mode=block
cache-control
public, max-age=31536000
age
394105
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
client.js
s0.2mdn.net/instream/video/
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: s0.2mdn.net
URL: https://s0.2mdn.net/instream/html5/ima3.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.217.22.102 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s18-in-f102.1e100.net
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
10523
x-xss-protection
1; mode=block
expires
Wed, 10 Oct 2018 12:49:00 GMT
/
www.zdnet.com/m3d0s1/xhr/right-rail/
9 KB
2 KB
XHR
General
Full URL
https://www.zdnet.com/m3d0s1/xhr/right-rail/?promo=2150&count=3&siteId=2&rsid=cnetzdnetglobalsite&sl=en&sc=&pagetype=article&topicname=security&secondarytopicnames=internet+of+things&topicbrcrm=editorial&assetguid=7a12161d-2a5f-4793-b0a4-9fac038733de&assettitle=gigantic+100%2C000-strong+botnet+used+to+hijack+traffic+meant+for+brazilian+banks&assettype=content_article&devicetype=desktop&viewguid=7162bf48-0ccd-4007-b28c-e5153fda4868&upId=727204059&template=right-rail
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1497-fly/js/main.default.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
090721b029cc51504771ac6c017d5cb2d0d2904820ad90680bf71dd36de96308
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/m3d0s1/xhr/right-rail/?promo=2150&count=3&siteId=2&rsid=cnetzdnetglobalsite&sl=en&sc=&pagetype=article&topicname=security&secondarytopicnames=internet+of+things&topicbrcrm=editorial&assetguid=7a12161d-2a5f-4793-b0a4-9fac038733de&assettitle=gigantic+100%2C000-strong+botnet+used+to+hijack+traffic+meant+for+brazilian+banks&assettype=content_article&devicetype=desktop&viewguid=7162bf48-0ccd-4007-b28c-e5153fda4868&upId=727204059&template=right-rail
pragma
no-cache
cookie
_ccmsi=1539175739163_xyckedlix|1539175739163; _ccmaid=5978151440201526240; zdnet_ad=%7B%22type%22%3A%22gpt%22%2C%22region%22%3A%22uk%22%2C%22session%22%3A%22d%22%2C%22subSession%22%3A%222%22%7D; first_page_today=false; LDCLGFbrowser=7c6d8adf-70e7-4f33-86a8-6fee7fc90c0a; XCLGFbrowser=KRfWEFu99TvT4Nk+3NM; s_vnum=1541767739602%26vn%3D1; s_invisit=true; s_getNewRepeat=1539175739603-New; s_lv_zdnet=1539175739603; s_lv_zdnet_s=First%20Visit; AMCVS_10D31225525FF5790A490D4D%40AdobeOrg=1; AMCV_10D31225525FF5790A490D4D%40AdobeOrg=-894706358%7CMCMID%7C80823053500865929101904813987310434212%7CMCAAMLH-1539780539%7C6%7CMCAAMB-1539780539%7CRKhpRz8krg2tLO6pguXWp5olkAcUniQYPHaMWWgdJ3xzPWQmdj0y%7CMCOPTOUT-1539182939s%7CNONE%7CMCAID%7C2DDEFA9D85312B44-40000103E0000BB2%7CvVersion%7C2.3.0; s_cc=true; aam_uuid=81058010229352235421889480821828399836; viewGuid=7162bf48-0ccd-4007-b28c-e5153fda4868; utag_main=_sn:1$_ss:0$_st:1539177540140$ses_id:1539175738870%3Bexp-session$_pn:1%3Bexp-session$linktag:undefined%3Bexp-session; RT="sl=1&ss=1539175736302&tt=3863&obo=0&bcn=%2F%2F22ffabbe.akstat.io%2F&sh=1539175740170%3D1%3A0%3A3863&dm=zdnet.com&si=8b5454d7-9766-40fa-b597-187afe316cb3&ld=1539175740170"; fly_device=desktop; fly_geo={"countryCode": "de"}; fly_preferred_edition=eu; fly_default_edition=eu; bm_last_load_status=NOT_BLOCKING; bm_monthly_unique=true; bm_daily_unique=true; fly_session=dbip1ubtoev0veoojgjftolp84; ak_bmsc=FC99A44076F5F3ACE8917C40B53F41680210BAB7BB6E00003CF5BD5BF5176D71~pliASsMmpgZqzqnwuDwiNdQmhD5UFLbOQa+L8vwgnGEUh4HIxHYCz+ieRzH6IHvcR24U2q4tpFuMm1Vp8lpqnxNH2smU58/XnBFW5AS+RKW5X6Py50lotlvfKIFe8y7IP5e4BsPUKN4W5J7xKapnmQYmt0W/4VUHTGP/AmZMi9bhKNyeVSV4rc38r5zrik7NR/5fRDIkiRVYAPM4vNfbjbi8s0RHwWGalWBB1EB9Ff89M=; bm_sample_frequency=100; upid_727204059=1
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
application/json, text/javascript, */*; q=0.01
cache-control
no-cache
:authority
www.zdnet.com
x-requested-with
XMLHttpRequest
:scheme
https
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
:method
GET
Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Accept-Encoding, User-Agent
content-length
1601
x-xss-protection
1; mode=block
pragma
no-cache
referrer-policy
no-referrer-when-downgrade
server
nginx
x-frame-options
SAMEORIGIN
date
Wed, 10 Oct 2018 12:49:01 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-tx-id
a9fc0aea-8c21-4be6-9f3c-69b0737863a8
content-type
application/json
access-control-allow-origin
https://www.zdnet.com
cache-control
max-age=0, no-cache, no-store
set-cookie
bm_sv=108BD60CF3991E90EC4B1C831A26E42F~fm0H00WNqHWzfkb6zylWTbxV21aN6pms7BflgPOACM472xbE4A238TDrj8rap55h3Y5nyOHUGD5zsIzg44A8nqOVB05bgeeC8UQyDizcsAc87ZX1JyXPJeOfe1VF2gjmyKWU1CW9xwM66tJQtFiUp721Lu+14rjmn+9DVME25Kw=; Domain=.zdnet.com; Path=/; Max-Age=7199; HttpOnly
accept-ranges
bytes
expires
Wed, 10 Oct 2018 12:49:01 GMT
default-se4908240cd.png
zdnet4.cbsistatic.com/fly/images/sprites/video/controls/1x/
8 KB
8 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/fly/images/sprites/video/controls/1x/default-se4908240cd.png
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1497-fly/js/main.default.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
de4b8c1882f3c5f3e8d7ed920d1f4f31865ee05228fa7c60800656f3b279287d

Request headers

Referer
https://zdnet2.cbsistatic.com/fly/css/video/htmlPlayerControls/controls-b0b722187e-rev.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:00 GMT
content-encoding
gzip
last-modified
Wed, 20 Jun 2018 17:00:35 GMT
server
nginx
etag
W/"5b2a8833-1e14"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
7728
expires
Wed, 17 Oct 2018 12:49:00 GMT
/
www.zdnet.com/video/selector/andromeda-botnet-malware-is-still-an-infection-issue/
3 KB
2 KB
XHR
General
Full URL
https://www.zdnet.com/video/selector/andromeda-botnet-malware-is-still-an-infection-issue/?acp=sz%3D640x483%26iu%3D%2F8264%2Fvaw-zdnet%2Fdesktop%2Fzdnet%26ciu_szs%3D300x60%26impl%3Ds%26gdfp_req%3D1%26env%3Dvp%26output%3Dxml_vmap1%26unviewed_position_start%3D1%26url%3Dhttps%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F%26description_url%3Dhttps%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F%26correlator%3D1539175740891%26cmsid%3D2289%26vid%3DWXE3_slFKFdtChIY_WrGbURUW8jGB7YM%26pp%3Dvpaid_js%26cust_params%3Dvid%253DWXE3_slFKFdtChIY_WrGbURUW8jGB7YM%2526ptype%253Darticle%2526vguid%253D7162bf48-0ccd-4007-b28c-e5153fda4868%2526session%253Dd%2526subses%253D2%2526microsite%253D%2526campaign%253D%2526cid%253Dgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2526collection%253D%2526mfr%253D%2526carrier%253D%2526section%253Deditorial%2526userGroup%253D%2526tag%253D%2526edition%253D%2526test%253D%2526score%253D%2526feat%253D%2526subcollection%253D%2526topic%253Dsecurity%2526sectopic%253D&m=%2Fvideo%2Fmanifest%2Fandromeda-botnet-malware-is-still-an-infection-issue.m3u8%3Fdevice%3Dott%26change-to-host%3Dtechrepublicmedia.akamaized.net%26secure%3Dtrue&callback=uvpHandleJsonpResult
Requested by
Host: vidtech.cbsinteractive.com
URL: https://vidtech.cbsinteractive.com/uvpjs/2.8.3/CBSI-PLAYER.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
6e7072db4e7d62e039c06d6adcd8416be54467696ebb69c1f177f4f14c47f5c2
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/video/selector/andromeda-botnet-malware-is-still-an-infection-issue/?acp=sz%3D640x483%26iu%3D%2F8264%2Fvaw-zdnet%2Fdesktop%2Fzdnet%26ciu_szs%3D300x60%26impl%3Ds%26gdfp_req%3D1%26env%3Dvp%26output%3Dxml_vmap1%26unviewed_position_start%3D1%26url%3Dhttps%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F%26description_url%3Dhttps%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F%26correlator%3D1539175740891%26cmsid%3D2289%26vid%3DWXE3_slFKFdtChIY_WrGbURUW8jGB7YM%26pp%3Dvpaid_js%26cust_params%3Dvid%253DWXE3_slFKFdtChIY_WrGbURUW8jGB7YM%2526ptype%253Darticle%2526vguid%253D7162bf48-0ccd-4007-b28c-e5153fda4868%2526session%253Dd%2526subses%253D2%2526microsite%253D%2526campaign%253D%2526cid%253Dgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2526collection%253D%2526mfr%253D%2526carrier%253D%2526section%253Deditorial%2526userGroup%253D%2526tag%253D%2526edition%253D%2526test%253D%2526score%253D%2526feat%253D%2526subcollection%253D%2526topic%253Dsecurity%2526sectopic%253D&m=%2Fvideo%2Fmanifest%2Fandromeda-botnet-malware-is-still-an-infection-issue.m3u8%3Fdevice%3Dott%26change-to-host%3Dtechrepublicmedia.akamaized.net%26secure%3Dtrue&callback=uvpHandleJsonpResult
pragma
no-cache
cookie
_ccmsi=1539175739163_xyckedlix|1539175739163; _ccmaid=5978151440201526240; zdnet_ad=%7B%22type%22%3A%22gpt%22%2C%22region%22%3A%22uk%22%2C%22session%22%3A%22d%22%2C%22subSession%22%3A%222%22%7D; first_page_today=false; LDCLGFbrowser=7c6d8adf-70e7-4f33-86a8-6fee7fc90c0a; XCLGFbrowser=KRfWEFu99TvT4Nk+3NM; s_vnum=1541767739602%26vn%3D1; s_invisit=true; s_getNewRepeat=1539175739603-New; s_lv_zdnet=1539175739603; s_lv_zdnet_s=First%20Visit; AMCVS_10D31225525FF5790A490D4D%40AdobeOrg=1; AMCV_10D31225525FF5790A490D4D%40AdobeOrg=-894706358%7CMCMID%7C80823053500865929101904813987310434212%7CMCAAMLH-1539780539%7C6%7CMCAAMB-1539780539%7CRKhpRz8krg2tLO6pguXWp5olkAcUniQYPHaMWWgdJ3xzPWQmdj0y%7CMCOPTOUT-1539182939s%7CNONE%7CMCAID%7C2DDEFA9D85312B44-40000103E0000BB2%7CvVersion%7C2.3.0; s_cc=true; aam_uuid=81058010229352235421889480821828399836; viewGuid=7162bf48-0ccd-4007-b28c-e5153fda4868; utag_main=_sn:1$_ss:0$_st:1539177540140$ses_id:1539175738870%3Bexp-session$_pn:1%3Bexp-session$linktag:undefined%3Bexp-session; RT="sl=1&ss=1539175736302&tt=3863&obo=0&bcn=%2F%2F22ffabbe.akstat.io%2F&sh=1539175740170%3D1%3A0%3A3863&dm=zdnet.com&si=8b5454d7-9766-40fa-b597-187afe316cb3&ld=1539175740170"; fly_device=desktop; fly_geo={"countryCode": "de"}; fly_preferred_edition=eu; fly_default_edition=eu; bm_last_load_status=NOT_BLOCKING; bm_monthly_unique=true; bm_daily_unique=true; fly_session=dbip1ubtoev0veoojgjftolp84; ak_bmsc=FC99A44076F5F3ACE8917C40B53F41680210BAB7BB6E00003CF5BD5BF5176D71~pliASsMmpgZqzqnwuDwiNdQmhD5UFLbOQa+L8vwgnGEUh4HIxHYCz+ieRzH6IHvcR24U2q4tpFuMm1Vp8lpqnxNH2smU58/XnBFW5AS+RKW5X6Py50lotlvfKIFe8y7IP5e4BsPUKN4W5J7xKapnmQYmt0W/4VUHTGP/AmZMi9bhKNyeVSV4rc38r5zrik7NR/5fRDIkiRVYAPM4vNfbjbi8s0RHwWGalWBB1EB9Ff89M=; bm_sample_frequency=100; upid_727204059=1; zdnetSettingsPermanent=%7B%22autoplayEnabled%22%3A%22on%22%7D
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.zdnet.com
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
:scheme
https
:method
GET
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Accept-Encoding, User-Agent
content-length
1011
x-xss-protection
1; mode=block
pragma
no-cache
referrer-policy
no-referrer-when-downgrade
server
nginx
x-frame-options
SAMEORIGIN
date
Wed, 10 Oct 2018 12:49:01 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-tx-id
84bfba13-28aa-4b82-ab9b-54a6473c7341
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
cache-control
max-age=0, no-cache, no-store
set-cookie
bm_sv=3D9402E09EE3C8E6F4A38E7FDBBE8775~fm0H00WNqHWzfkb6zylWTXGJAqZW0UR35HNrQR6dKcvOVbxv3XySs4mDUbAlfx+J9isR6dBBU7oU4eh7ZSeMbFmdhhxRnwfTcWuP7PaAphEQ3AiU3Sv/HY0OxbBgNQJp+C5k+AgOOi7tMbslfmPovLMNY3v9zKxuW7lyEKutx2k=; Domain=.zdnet.com; Path=/; Max-Age=7199; HttpOnly
accept-ranges
bytes
expires
Wed, 10 Oct 2018 12:49:01 GMT
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/ Frame DEDB
74 KB
27 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81d::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e195ed8d9e79ce4d32ac163cb8e9101fcc6bea6a812a30d58a6d73515ddd3329
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 08 Oct 2018 13:12:18 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
171403
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27477
x-xss-protection
1; mode=block
server
cafe
etag
1272360511746383795
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Mon, 22 Oct 2018 13:12:18 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame DEDB
282 KB
87 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_263.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
3c8d46ce7a439b972f3f0a6e442465ba93031aa02cbdf1ad2d620b70234be45a

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:01 GMT
Content-Encoding
gzip
Last-Modified
Thu, 13 Sep 2018 20:59:52 GMT
Server
AmazonS3
x-amz-request-id
25D6AC8AA22D4A26
ETag
"1adf55d105640034a34014345c541efc"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=50233
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88359
x-amz-id-2
XgrK90nFu+RTGPmnsbtpaMjO0xIuzs8X3D7CVFzI25+zRLJg+UsPX9huUfAb0h3qu/C4frICOsI=
osd.js
pagead2.googlesyndication.com/pagead/
73 KB
26 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/osd.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_263.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:821::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
fdfc01efb2956b260c841eadb2948b85dda3184d9a933541e933e70ed188817a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:22:25 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1596
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27010
x-xss-protection
1; mode=block
server
cafe
etag
4497184731343855560
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=3600
timing-allow-origin
*
expires
Wed, 10 Oct 2018 13:22:25 GMT
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/ Frame 0384
74 KB
27 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81d::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e195ed8d9e79ce4d32ac163cb8e9101fcc6bea6a812a30d58a6d73515ddd3329
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 08 Oct 2018 13:12:18 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
171403
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27477
x-xss-protection
1; mode=block
server
cafe
etag
1272360511746383795
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Mon, 22 Oct 2018 13:12:18 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame 0384
282 KB
87 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_263.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
3c8d46ce7a439b972f3f0a6e442465ba93031aa02cbdf1ad2d620b70234be45a

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:01 GMT
Content-Encoding
gzip
Last-Modified
Thu, 13 Sep 2018 20:59:52 GMT
Server
AmazonS3
x-amz-request-id
25D6AC8AA22D4A26
ETag
"1adf55d105640034a34014345c541efc"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=50233
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88359
x-amz-id-2
XgrK90nFu+RTGPmnsbtpaMjO0xIuzs8X3D7CVFzI25+zRLJg+UsPX9huUfAb0h3qu/C4frICOsI=
9818.js
ads.rubiconproject.com/ad/ Frame F33E
26 KB
8 KB
Script
General
Full URL
https://ads.rubiconproject.com/ad/9818.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.94.183.192 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-94-183-192.deploy.static.akamaitechnologies.com
Software
Apache / PHP/5.3.3
Resource Hash
d02197080b9680999381b5f5337fedd92674e5a1550ddfcc0c70612d3170a5e3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:01 GMT
Content-Encoding
gzip
Server
Apache
X-Powered-By
PHP/5.3.3
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=13761
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
7558
Expires
Wed, 10 Oct 2018 16:38:22 GMT
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/ Frame F33E
74 KB
27 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81d::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e195ed8d9e79ce4d32ac163cb8e9101fcc6bea6a812a30d58a6d73515ddd3329
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 08 Oct 2018 13:12:18 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
171403
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27477
x-xss-protection
1; mode=block
server
cafe
etag
1272360511746383795
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Mon, 22 Oct 2018 13:12:18 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame F33E
282 KB
87 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_263.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
3c8d46ce7a439b972f3f0a6e442465ba93031aa02cbdf1ad2d620b70234be45a

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:01 GMT
Content-Encoding
gzip
Last-Modified
Thu, 13 Sep 2018 20:59:52 GMT
Server
AmazonS3
x-amz-request-id
25D6AC8AA22D4A26
ETag
"1adf55d105640034a34014345c541efc"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=50233
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88359
x-amz-id-2
XgrK90nFu+RTGPmnsbtpaMjO0xIuzs8X3D7CVFzI25+zRLJg+UsPX9huUfAb0h3qu/C4frICOsI=
9818.js
ads.rubiconproject.com/ad/ Frame 7312
26 KB
8 KB
Script
General
Full URL
https://ads.rubiconproject.com/ad/9818.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.67.129.200 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-67-129-200.deploy.static.akamaitechnologies.com
Software
Apache / PHP/5.3.3
Resource Hash
d02197080b9680999381b5f5337fedd92674e5a1550ddfcc0c70612d3170a5e3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:01 GMT
Content-Encoding
gzip
Server
Apache
X-Powered-By
PHP/5.3.3
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=7852
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
7558
Expires
Wed, 10 Oct 2018 14:59:53 GMT
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/ Frame 7312
74 KB
27 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81d::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e195ed8d9e79ce4d32ac163cb8e9101fcc6bea6a812a30d58a6d73515ddd3329
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 08 Oct 2018 13:12:18 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
171403
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27477
x-xss-protection
1; mode=block
server
cafe
etag
1272360511746383795
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Mon, 22 Oct 2018 13:12:18 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame 7312
282 KB
87 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_263.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
3c8d46ce7a439b972f3f0a6e442465ba93031aa02cbdf1ad2d620b70234be45a

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:01 GMT
Content-Encoding
gzip
Last-Modified
Thu, 13 Sep 2018 20:59:52 GMT
Server
AmazonS3
x-amz-request-id
25D6AC8AA22D4A26
ETag
"1adf55d105640034a34014345c541efc"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=50233
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88359
x-amz-id-2
XgrK90nFu+RTGPmnsbtpaMjO0xIuzs8X3D7CVFzI25+zRLJg+UsPX9huUfAb0h3qu/C4frICOsI=
9818.js
ads.rubiconproject.com/ad/ Frame 0E18
26 KB
8 KB
Script
General
Full URL
https://ads.rubiconproject.com/ad/9818.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.67.129.200 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-67-129-200.deploy.static.akamaitechnologies.com
Software
Apache / PHP/5.3.3
Resource Hash
d02197080b9680999381b5f5337fedd92674e5a1550ddfcc0c70612d3170a5e3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:01 GMT
Content-Encoding
gzip
Server
Apache
X-Powered-By
PHP/5.3.3
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=7852
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
7558
Expires
Wed, 10 Oct 2018 14:59:53 GMT
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/ Frame 0E18
74 KB
27 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81d::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e195ed8d9e79ce4d32ac163cb8e9101fcc6bea6a812a30d58a6d73515ddd3329
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 08 Oct 2018 13:12:18 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
171403
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27477
x-xss-protection
1; mode=block
server
cafe
etag
1272360511746383795
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Mon, 22 Oct 2018 13:12:18 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame 0E18
282 KB
87 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_263.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
3c8d46ce7a439b972f3f0a6e442465ba93031aa02cbdf1ad2d620b70234be45a

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:01 GMT
Content-Encoding
gzip
Last-Modified
Thu, 13 Sep 2018 20:59:52 GMT
Server
AmazonS3
x-amz-request-id
25D6AC8AA22D4A26
ETag
"1adf55d105640034a34014345c541efc"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=50233
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88359
x-amz-id-2
XgrK90nFu+RTGPmnsbtpaMjO0xIuzs8X3D7CVFzI25+zRLJg+UsPX9huUfAb0h3qu/C4frICOsI=
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/ Frame 945D
74 KB
27 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81d::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e195ed8d9e79ce4d32ac163cb8e9101fcc6bea6a812a30d58a6d73515ddd3329
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 08 Oct 2018 13:12:18 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
171403
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27477
x-xss-protection
1; mode=block
server
cafe
etag
1272360511746383795
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Mon, 22 Oct 2018 13:12:18 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame 945D
282 KB
87 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_263.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
3c8d46ce7a439b972f3f0a6e442465ba93031aa02cbdf1ad2d620b70234be45a

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:01 GMT
Content-Encoding
gzip
Last-Modified
Thu, 13 Sep 2018 20:59:52 GMT
Server
AmazonS3
x-amz-request-id
25D6AC8AA22D4A26
ETag
"1adf55d105640034a34014345c541efc"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=50233
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88359
x-amz-id-2
XgrK90nFu+RTGPmnsbtpaMjO0xIuzs8X3D7CVFzI25+zRLJg+UsPX9huUfAb0h3qu/C4frICOsI=
9818.js
ads.rubiconproject.com/ad/ Frame 2FA4
26 KB
8 KB
Script
General
Full URL
https://ads.rubiconproject.com/ad/9818.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.67.129.200 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-67-129-200.deploy.static.akamaitechnologies.com
Software
Apache / PHP/5.3.3
Resource Hash
d02197080b9680999381b5f5337fedd92674e5a1550ddfcc0c70612d3170a5e3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:01 GMT
Content-Encoding
gzip
Server
Apache
X-Powered-By
PHP/5.3.3
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=7852
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
7558
Expires
Wed, 10 Oct 2018 14:59:53 GMT
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/ Frame 2FA4
74 KB
27 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81d::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e195ed8d9e79ce4d32ac163cb8e9101fcc6bea6a812a30d58a6d73515ddd3329
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 08 Oct 2018 13:12:18 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
171403
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27477
x-xss-protection
1; mode=block
server
cafe
etag
1272360511746383795
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Mon, 22 Oct 2018 13:12:18 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame 2FA4
282 KB
87 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_263.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
3c8d46ce7a439b972f3f0a6e442465ba93031aa02cbdf1ad2d620b70234be45a

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:01 GMT
Content-Encoding
gzip
Last-Modified
Thu, 13 Sep 2018 20:59:52 GMT
Server
AmazonS3
x-amz-request-id
25D6AC8AA22D4A26
ETag
"1adf55d105640034a34014345c541efc"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=50233
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88359
x-amz-id-2
XgrK90nFu+RTGPmnsbtpaMjO0xIuzs8X3D7CVFzI25+zRLJg+UsPX9huUfAb0h3qu/C4frICOsI=
adKit.min.js
rev.cbsi.com/common/js/ Frame 5BA5
6 KB
2 KB
Script
General
Full URL
https://rev.cbsi.com/common/js/adKit.min.js?136957480
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
576e8bf4510a62d7cdcfedd8b749f3039d0c5aa8b2bdfe2e38a44645e0f982e4

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:01 GMT
content-encoding
gzip
last-modified
Mon, 07 Nov 2016 21:14:51 GMT
server
Apache
etag
"61acd092be7016e54f2dac81f3076225:1478553291"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
accept-ranges
bytes
content-length
2158
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/ Frame 5BA5
74 KB
27 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81d::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e195ed8d9e79ce4d32ac163cb8e9101fcc6bea6a812a30d58a6d73515ddd3329
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 08 Oct 2018 13:12:18 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
171403
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27477
x-xss-protection
1; mode=block
server
cafe
etag
1272360511746383795
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Mon, 22 Oct 2018 13:12:18 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame 5BA5
282 KB
87 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_263.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
3c8d46ce7a439b972f3f0a6e442465ba93031aa02cbdf1ad2d620b70234be45a

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:01 GMT
Content-Encoding
gzip
Last-Modified
Thu, 13 Sep 2018 20:59:52 GMT
Server
AmazonS3
x-amz-request-id
25D6AC8AA22D4A26
ETag
"1adf55d105640034a34014345c541efc"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=50233
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88359
x-amz-id-2
XgrK90nFu+RTGPmnsbtpaMjO0xIuzs8X3D7CVFzI25+zRLJg+UsPX9huUfAb0h3qu/C4frICOsI=
view
securepubads.g.doubleclick.net/pcs/ Frame DEDB
0
63 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvLzte91OPGNgua9MUyHvw3Xv0177dWOcXGv82nZB3rnsTOznxNx8UaojNlhSTfLNu6BQUowOrv-rHvwi5O3W7YAhAqhzzV7zmsGwtkf7hipSTrhMnXCtfiKvP9BOrM40aYnlOH9whLvy55RHZJY3pH1_DoDAWi-zvZ8rrtfnB4VfoJhq-iMw9UmsnpCKKBfYRftxAXM3fV4sNpYqMuaNo-ZI55JZujxmKeLSOE9jZslUJbXhGzVzZIbNXAApU9pA&sai=AMfl-YTWHPd_AnmEluGkb4FNzXqAOzuk8Vl327NtN29chklhmkLKfxuPv0W-JiXij4ztnv_azDE6EfBgV8EgV9LvS26lDbTES-qSaff1H_ntrErswxtoUymbktY4nE4&sig=Cg0ArKJSzEzwDrkWWd88EAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.98 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 10 Oct 2018 12:49:01 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame 0384
0
56 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuHLgE3BRkKvoQA2MTxaaUoyptrzBx5yWs517nzy6jcxf3s2EsReeiOFFCpS8TOWVbj5OPSy7Q11b5WxZ40N_TCE4fvHT1B0QasPGTGhnlhEe30ztRIWU3PquaU9y3VI8KjPbtJAPIk3cRlq8dy5pu8Gr-IR9fxKXQp-4bm-UJFvzQkKwTl-B4uORTSG9L0QOrfi5Jpf_nUEmV3xwLsex10y8U0itFm6iN8Lqcls1a2kijhq7e5K2tTOGnsJKgl5w&sai=AMfl-YRQDfLWmHtXJQJlWVpiY1j0x80guOykF6wZNrvUTOGBeWIGVP8SE8rgncyP6JxD0Vi_aSVNU2Aq0bsxLoC2PnXAYn5t7ZQbQgXrF6qIZhDXTRbw9OeuqIVLvIo&sig=Cg0ArKJSzK6LqoEPDgUUEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.98 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 10 Oct 2018 12:49:01 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame F33E
0
47 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstYPykKdGv-rs_mWZlU0ZwzYPz1wHTqafhgoqjeezxw8VV9sQmz1F6xV1kNBsaEE1BXoj1VDXy2kUFz_RnAM6CMNTXgbYh5v1TB5hwssMJkWd1kYsuQXd5xoYvSYben9sO0mhjDLo2nLBxAetE787SnBeri3v1UIRZ-pdx8seyA1R5FNZmGn5ZDbwDA1Q-Un7B6pxKcikan6DOkKBvwezKHJBs2584mMfCS-Od3ph87g4GdnGGysz2kouSq&sai=AMfl-YTk1xW5m2GpgHj-Sk0kPQeGh1pezEuqJqS8UlN5dAcU61rP4VpYot4BuA0FKGhOTM2P4CZdErO6CKLfIwZPqLXEizE1uRnIzwiqvsplfrXai-t4l24sPpZQKls&sig=Cg0ArKJSzLt1w0-bM0lvEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.98 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 10 Oct 2018 12:49:01 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame 7312
0
47 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstLAOkFEYO6LkTlIMDdG7HPKZDIflQXWy-Ly-PPgR0UwDitx7OKtVbp1PJh4AS2FCSX-6lQieuBMchfhLsS98Y17LpYxPLISMJ2LhFlaP9-L-gpZwJluYqrSiomMfXbCyHNl9clM8FPQLXZ1b0hRPZ4G91BGemtko7QCy4oaoh6TrGwNZuWZyVQeACfXVIQFZUXeOp1XXFJZJHHh0HhA0-gPRulYsWGP9VrFvse_VTC7OeIEUY3a6BH3-k5&sai=AMfl-YTzwVUPlpEcyb5am8D88d0bRP_qfvMHhur5NIrqRMrJ3p0YNF7vFTKD7eG0vO66ggKLmNuIusr_4_W_niwMGrKEF2iFX1v9mlXgzkaMkS4n8sJ-v8oIDd45ruo&sig=Cg0ArKJSzM3ywZKXoilQEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.98 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 10 Oct 2018 12:49:01 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame 0E18
0
47 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsveDHM6kLJs-GYVB13DD1a3hct9-Iim4sVQXrB5jM1ANlJJImCz6wlJG0-yiGFWwyE3Jb6olCRjwrnZ8LKcI_kovgeXfqYwvJxSBnJZK_K4JL5Y37icrM0PA1b6ocbxj9UQ5prjrpExtSC8VKSr5GfhX0IY-utLNmW8eBJeDGLsMGXbtf8382hUc5vrYNhlTO4AJ1wJF_tFfdXx2LPOWkThSvmoFkv475h75KA3b982zferqZ68O9uGxF4b&sai=AMfl-YRgC_edhPfxO1WAVRjVZLK0UTxgX0JaDEp09aQx53a0W90Wmtvm8TCtAjbgm-6t21gsikdFjLyrXek6cWnbwBi4wC5B9imxDJk7WmQ6FIQx3bYfFxc7FkN-yU4&sig=Cg0ArKJSzL-9RRl3PRyfEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.98 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 10 Oct 2018 12:49:01 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame 945D
0
47 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvO9ShJAfNu_0iO0T3822v1FlbUi3aQ2rLGH0BMurFI9H94ZcTSXnAPJpXEmua7PmugKwdDElTtF_9jpezRen1noPPIx8oAEBUyVxR3tj7_QuIjKPl5cHLpAdLJozlCtpcMlGaQhGL3DynQtZAxeTUV9-8wnLbpBAEW5Z6chm72ch2HUwaxMCyQT1iKP-owloMi7vyAKmLZQkRj8PAXEc-h7YC2Cs54RpDIu36JcO4iysQPHdTNHixHXHtxy74fwg&sai=AMfl-YR0YBTzxjhUyw3GV3wLauXfXOf1BFJljF55eqgz0J1q5J2d3wa5J20jyaWjpbtKZnBHudyz2VVHpUUobdw3R7mj16QflWLtaoZzBS2dtu_-0iKqiQX0x7EKkWM&sig=Cg0ArKJSzEOGydwdM4xYEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.98 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 10 Oct 2018 12:49:01 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame 2FA4
0
56 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssDzfR4R7ncMu5ZiZX1XLjsIMAMS0u-bvy3g9gX9RpaGX6OjmhcE1RXWXRxXCDLMfeKqZ0_Zm-XY7-CEQ2BgaI5Vg-o7BFupGpmzdlO_7YOTX_AIR07dj3K5mrciSGTTTBDgAGYCvbRgvmFIEAZeGOiJcu8vBLAexHq7HA_ejgeu-DmqbymgDMA9I4m8d8iuMh8Frp3gcUpzKRf441A-SCBC5zgCojH9i7sovNijJnBcAa1ewiNkl4ghD24&sai=AMfl-YTTp_fcAivOpU5Bomc3x46rUUv5UErzVCOdOLR5yXv74VWv7vc_Fqu17JBdABqDvBYtHnVjK0FJZ-h_nKnBHGE0RzfpnZFMEYhBFajTyrPUtLXqrunpOWt9_88&sig=Cg0ArKJSzErEJ5uylBTGEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.98 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 10 Oct 2018 12:49:01 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame 5BA5
0
47 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuyj4OwDp72c9o2I92Z11deEDkX7ocmp5LOw31Vjfqk0bbt333Dk01d-Eji28_z6FDH6Oi1CofxB3UcIoIskCNVkLgBHBcuc_Buib-89uevfIVuTsC7mCGdts_4laC_q3RvI81uoayQi2DfZV0QB9oKifVhfd_3tsVW4pCexaYyZ3F_Fn2aNzC_5t1tcBxr6_FWaacVfyFg5y2h5zpyi17y49eV2BaZ04da0tV6S4y_UujTV6SgK0iHx7fF6hJa&sai=AMfl-YRQh8vLRfQPlMbRCA1x_P779CghuMEiECkM6ErUC30vqQkZDb3iVr6nuEzbjOHZ2A3uc4yjqJpfM3kqQvuoQsJxyYuhkqVNRUNVxP6Nmc6vT6I6I1n97FMlK4k&sig=Cg0ArKJSzPbKBHvgUy62EAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.98 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 10 Oct 2018 12:49:01 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
loader.js
cdn.taboola.com/libtrc/cbsinteractive-zdnet/
300 KB
25 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/cbsinteractive-zdnet/loader.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
8a5f18cc0c51b80e341f35b8b9d88c1384367d35e871262190ad21614da8df31

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
ZNu55BlGZ7rG.KjfAxxJ5o9Lrno1Y0VF
content-encoding
gzip
etag
"ce4dfcb35caddb9489d589e332371c04"
age
18315
x-cache
HIT
status
200
x-amz-replication-status
COMPLETED
content-length
25584
x-amz-id-2
bOwxsbPSmX5NbtLFSRitgOCyhnAEI3e4R0wvbBClmg4zfHpUA0P+Ko7Di87uTQOMDjVZE72O/U4=
x-served-by
cache-hhn1549-HHN
last-modified
Wed, 10 Oct 2018 07:43:34 GMT
server
AmazonS3
x-timer
S1539175741.114110,VS0,VE0
date
Wed, 10 Oct 2018 12:49:01 GMT
vary
Accept-Encoding
x-amz-request-id
5B6B594022F5F350
via
1.1 varnish
cache-control
private,max-age=14401
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
x-cache-hits
112
PF7B87067-BF4D-F80F-E040-070AAD316CE6.js
cdn-gl.imrworldwide.com/conf/
42 KB
8 KB
Script
General
Full URL
https://cdn-gl.imrworldwide.com/conf/PF7B87067-BF4D-F80F-E040-070AAD316CE6.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1805.js?utv=ut4.43.201809191808
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.19 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-19.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
69cae0e4a452498954bbf3b5d8e7fba27b49178eef19552cd625550c171937c8

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:34:15 GMT
Content-Encoding
gzip
Last-Modified
Wed, 10 Oct 2018 12:25:17 GMT
Server
AmazonS3
Age
887
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
x-amz-version-id
Y3cOsugizvu1fHSJJ6A3qskFihDIidxs
Via
1.1 0d37b2e69745cd9f0c5457fbf1a83129.cloudfront.net (CloudFront)
Transfer-Encoding
chunked
Connection
keep-alive
Content-Type
application/javascript
X-Amz-Cf-Id
r8fvGZ6VlTdKZ0-BJikbV7FxJIZgxoJk16f4nQLX8by7UZn0uCr6tw==
embed.js
zdnet-1.disqus.com/
63 KB
21 KB
Script
General
Full URL
https://zdnet-1.disqus.com/embed.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1497-fly/js/libs/require-2.1.2.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.120.134 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
openresty /
Resource Hash
3e1df10e5acf41589fcc01aad451ad05b87d15c27f0f9fcac21c0b9d1368ebb9
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:01 GMT
Content-Encoding
gzip
Server
openresty
Age
7
Vary
Accept-Encoding
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Cache-Control
private, max-age=60
X-Service
router
Strict-Transport-Security
max-age=300; includeSubdomains
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
Content-Length
21353
283812-2.js
optimized-by.rubiconproject.com/a/9818/59604/ Frame F33E
2 KB
1 KB
Script
General
Full URL
https://optimized-by.rubiconproject.com/a/9818/59604/283812-2.js?&cb=0.7209314504374633&tk_st=1&rf=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp_s=c&p_pos=atf&p_screen_res=1600x1200&ad_slot=59604_2&rp_secure=1
Requested by
Host: ads.rubiconproject.com
URL: https://ads.rubiconproject.com/ad/9818.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.71 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
f742bc7cb4ebf3a215fdeb05fb43089b6b71923e4ce1c5b7c75af9291798cd87

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:01 GMT
Content-Encoding
gzip
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Connection
Keep-Alive
Content-Type
text/javascript
Keep-Alive
timeout=0, max=7
Content-Length
917
Expires
Wed, 17 Sep 1975 21:32:10 GMT
283812-15.js
optimized-by.rubiconproject.com/a/9818/59604/ Frame 7312
2 KB
1 KB
Script
General
Full URL
https://optimized-by.rubiconproject.com/a/9818/59604/283812-15.js?&cb=0.8658458587162581&tk_st=1&rf=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp_s=c&p_pos=atf&p_screen_res=1600x1200&ad_slot=59604_15&rp_secure=1
Requested by
Host: ads.rubiconproject.com
URL: https://ads.rubiconproject.com/ad/9818.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.71 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
db93c54d3afd8067ec113f61673c4f66faffa3c420950bf16a8e118b7776da7e

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:01 GMT
Content-Encoding
gzip
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Connection
Keep-Alive
Content-Type
text/javascript
Keep-Alive
timeout=0, max=9
Content-Length
921
Expires
Wed, 17 Sep 1975 21:32:10 GMT
283812-2.js
optimized-by.rubiconproject.com/a/9818/59604/ Frame 2FA4
2 KB
1 KB
Script
General
Full URL
https://optimized-by.rubiconproject.com/a/9818/59604/283812-2.js?&cb=0.8917568353448608&tk_st=1&rf=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp_s=c&p_pos=btf&p_screen_res=1600x1200&ad_slot=59604_2&rp_secure=1
Requested by
Host: ads.rubiconproject.com
URL: https://ads.rubiconproject.com/ad/9818.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.71 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
d64f392ff2ab3316da63534fae3f8851445c7e80a0954598abf802bcde8f507d

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:01 GMT
Content-Encoding
gzip
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Connection
Keep-Alive
Content-Type
text/javascript
Keep-Alive
timeout=0, max=5
Content-Length
918
Expires
Wed, 17 Sep 1975 21:32:10 GMT
283812-15.js
optimized-by.rubiconproject.com/a/9818/59604/ Frame 0E18
2 KB
1 KB
Script
General
Full URL
https://optimized-by.rubiconproject.com/a/9818/59604/283812-15.js?&cb=0.7063784207168085&tk_st=1&rf=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp_s=c&p_pos=btf&p_screen_res=1600x1200&ad_slot=59604_15&rp_secure=1
Requested by
Host: ads.rubiconproject.com
URL: https://ads.rubiconproject.com/ad/9818.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.71 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
7a3fdf87b812061996cef5b3ba9d628d8bc411ab0c0e8b85e79d7e8b0abfbdf5

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:01 GMT
Content-Encoding
gzip
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Connection
Keep-Alive
Content-Type
text/javascript
Keep-Alive
timeout=0, max=9
Content-Length
1070
Expires
Wed, 17 Sep 1975 21:32:10 GMT
gpt.js
www.googletagservices.com/tag/js/ Frame 5BA5
23 KB
9 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: rev.cbsi.com
URL: https://rev.cbsi.com/common/js/adKit.min.js?136957480
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:80b::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
e7279cfba737e9503b40bf295ba2e1d170f730a828c6c0809877373bac1d61fb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"8 / 780 of 1000 / last-modified: 1539109419"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
8601
x-xss-protection
1; mode=block
expires
Wed, 10 Oct 2018 12:49:01 GMT
0.3556935105465724
saa.cbsi.com/b/ss/cbsib2bleadgen/1/G.4--NS/
43 B
610 B
Image
General
Full URL
https://saa.cbsi.com/b/ss/cbsib2bleadgen/1/G.4--NS/0.3556935105465724?AQB=1&ce=UTF%2D8&events=event66&v0=ftag_cd:LGN22ef1e6&v2=en&v3=desktop&v4=right-rail&v5=zdnet&v10=article&v20=gigantic+100%2C000-strong+botnet+used+to+hijack+traffic+meant+for+brazilian+banks&v22=content_article&v23=&v24=7162bf48-0ccd-4007-b28c-e5153fda4868&v30=7a12161d-2a5f-4793-b0a4-9fac038733de&v60=33164521,33164519,33161704&v64=2150&v69=&c0=D%3Dv0&c2=D%3Dv2&c3=D%3Dv3&c4=D%3Dv4&c5=D%3Dv5&c10=D%3Dv10&c20=D%3Dv20&c22=D%3Dv22&c23=D%3Dv23&c24=D%3Dv24&c30=D%3Dv30&c60=D%3Dv60&c64=D%3Dv64&c69=D%3Dv69&pe=lnk_o&pev2=medusa_impression&vid=201810100-leadgen-zdnet&mid=90240133173074011141898988208131324462&aid=2D535D450507F28B-40000106A0001145&AQE=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.140.43.37 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
cbsi.com.ssl.sc.omtrdc.net
Software
Omniture DC /
Resource Hash
a1ecbaed793a1f564c49c671f2dd0ce36f858534ef6d26b55783a06b884cc506
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:01 GMT
X-Content-Type-Options
nosniff
X-C
ms-6.5.1
P3P
CP="This is not a P3P policy"
Connection
Keep-Alive
Content-Length
43
X-XSS-Protection
1; mode=block
Pragma
no-cache
Last-Modified
Thu, 11 Oct 2018 12:49:01 GMT
Server
Omniture DC
xserver
www279
ETag
"3305354735282880512-5508994339172253824"
Vary
*
Content-Type
image/gif
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Keep-Alive
timeout=15
Expires
Tue, 09 Oct 2018 12:49:01 GMT
e.gif
dw.cbsi.com/levt/ria/
43 B
369 B
Image
General
Full URL
https://dw.cbsi.com/levt/ria/e.gif?rsid=cnetzdnetglobalsite&sid=2&siteid=2&pagetype=article&assetguid=7a12161d-2a5f-4793-b0a4-9fac038733de&assettitle=gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20brazilian%20banks&assettype=content_article&pubdate=2018-10-01%2004%3A20%3A22&viewguid=7162bf48-0ccd-4007-b28c-e5153fda4868&devicetype=desktop&sitetype=responsive%20web&author=catalin%20cimpanu&authorid=85fd8691-f525-4ea2-a601-af296f629f7f&topicguid=113c25b6-ec91-11e3-95d2-02911863765e&topic=security&topicbrcrm=security&s8=cnetzdnetglobalsite&v23=cnetzdnetglobalsite&v19=article&v17=113c25b6-ec91-11e3-95d2-02911863765e&v20=7a12161d-2a5f-4793-b0a4-9fac038733de&v16=7162bf48-0ccd-4007-b28c-e5153fda4868&riaevent=impression&comptyp=spot&mapp=medusa_app&objtyp=medusa&eventt=log&v18=security&comp=ucwc&ts=1539175741353&tcset=utf8&im=dsjs&title=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&srcurl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.30.230.22 Fort Lauderdale, United States, ASN6623 (CBSI-1 - CBS Interactive Inc., US),
Reverse DNS
phx2-dw-cbsi-xw-ext-lb.cnet.com
Software
Apache/2.4.25 /
Resource Hash
e586a84d8523747f42e510d78e141015b6424cf67d612854e892a7bcedc8ec9e

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:01 GMT
Server
Apache/2.4.25
Vary
*
Content-Type
image/gif
Cache-Control
no-cache, must-revalidate, no-transform
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=80, max=645
Content-Length
43
Expires
Fri, 23 Jan 1970 12:12:12 GMT
count-data.js
zdnet-1.disqus.com/
243 B
768 B
Script
General
Full URL
https://zdnet-1.disqus.com/count-data.js?1=7a12161d-2a5f-4793-b0a4-9fac038733de
Requested by
Host: zdnet-1.disqus.com
URL: https://zdnet-1.disqus.com/count.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.120.134 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
ebff5e526eaecb20e91c2af0476f72cdae479b8e36b89f4e3068ce46dd1db96f
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:01 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Server
nginx
Age
612
X-Frame-Options
SAMEORIGIN
Connection
keep-alive
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Vary
Accept-Encoding
Cache-Control
public, max-age=600
Strict-Transport-Security
max-age=300; includeSubdomains
Content-Type
application/javascript; charset=UTF-8
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
Content-Length
205
X-XSS-Protection
1; mode=block
/
www.facebook.com/tr/ Frame 1B21
0
0
Document
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a03:2880:f11c:8083:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash

Request headers

:method
POST
:authority
www.facebook.com
:scheme
https
:path
/tr/
content-length
4543
pragma
no-cache
cache-control
no-cache
origin
https://www.zdnet.com
upgrade-insecure-requests
1
content-type
application/x-www-form-urlencoded
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
cookie
fr=0aYJn5c1gIUIhAr6f..BbvfU8...1.0.BbvfU8.
Origin
https://www.zdnet.com
Upgrade-Insecure-Requests
1
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
content-type
text/plain
content-length
0
server
proxygen-bolt
date
Wed, 10 Oct 2018 12:49:01 GMT
lounge.d797d52db05c56e7ec33542889f90bca.css
c.disquscdn.com/next/embed/styles/
101 KB
19 KB
Stylesheet
General
Full URL
https://c.disquscdn.com/next/embed/styles/lounge.d797d52db05c56e7ec33542889f90bca.css
Requested by
Host: zdnet-1.disqus.com
URL: https://zdnet-1.disqus.com/embed.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:4ea6 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
14bb9f57c9f4f4d1a195c49f456748ab3de07a3ab226091f40e798a877a5e204
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
19377
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Wed, 03 Oct 2018 22:50:54 GMT
server
cloudflare
fastly-debug-digest
d903d27b1b1603a4c5c77bbc035683ca068c3a4a4b90020f5ab5c812b388921f
etag
"5bb547ce-4bb1"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
cf-ray
467934604b99c2e7-FRA
expires
Thu, 03 Oct 2019 23:07:33 GMT
common.bundle.18932c85febf9520158697cdc31f08ae.js
c.disquscdn.com/next/embed/
242 KB
81 KB
Script
General
Full URL
https://c.disquscdn.com/next/embed/common.bundle.18932c85febf9520158697cdc31f08ae.js
Requested by
Host: zdnet-1.disqus.com
URL: https://zdnet-1.disqus.com/embed.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:4ea6 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
22a100e19a099737c0b9eec9c19b6fc7de17e16c2d25e3a89fca20778e98abc6
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
82684
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Tue, 09 Oct 2018 20:47:01 GMT
server
cloudflare
fastly-debug-digest
b18a35687fb6f9be652456ef708b8bccc57b9a97da44487936422a8a2012c75b
etag
"5bbd13c5-142fc"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
cf-ray
467934604b9cc2e7-FRA
expires
Wed, 09 Oct 2019 20:57:55 GMT
lounge.bundle.ab905f052ba8af95ba7fd0785f080e6d.js
c.disquscdn.com/next/embed/
360 KB
94 KB
Script
General
Full URL
https://c.disquscdn.com/next/embed/lounge.bundle.ab905f052ba8af95ba7fd0785f080e6d.js
Requested by
Host: zdnet-1.disqus.com
URL: https://zdnet-1.disqus.com/embed.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:4ea6 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e1ce4de4ad68cac5b9d6261b6166b11f159f7f4970bce8c5cc24944b5b35f46e
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
95918
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Tue, 09 Oct 2018 20:47:01 GMT
server
cloudflare
fastly-debug-digest
feb78f9954a4356887a0bc677f506c4de5ec952aa1909068635e7f33c9a156f3
etag
"5bbd13c5-176ae"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
cf-ray
467934604b9ec2e7-FRA
expires
Wed, 09 Oct 2019 20:57:55 GMT
config.js
disqus.com/next/
5 KB
3 KB
Script
General
Full URL
https://disqus.com/next/config.js
Requested by
Host: zdnet-1.disqus.com
URL: https://zdnet-1.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.0.134 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
495ddbb4c71011eba37875e07b11584868533dd415747d2d3e8dfbee2810ab96
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:01 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Age
54
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
2484
X-XSS-Protection
1; mode=block
Server
nginx
X-Frame-Options
SAMEORIGIN
Strict-Transport-Security
max-age=300; includeSubdomains
Content-Type
application/javascript; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
public, stale-while-revalidate=300, s-stalewhilerevalidate=3600, max-age=60
Timing-Allow-Origin
*
show_ads.js
pagead2.googlesyndication.com/pagead/ Frame 2FA4
53 KB
20 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/show_ads.js
Requested by
Host: optimized-by.rubiconproject.com
URL: https://optimized-by.rubiconproject.com/a/9818/59604/283812-2.js?&cb=0.8917568353448608&tk_st=1&rf=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp_s=c&p_pos=btf&p_screen_res=1600x1200&ad_slot=59604_2&rp_secure=1
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:821::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
931222eed8640abe804faec2d6322dd404600773695f53a2ee8880434017a760
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
20543
x-xss-protection
1; mode=block
server
cafe
etag
15819556815569492302
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Wed, 10 Oct 2018 12:49:01 GMT
a2aaaf1c-1f40-4d9f-ae74-a1d15809219e
beacon-eu-ams3.rubiconproject.com/beacon/d/ Frame 2FA4
43 B
268 B
Image
General
Full URL
https://beacon-eu-ams3.rubiconproject.com/beacon/d/a2aaaf1c-1f40-4d9f-ae74-a1d15809219e?oo=51&accountId=9818&siteId=59604&zoneId=283812&sizeId=2&e=6A1E40E384DA563BC2F515C82DB700EB8CFAF6687238FC680A0B144943D7F65E6F7027B6A7D9157F209A4AD2810BF9E19F0BE1F8337FD75D07B0198A3AA6E628C812EDE9BBC3917A3570ECD3831C9446AC237D6FA0EBFC9ADFFA16DC2C67B3083CF4CCB1A6C13E42F5BE0B04AD33F58D33F8630F2FDB6069
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.67 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
Rubicon Project /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:01 GMT
Cache-Control
private, max-age=0, no-cache
Server
Rubicon Project
Content-Type
image/webp
Content-Length
43
Expires
01 Jan 1970 10:00:00 GMT
show_ads.js
pagead2.googlesyndication.com/pagead/ Frame 0E18
53 KB
20 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/show_ads.js
Requested by
Host: optimized-by.rubiconproject.com
URL: https://optimized-by.rubiconproject.com/a/9818/59604/283812-15.js?&cb=0.7063784207168085&tk_st=1&rf=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp_s=c&p_pos=btf&p_screen_res=1600x1200&ad_slot=59604_15&rp_secure=1
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:821::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ae6174ff5037bd142d0f4b76fa3b29b17eab80824f94ba9f7c12946a49858bf0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
20540
x-xss-protection
1; mode=block
server
cafe
etag
15474118547071132244
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Wed, 10 Oct 2018 12:49:01 GMT
b0df655b-fbe9-4b32-a7d1-9f6bdcb4eb3c
beacon-eu-ams3.rubiconproject.com/beacon/d/ Frame 0E18
43 B
268 B
Image
General
Full URL
https://beacon-eu-ams3.rubiconproject.com/beacon/d/b0df655b-fbe9-4b32-a7d1-9f6bdcb4eb3c?oo=51&accountId=9818&siteId=59604&zoneId=283812&sizeId=15&e=6A1E40E384DA563B0FDF1633840BD914EE769FE479CFDCCEBAB7FA2C8B4CBA7EF62CF51F6530490DBC18D5FE4BD100769F0BE1F8337FD75D1F1C6186DFAA3A5FC812EDE9BBC3917A3570ECD3831C9446AC237D6FA0EBFC9ADFFA16DC2C67B3083CF4CCB1A6C13E42F5BE0B04AD33F58D33F8630F2FDB6069
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.67 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
Rubicon Project /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:01 GMT
Cache-Control
private, max-age=0, no-cache
Server
Rubicon Project
Content-Type
image/webp
Content-Length
43
Expires
01 Jan 1970 10:00:00 GMT
show_ads.js
pagead2.googlesyndication.com/pagead/ Frame F33E
53 KB
20 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/show_ads.js
Requested by
Host: optimized-by.rubiconproject.com
URL: https://optimized-by.rubiconproject.com/a/9818/59604/283812-2.js?&cb=0.7209314504374633&tk_st=1&rf=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp_s=c&p_pos=atf&p_screen_res=1600x1200&ad_slot=59604_2&rp_secure=1
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:821::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ae6174ff5037bd142d0f4b76fa3b29b17eab80824f94ba9f7c12946a49858bf0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
20540
x-xss-protection
1; mode=block
server
cafe
etag
15474118547071132244
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Wed, 10 Oct 2018 12:49:01 GMT
90c2f4a2-5739-4254-b1a6-5683e6818ef8
beacon-eu-ams3.rubiconproject.com/beacon/d/ Frame F33E
43 B
268 B
Image
General
Full URL
https://beacon-eu-ams3.rubiconproject.com/beacon/d/90c2f4a2-5739-4254-b1a6-5683e6818ef8?oo=51&accountId=9818&siteId=59604&zoneId=283812&sizeId=2&e=6A1E40E384DA563B2B638237C6D9437380A723DD4C58FEDAF42D72D9AE673E66B5CFFF43E7D40E7E90E235301E2384439F0BE1F8337FD75D1F1C6186DFAA3A5FC812EDE9BBC3917A3570ECD3831C9446AC237D6FA0EBFC9ADFFA16DC2C67B3089657252D90587B3DF5BE0B04AD33F58D33F8630F2FDB6069
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.67 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
Rubicon Project /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:01 GMT
Cache-Control
private, max-age=0, no-cache
Server
Rubicon Project
Content-Type
image/webp
Content-Length
43
Expires
01 Jan 1970 10:00:00 GMT
gn
secure-dcr-cert.imrworldwide.com/cgi-bin/
44 B
332 B
Image
General
Full URL
https://secure-dcr-cert.imrworldwide.com/cgi-bin/gn?prd=dcr&ci=au-207861&ch=au-207861_c10_ZDNet%20-%20Brand%20Only_S&asn=ZDNet%20-%20Brand%20Only&sessionId=uAM9gcDtFSAZ8HwuRQoj1i9bqlulO1539175739&prv=1&c6=vc,c10&ca=NA&c13=asid,TF410621A-6337-4D08-955D-E14C11D5FFA5&c32=segA,NA&c33=segB,NA&c34=segC,NA&c15=apn,&sup=1&segment2=&segment1=&forward=0&plugv=&playerv=&ad=0&cr=V&c9=devid,&enc=true&c1=nuid,999&at=view&rt=text&c16=sdkv,bj.6.0.0&c27=cln,0&crs=&lat=&lon=&c29=plid,15391757392303958&c30=bldv,6.0.0.158-3&st=dcr&c7=osgrp,&c8=devgrp,&c10=plt,&c40=adbid,&c14=osver,NA&c26=dmap,1&dd=&hrd=&wkd=&c35=adrsid,&c36=cref1,&c37=cref2,&c11=agg,1&c12=apv,&c51=adl,0&c52=noad,0&devtypid=&pc=NA&c53=fef,n&c54=oad,&c55=cref3,&c57=adldf,2&ai=7a12161d-2a5f-4793-b0a4-9fac038733de&c3=st,c&c64=starttm,1539175740&adid=7a12161d-2a5f-4793-b0a4-9fac038733de&c58=isLive,false&c59=sesid,&c61=createtm,1539175741&c63=pipMode,&uoo=&c68=bndlid,&nodeTM=&logTM=&c73=phtype,&c74=dvcnm,&c76=adbsnid,&c44=progen,&davty=0&si=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c66=mediaurl,&c62=sendTime,1539175741&rnd=310771
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.54.117.157 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-54-117-157.compute-1.amazonaws.com
Software
nginx /
Resource Hash
5ecb58845a9ac30e4eb4b18eb0e7431ba1fb195ce035309735efaee67421c7a3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 10 Oct 2018 12:49:01 GMT
server
nginx
status
200
access-control-allow-methods
POST, OPTIONS
p3p
P3P policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
access-control-allow-origin
*
cache-control
no-cache
content-type
image/gif
content-length
44
expires
Thu, 01 Dec 1994 16:00:00 GMT
integrator.js
adservice.google.de/adsid/ Frame 5BA5
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:824::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 10 Oct 2018 12:49:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
integrator.js
adservice.google.com/adsid/ Frame 5BA5
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:821::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 10 Oct 2018 12:49:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
pubads_impl_264.js
securepubads.g.doubleclick.net/gpt/ Frame 5BA5
184 KB
63 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_264.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.98 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
sffe /
Resource Hash
95e4236cf00268f59ec1287e0823e4fedb466ff7f708b102536fffdda40b9d4c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 08 Oct 2018 14:47:44 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
63858
x-xss-protection
1; mode=block
expires
Wed, 10 Oct 2018 12:49:01 GMT
integrator.js
adservice.google.de/adsid/ Frame 2FA4
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:824::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 10 Oct 2018 12:49:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
integrator.js
adservice.google.com/adsid/ Frame 2FA4
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:821::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 10 Oct 2018 12:49:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
ca-pub-1991679624331369.js
pagead2.googlesyndication.com/pub-config/r20160913/ Frame 2FA4
68 B
173 B
Script
General
Full URL
https://pagead2.googlesyndication.com/pub-config/r20160913/ca-pub-1991679624331369.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:821::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8ba131a677ea1357ae7fdc95d6a5c67c3b02d171bb286f6c9ec6bce3cef5c211
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 06:27:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
age
22875
content-type
text/javascript
status
200
cache-control
public, max-age=43200
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
88
x-xss-protection
1; mode=block
expires
Wed, 10 Oct 2018 18:27:46 GMT
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20181008/r20180604/ Frame 2423
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/html/r20181008/r20180604/zrt_lookup.html
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:80b::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/html/r20181008/r20180604/zrt_lookup.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
vary
Accept-Encoding
date
Tue, 09 Oct 2018 04:43:41 GMT
expires
Tue, 23 Oct 2018 04:43:41 GMT
content-type
text/html; charset=UTF-8
etag
12810928231326100212
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
6940
x-xss-protection
1; mode=block
cache-control
public, max-age=1209600
age
115520
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/ Frame 6552
196 KB
73 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:817::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
7b21595c32caa7b47cec4b349b47e05298c32c5cf065915c2bc6058c1d7f7522
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
74377
x-xss-protection
1; mode=block
server
cafe
etag
1244184442415605674
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Wed, 10 Oct 2018 12:49:01 GMT
usync.html
eus.rubiconproject.com/ Frame 267D
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Tue, 09 Oct 2018 10:25:22 GMT
Content-Encoding
gzip
Content-Length
7375
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=23673
Expires
Wed, 10 Oct 2018 19:23:34 GMT
Date
Wed, 10 Oct 2018 12:49:01 GMT
Connection
keep-alive
Vary
Accept-Encoding
integrator.js
adservice.google.de/adsid/ Frame 0E18
109 B
490 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 10 Oct 2018 12:49:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
integrator.js
adservice.google.com/adsid/ Frame 0E18
109 B
490 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81f::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 10 Oct 2018 12:49:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
ca-pub-1991679624331369.js
pagead2.googlesyndication.com/pub-config/r20160913/ Frame 0E18
68 B
356 B
Script
General
Full URL
https://pagead2.googlesyndication.com/pub-config/r20160913/ca-pub-1991679624331369.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:817::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8ba131a677ea1357ae7fdc95d6a5c67c3b02d171bb286f6c9ec6bce3cef5c211
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 06:27:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
age
22875
content-type
text/javascript
status
200
cache-control
public, max-age=43200
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
88
x-xss-protection
1; mode=block
expires
Wed, 10 Oct 2018 18:27:46 GMT
analytics.js
s.update.rubiconproject.com/2/873648/ Frame 0E18
0
75 B
Script
General
Full URL
https://s.update.rubiconproject.com/2/873648/analytics.js?si=59604&di=www.zdnet.com&ap=&dm=15&pi=283812&ti=b0df655b-fbe9-4b32-a7d1-9f6bdcb4eb3c&r5=Mozilla%2F5.0%20(Macintosh%3B%20Intel%20Mac%20OS%20X%2010_13_5)%20AppleWebKit%2F537.36%20(KHTML%2C%20like%20Gecko)%20Chrome%2F67.0.3396.87%20Safari%2F537.36&dt=8736481428691810142000
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
34.202.248.102 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-202-248-102.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:01 GMT
Content-Length
0
usync.html
eus.rubiconproject.com/ Frame 084A
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Tue, 09 Oct 2018 10:25:22 GMT
Content-Encoding
gzip
Content-Length
7375
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=23673
Expires
Wed, 10 Oct 2018 19:23:34 GMT
Date
Wed, 10 Oct 2018 12:49:01 GMT
Connection
keep-alive
Vary
Accept-Encoding
integrator.js
adservice.google.de/adsid/ Frame F33E
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 10 Oct 2018 12:49:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
integrator.js
adservice.google.com/adsid/ Frame F33E
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81f::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 10 Oct 2018 12:49:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
ca-pub-1991679624331369.js
pagead2.googlesyndication.com/pub-config/r20160913/ Frame F33E
68 B
145 B
Script
General
Full URL
https://pagead2.googlesyndication.com/pub-config/r20160913/ca-pub-1991679624331369.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:817::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8ba131a677ea1357ae7fdc95d6a5c67c3b02d171bb286f6c9ec6bce3cef5c211
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 06:27:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
age
22875
content-type
text/javascript
status
200
cache-control
public, max-age=43200
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
88
x-xss-protection
1; mode=block
expires
Wed, 10 Oct 2018 18:27:46 GMT
usync.html
eus.rubiconproject.com/ Frame 9AD0
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Tue, 09 Oct 2018 10:25:22 GMT
Content-Encoding
gzip
Content-Length
7375
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=23673
Expires
Wed, 10 Oct 2018 19:23:34 GMT
Date
Wed, 10 Oct 2018 12:49:01 GMT
Connection
keep-alive
Vary
Accept-Encoding
truncated
/ Frame F33E
211 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6a77cff3b5035d64d7f9cf4053044482aac88fd4d237e35cdcdcb1bd91c41f3a

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
truncated
/ Frame 0E18
211 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b042db706b42f8db4b4679f9b85ddbc1c189ba353b85c604afe22d9609a6fa3b

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
truncated
/ Frame 2FA4
209 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
3eca651226c1257c851a1513d2e4ca1eb20fe2551c2c00c8c5c1ea0bde138046

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
show_ads.js
pagead2.googlesyndication.com/pagead/ Frame 7312
53 KB
0
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/show_ads.js
Requested by
Host: optimized-by.rubiconproject.com
URL: https://optimized-by.rubiconproject.com/a/9818/59604/283812-15.js?&cb=0.8658458587162581&tk_st=1&rf=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp_s=c&p_pos=atf&p_screen_res=1600x1200&ad_slot=59604_15&rp_secure=1
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:821::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ae6174ff5037bd142d0f4b76fa3b29b17eab80824f94ba9f7c12946a49858bf0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

date
Wed, 10 Oct 2018 12:49:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
20540
x-xss-protection
1; mode=block
server
cafe
etag
15474118547071132244
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Wed, 10 Oct 2018 12:49:01 GMT
4882cf10-cfc6-485d-b1bb-e6671c53a85d
beacon-eu-ams3.rubiconproject.com/beacon/d/ Frame 7312
43 B
268 B
Image
General
Full URL
https://beacon-eu-ams3.rubiconproject.com/beacon/d/4882cf10-cfc6-485d-b1bb-e6671c53a85d?oo=51&accountId=9818&siteId=59604&zoneId=283812&sizeId=15&e=6A1E40E384DA563B5C613489D2B747715E9A162173A0A4977AFE5F6E277F5FE38FA00CE119A8ED8382AC7B7A68E956929F0BE1F8337FD75D4D26086CC47FEBA1C812EDE9BBC3917A3570ECD3831C9446AC237D6FA0EBFC9ADFFA16DC2C67B3083CF4CCB1A6C13E42F5BE0B04AD33F58D33F8630F2FDB6069
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.27 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
Rubicon Project /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:01 GMT
Cache-Control
private, max-age=0, no-cache
Server
Rubicon Project
Content-Type
image/webp
Content-Length
43
Expires
01 Jan 1970 10:00:00 GMT
integrator.js
adservice.google.de/adsid/ Frame 7312
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 10 Oct 2018 12:49:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
integrator.js
adservice.google.com/adsid/ Frame 7312
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81f::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 10 Oct 2018 12:49:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
ca-pub-1991679624331369.js
pagead2.googlesyndication.com/pub-config/r20160913/ Frame 7312
68 B
145 B
Script
General
Full URL
https://pagead2.googlesyndication.com/pub-config/r20160913/ca-pub-1991679624331369.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:817::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8ba131a677ea1357ae7fdc95d6a5c67c3b02d171bb286f6c9ec6bce3cef5c211
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 06:27:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
age
22875
content-type
text/javascript
status
200
cache-control
public, max-age=43200
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
88
x-xss-protection
1; mode=block
expires
Wed, 10 Oct 2018 18:27:46 GMT
usync.html
eus.rubiconproject.com/ Frame 8906
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Tue, 09 Oct 2018 10:25:22 GMT
Content-Encoding
gzip
Content-Length
7375
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=23673
Expires
Wed, 10 Oct 2018 19:23:34 GMT
Date
Wed, 10 Oct 2018 12:49:01 GMT
Connection
keep-alive
Vary
Accept-Encoding
domains
api.viglink.com/api/
42 B
721 B
XHR
General
Full URL
https://api.viglink.com/api/domains
Requested by
Host: cdn.viglink.com
URL: https://cdn.viglink.com/api/vglnk.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.76.79.78 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-76-79-78.eu-west-1.compute.amazonaws.com
Software
Apache-Coyote/1.1 /
Resource Hash
2aa2ca2e069a7dd83f1207a67a8c268fdf7d1ab0d84d770502731aa4885dace8

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:01 GMT
Server
Apache-Coyote/1.1
P3P
CP="ALL IND DSP COR CUR ADM TAIo PSDo OUR COM INT NAV PUR STA UNI"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript;charset=UTF-8
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT
/
disqus.com/embed/comments/ Frame 90BE
0
0
Document
General
Full URL
https://disqus.com/embed/comments/?base=default&f=zdnet-1&t_i=7a12161d-2a5f-4793-b0a4-9fac038733de&t_u=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&t_e=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks&t_d=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks&t_t=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks&s_o=default
Requested by
Host: zdnet-1.disqus.com
URL: https://zdnet-1.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.0.134 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ 'unsafe-inline' https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ https://apis.google.com https://www.google.com/recaptcha/ https://disqus.com
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Host
disqus.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Server
nginx
Content-Security-Policy
script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ 'unsafe-inline' https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ https://apis.google.com https://www.google.com/recaptcha/ https://disqus.com
Link
<https://c.disquscdn.com>;rel=preconnect,<https://c.disquscdn.com>;rel=dns-prefetch
Cache-Control
stale-if-error=3600, s-stalewhilerevalidate=3600, stale-while-revalidate=30, no-cache, must-revalidate, public, s-maxage=5
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Timing-Allow-Origin
*
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Content-Type
text/html; charset=utf-8
Last-Modified
Mon, 01 Oct 2018 18:00:47 GMT
ETag
W/"lounge:view:6942488675.60137d841b47fd0b8991807746eb7d0e.2"
Content-Encoding
gzip
Content-Length
3088
Date
Wed, 10 Oct 2018 12:49:02 GMT
Age
0
Connection
keep-alive
Vary
Accept-Encoding
Strict-Transport-Security
max-age=300; includeSubdomains
n.js
geo.moatads.com/ Frame DEDB
106 B
370 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&i=CBSDFPCW2&hp=1&cm=22&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1539175741950&de=890287857394&m=0&ar=7680696953-clean&q=2&cb=0&cu=1539175741950&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25477209%3A2356361194%3A4745974454%3A138239360681&zMoatPS=nav&zMoatPT=article&zMoatW=7&zMoatH=7&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatSN=d&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=nav-ad&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=nav-ad-5bbdf53947f65&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=nav&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=7x7&zMoatSZPS=7x7%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&fs=151613&na=736617968&cs=0&callback=MoatSuperV26.gna37567
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.130.107.65 Cambridge, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-130-107-65.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
5de16425fc46b1c23b5427554e23491616c0af3470de4b25d34947c033600318

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:02 GMT
Server
nginx/1.7.9
Etag
"af00457c8ba4a9395458cd7a09b001e4d3e13492"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
106
n.js
geo.moatads.com/ Frame F33E
106 B
370 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&i=CBSDFPCW2&hp=1&cm=47&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1539175742000&de=216954221504&m=0&ar=7680696953-clean&q=6&cb=0&cu=1539175742000&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25299489%3A251370729%3A253246569%3A75374362809&zMoatPS=top&zMoatPT=article&zMoatW=728&zMoatH=90&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatSN=d&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=leader-plus-top&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=leader-plus-top-5bbdf53947f65&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=728x90&zMoatSZPS=728x90%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&fs=151613&na=250414091&cs=0&callback=MoatSuperV26.gna26382
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.130.107.65 Cambridge, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-130-107-65.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
c7b9985febccaa78b12c774361ad32452e5cef43e2d9f4bc41080c0882637c7b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:02 GMT
Server
nginx/1.7.9
Etag
"34ff0b28e9cb197f3e0ae771e70f5df81e4b3727"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
106
truncated
/ Frame 7312
207 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5ab486872cf2e598b65ac15aaea96261b56e61314d6ce3b9261d3b2694d53e80

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
n.js
geo.moatads.com/ Frame 7312
107 B
371 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&i=CBSDFPCW2&hp=1&cm=24&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1539175742084&de=926853331262&m=0&ar=7680696953-clean&q=10&cb=0&cu=1539175742084&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25299489%3A251370729%3A253246569%3A75375443409&zMoatPS=top&zMoatPT=article&zMoatW=300&zMoatH=250&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatSN=d&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=mpu-plus-top&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=mpu-plus-top-5bbdf53947f65&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=300x250&zMoatSZPS=300x250%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&fs=151613&na=1893828087&cs=0&callback=MoatSuperV26.gna648840
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.130.107.65 Cambridge, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-130-107-65.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
3688949bbc10e481cda24aee833bff3482226d1af82a6ac047c5f2824e514beb

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:02 GMT
Server
nginx/1.7.9
Etag
"6a539b3e4af5d51c8d93aea10fb8c664edf29997"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
107
n.js
geo.moatads.com/ Frame 945D
107 B
371 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&i=CBSDFPCW2&hp=1&cm=19&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1539175742144&de=876188246636&m=0&ar=7680696953-clean&q=14&cb=0&cu=1539175742144&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25477209%3A2356361194%3A4745571990%3A138239321463&zMoatPS=bottom&zMoatPT=article&zMoatW=300&zMoatH=250&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatSN=d&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=mpu-bottom&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=mpu-bottom-5bbdf53947f65&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=bottom&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=300x250&zMoatSZPS=300x250%20%7C%20bottom&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&fs=151613&na=1200758331&cs=0&callback=MoatSuperV26.gna291572
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.130.107.65 Cambridge, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-130-107-65.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
ca9151ea45cc03d72461ee82b23c3ba8d26649b5aee64f89b98f287787c3278a

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:02 GMT
Server
nginx/1.7.9
Etag
"05176e172961aabe9cb2dfbb52bc242b853056c0"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
107
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CBSDFPCW2&hp=1&cm=19&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1539175742144&de=876188246636&m=0&ar=7680696953-clean&q=15&cb=0&cu=1539175742144&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25477209%3A2356361194%3A4745571990%3A138239321463&zMoatPS=bottom&zMoatPT=article&zMoatW=300&zMoatH=250&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatSN=d&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=mpu-bottom&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=mpu-bottom-5bbdf53947f65&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=bottom&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=300x250&zMoatSZPS=300x250%20%7C%20bottom&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&fs=151613&na=1501283874&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:02 GMT
n.js
geo.moatads.com/ Frame 5BA5
106 B
370 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&i=CBSDFPCW2&hp=1&cm=10&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1539175742182&de=717222155508&m=0&ar=7680696953-clean&q=18&cb=0&cu=1539175742182&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=29759169%3A148224849%3A236907969%3A72087703209&zMoatPS=top&zMoatPT=article&zMoatW=371&zMoatH=771&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatSN=d&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=dynamic-showcase-top&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=dynamic-showcase-top-5bbdf53947f65&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=371x771&zMoatSZPS=371x771%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&fs=151613&na=1472235132&cs=0&callback=MoatSuperV26.gna731802
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.130.107.65 Cambridge, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-130-107-65.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
2066d81684dfa18b109a722b57cd0b9c1f3bdab2597fba970c503521f355aedd

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:02 GMT
Server
nginx/1.7.9
Etag
"8bebf420080fcec4f01c86f2051a6e441dd1c571"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
106
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/cbsinteractive-zdnet/loader.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
172.227.85.103 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a172-227-85-103.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d0fd74148f4cbe78bd0e6328dc5ce5955f0a0ecdb1eb2919da4a7e596ac65912

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:02 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
901
Expires
Thu, 11 Oct 2018 12:49:02 GMT
load.js
widget.perfectmarket.com/cbsinteractive-zdnet/
13 KB
5 KB
Script
General
Full URL
https://widget.perfectmarket.com/cbsinteractive-zdnet/load.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/cbsinteractive-zdnet/loader.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.193.181 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1d1eab2e9d5b36e1297db68599d3e9c3df71869a0863fb261972b93e919d7af1

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
rwr9L97XovW8QPypI62jHvd7E2HiNZm2
content-encoding
gzip
etag
"fc0de48a0976cde02ddee0bd49a81832"
age
188
x-cache
HIT, HIT
status
200
content-length
4742
x-amz-id-2
Du2Thh1Ka6WRayJ6fvnN5AJZk2wclYM0q/rCUwIfdbZaN/grivZmFUvun8T+tYPdpCbNeIwoJGk=
x-served-by
cache-lax8648-LAX, cache-fra19143-FRA
last-modified
Thu, 20 Oct 2016 17:48:07 GMT
server
AmazonS3
x-timer
S1539175742.343133,VS0,VE0
date
Wed, 10 Oct 2018 12:49:02 GMT
vary
Accept-Encoding
x-amz-request-id
1B068AADBD5D8171
via
1.1 varnish, 1.1 varnish
cache-control
max-age=300
accept-ranges
bytes
content-type
binary/octet-stream
x-cache-hits
1, 2
impl.327-86-RELEASE.js
cdn.taboola.com/libtrc/
457 KB
126 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/impl.327-86-RELEASE.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/cbsinteractive-zdnet/loader.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
0e989277fc850cc66671bbc34e16bdb16ce06a62aff5244474d0f07836df4de5

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
QSU4KczbNL4xXZh6.6G1kckmEKZ_iwAo
content-encoding
gzip
etag
"aecfe3ff2b64c1bdddbe7b87c46a9e8f"
age
225
x-cache
HIT
status
200
x-amz-replication-status
PENDING
content-length
128266
x-amz-id-2
rAHPlwY7wIMmN8otmL8D3lUV1NRUvFb3WReuhYX5EkBgv+sV9NvQ+QqudJmYa2o+9nhVzg3EAF4=
x-served-by
cache-hhn1549-HHN
last-modified
Wed, 10 Oct 2018 12:45:14 GMT
server
AmazonS3
x-timer
S1539175742.299966,VS0,VE0
date
Wed, 10 Oct 2018 12:49:02 GMT
vary
Accept-Encoding
x-amz-request-id
93FC750392243F63
via
1.1 varnish
cache-control
private,max-age=31536000
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
x-cache-hits
4817
n.js
geo.moatads.com/ Frame 0384
107 B
371 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&i=CBSDFPCW2&hp=1&cm=14&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1539175742310&de=399276656800&m=0&ar=7680696953-clean&q=22&cb=0&cu=1539175742310&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25477209%3A2356361194%3A4745166436%3A138239321298&zMoatPS=top&zMoatPT=article&zMoatW=1600&zMoatH=1000&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatSN=d&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=skin&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=skin-5bbdf53947f65&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=1600x1000&zMoatSZPS=1600x1000%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&fs=151613&na=454882484&cs=0&callback=MoatSuperV26.gna529714
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.130.107.65 Cambridge, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-130-107-65.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
5ace9cdb775c1ee3ecf0cb08c15a439bce90080ab9ab1dfeceabdf26545096ce

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:02 GMT
Server
nginx/1.7.9
Etag
"aa311d1c47db6b6b85625ae7c9542e7bcedd06a9"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
107
n.js
geo.moatads.com/ Frame 0E18
103 B
367 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&i=CBSDFPCW2&hp=1&cm=26&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1539175742376&de=41331287829&m=0&ar=7680696953-clean&q=26&cb=0&cu=1539175742376&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25299489%3A251370729%3A241984809%3A75375443409&zMoatPS=middle&zMoatPT=article&zMoatW=300&zMoatH=250&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatSN=d&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=mpu-middle&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=mpu-middle-5bbdf53947f65&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=middle&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=300x250&zMoatSZPS=300x250%20%7C%20middle&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&fs=151613&na=1299601055&cs=0&callback=MoatSuperV26.gna96826
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.130.107.65 Cambridge, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-130-107-65.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
8ba2784489592226d865debf2f0e5fc9f9bb0885a79e5a290ad192cf7c0021fc

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:02 GMT
Server
nginx/1.7.9
Etag
"db989361ffa847fffdb7384c43f9369ba9fdae0a"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
103
n.js
geo.moatads.com/ Frame 2FA4
107 B
371 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&i=CBSDFPCW2&hp=1&cm=34&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1539175742510&de=652878209426&m=0&ar=7680696953-clean&q=30&cb=0&cu=1539175742510&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25299489%3A251370729%3A241984809%3A75374362809&zMoatPS=bottom&zMoatPT=article&zMoatW=728&zMoatH=90&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatSN=d&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=leader-plus-bottom&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=leader-plus-bottom-5bbdf53947f65&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=bottom&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=728x90&zMoatSZPS=728x90%20%7C%20bottom&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&fs=151613&na=1252404127&cs=0&callback=MoatSuperV26.gna282937
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.130.107.65 Cambridge, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-130-107-65.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
6f87b5e432074da8330ea49f0463a7f5aac13472d02ae09668444cf59fc3dd7a

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:02 GMT
Server
nginx/1.7.9
Etag
"9a8f3b917aeeec0e23d110358e4bd1f54737a269"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
107
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=18&fi=0&apd=36&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75374362809&S1id=23605329&S2id=23619609&ord=1539175742000&r=216954221504&t=meas&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=1&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:02 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=566&fi=0&apd=584&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75374362809&S1id=23605329&S2id=23619609&ord=1539175742000&r=216954221504&t=hdn&os=1&fi2=0&div1=0&ait=274&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=2&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:02 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=10&fi=1&apd=19&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1539175742084&r=926853331262&t=meas&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=1&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:02 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=10&fi=1&apd=19&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1539175742084&r=926853331262&t=fv&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=2&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:02 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=514&fi=1&apd=523&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1539175742084&r=926853331262&t=hdn&os=1&fi2=0&div1=0&ait=252&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=3&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:02 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=514&fi=1&apd=523&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1539175742084&r=926853331262&t=nht&os=1&fi2=0&div1=0&ait=252&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=4&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:02 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CBSDFPCW2&hp=1&cm=10&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1539175742182&de=717222155508&m=0&ar=7680696953-clean&q=19&cb=0&cu=1539175742182&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=29759169%3A148224849%3A236907969%3A72087703209&zMoatPS=top&zMoatPT=article&zMoatW=371&zMoatH=771&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatSN=d&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=dynamic-showcase-top&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=dynamic-showcase-top-5bbdf53947f65&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=371x771&zMoatSZPS=371x771%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&fs=151613&na=793922155&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:02 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=27&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=241984809&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1539175742376&r=41331287829&t=meas&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=1&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:02 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=322&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=241984809&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1539175742376&r=41331287829&t=hdn&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=2&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:02 GMT
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=7&c2=13739933&c3=20121515121&ns__t=1539175742729&ns_c=UTF-8&cv=3.1&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazi...
  • https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1539175742729&ns_c=UTF-8&cv=3.1&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Braz...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1539175742729&ns_c=UTF-8&cv=3.1&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c9=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
172.227.85.103 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a172-227-85-103.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1539175742729&ns_c=UTF-8&cv=3.1&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c9=
Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
pmk-201618008.1.js
widget.perfectmarket.com/cbsinteractive-zdnet/
323 KB
89 KB
Script
General
Full URL
https://widget.perfectmarket.com/cbsinteractive-zdnet/pmk-201618008.1.js
Requested by
Host: widget.perfectmarket.com
URL: https://widget.perfectmarket.com/cbsinteractive-zdnet/load.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.193.181 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
4f72e8df44e82a8066b16ca8ab2d59f8f9ef21fa52c07d8554972f48b5105f13

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
bVoOWfmxkMrYwv2s6Uu9D96fE._5IBqu
content-encoding
gzip
etag
"da73fb2066df9f51d08b6688cfb35441"
age
30416161
x-cache
HIT, HIT
status
200
content-length
91236
x-amz-id-2
T2A7wWXMDNgx2Z35EWhae8i8jDSVEo/Aqmbmta3HbEBKVMhwoZJKjGQuEf/CaAEiaINfKwR6uJs=
x-served-by
cache-lax8642-LAX, cache-fra19143-FRA
last-modified
Thu, 20 Oct 2016 17:47:53 GMT
server
AmazonS3
x-timer
S1539175743.733372,VS0,VE0
date
Wed, 10 Oct 2018 12:49:02 GMT
vary
Accept-Encoding
x-amz-request-id
58FF20717A687DE4
via
1.1 varnish, 1.1 varnish
cache-control
max-age=31536000
accept-ranges
bytes
content-type
text/javascript
x-cache-hits
749, 4635
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=11&fi=1&apd=22&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25477209&L2id=2356361194&L3id=4745166436&L4id=138239321298&S1id=23605329&S2id=23619609&ord=1539175742310&r=399276656800&t=meas&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=1&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:02 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=11&fi=1&apd=22&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25477209&L2id=2356361194&L3id=4745166436&L4id=138239321298&S1id=23605329&S2id=23619609&ord=1539175742310&r=399276656800&t=fv&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=2&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:02 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=361&fi=1&apd=372&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25477209&L2id=2356361194&L3id=4745166436&L4id=138239321298&S1id=23605329&S2id=23619609&ord=1539175742310&r=399276656800&t=hdn&os=1&fi2=0&div1=0&ait=175&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=3&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:02 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=47&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=241984809&L4id=75374362809&S1id=23605329&S2id=23619609&ord=1539175742510&r=652878209426&t=meas&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=1&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:02 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=246&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=241984809&L4id=75374362809&S1id=23605329&S2id=23619609&ord=1539175742510&r=652878209426&t=hdn&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=2&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:02 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=246&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=241984809&L4id=75374362809&S1id=23605329&S2id=23619609&ord=1539175742510&r=652878209426&t=nht&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=3&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:02 GMT
ads
securepubads.g.doubleclick.net/gampad/ Frame 5BA5
27 KB
7 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=141678101292962&correlator=2119933407440408&output=json_html&callback=googletag.impl.pubads.callbackProxy1&impl=fifs&adsid=NT&json_a=1&eid=21062627%2C21062288%2C21062625&vrg=264&guci=1.2.0.0.2.2.0&sc=1&sfv=1-0-29&iu_parts=8264%2Cuk-zdnet%2Csecurity&enc_prev_ius=%2F0%2F1%2F2%2C%2F0%2F1%2F2&prev_iu_szs=372x142%2C372x142&prev_scp=env%3Dprod%26session%3Dd%26subses%3D2%26ptype%3Darticle%26vguid%3D7162bf48-0ccd-4007-b28c-e5153fda4868%7Cenv%3Dprod%26session%3Dd%26subses%3D2%26ptype%3Darticle%26vguid%3D7162bf48-0ccd-4007-b28c-e5153fda4868&cookie_enabled=1&cdm=www.zdnet.com&bc=7&lmt=1539175742&dt=1539175742801&dlt=1539175740481&idt=2294&frm=23&biw=1585&bih=1200&isw=371&ish=771&oid=3&adxs=0%2C0&adys=0%2C0&adks=3261246841%2C3261246840&gut=v2&ifi=1&ifk=821850233&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&nhd=1&iag=3&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&top=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&dssz=16&icsg=43552&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x0%7C0x0&msz=0x0%7C0x0&ga_vid=945646502.1539175743&ga_sid=1539175743&ga_hid=362153490&fws=128%2C128
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_264.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.98 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
cafe /
Resource Hash
03fb3585bb31ac085b7b0a7f3de3080edd446862883f9db6226347bac673a8e3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com

Response headers

date
Wed, 10 Oct 2018 12:49:02 GMT
content-encoding
gzip
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
7262
x-xss-protection
1; mode=block
google-lineitem-id
4746066197,4746066197
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138239479696,138239375540
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_264.js
securepubads.g.doubleclick.net/gpt/ Frame 5BA5
75 KB
27 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_264.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_264.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.98 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
sffe /
Resource Hash
69f010ce6969b6ef9a337ee45c7d1b35fe5b6e83e10a1f035f166c1ad1f1e7b2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:02 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 08 Oct 2018 14:47:44 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27712
x-xss-protection
1; mode=block
expires
Wed, 10 Oct 2018 12:49:02 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-29/html/ Frame 5BA5
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-29/html/container.html?n=1
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_264.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81d::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Purpose
prefetch
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

expires
Wed, 02 Oct 2019 10:29:21 GMT
cache-control
public, immutable, max-age=31536000
last-modified
Mon, 11 Jun 2018 14:38:59 GMT
content-type
text/html
ads
googleads.g.doubleclick.net/pagead/ Frame 4B4B
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=90&slotname=3084619100&adk=3828543735&adf=4077151315&w=728&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1539175741678&bpp=54&bdt=1198&fdt=60&idt=1162&shv=r20181008&cbv=r20180604&saldr=sa&correlator=5564504658635&frm=23&ife=5&pv=2&ga_vid=1393442137.1539175743&ga_sid=1539175743&ga_hid=545914389&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=429&ady=5554&biw=1585&bih=1200&isw=728&ish=90&ifk=1649710351&scr_x=0&scr_y=0&eid=21060853%2C828064255&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C728%2C90&vis=1&rsz=%7C%7CopeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=4066913089&ifi=1&fsb=1&dtd=1198
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/show_ads_impl.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:80b::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-1991679624331369&output=html&h=90&slotname=3084619100&adk=3828543735&adf=4077151315&w=728&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1539175741678&bpp=54&bdt=1198&fdt=60&idt=1162&shv=r20181008&cbv=r20180604&saldr=sa&correlator=5564504658635&frm=23&ife=5&pv=2&ga_vid=1393442137.1539175743&ga_sid=1539175743&ga_hid=545914389&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=429&ady=5554&biw=1585&bih=1200&isw=728&ish=90&ifk=1649710351&scr_x=0&scr_y=0&eid=21060853%2C828064255&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C728%2C90&vis=1&rsz=%7C%7CopeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=4066913089&ifi=1&fsb=1&dtd=1198
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
gzip
date
Wed, 10 Oct 2018 12:49:03 GMT
server
cafe
cache-control
private
content-length
17576
x-xss-protection
1; mode=block
set-cookie
test_cookie=CheckForPermission; expires=Wed, 10-Oct-2018 13:04:02 GMT; path=/; domain=.doubleclick.net
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
expires
Wed, 10 Oct 2018 12:49:03 GMT
osd.js
pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/ Frame 2FA4
73 KB
27 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/osd.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/show_ads_impl.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:817::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
fdfc01efb2956b260c841eadb2948b85dda3184d9a933541e933e70ed188817a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 09 Oct 2018 04:32:06 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
116216
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27010
x-xss-protection
1; mode=block
server
cafe
etag
4497184731343855560
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Tue, 23 Oct 2018 04:32:06 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=906&fi=0&apd=924&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75374362809&S1id=23605329&S2id=23619609&ord=1539175742000&r=216954221504&t=nht&os=1&fi2=0&div1=0&ait=614&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=3&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:02 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CBSDFPCW2&hp=1&cm=14&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1539175742310&de=399276656800&m=0&ar=7680696953-clean&q=23&cb=0&cu=1539175742310&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25477209%3A2356361194%3A4745166436%3A138239321298&zMoatPS=top&zMoatPT=article&zMoatW=1600&zMoatH=1000&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatSN=d&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=skin&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=skin-5bbdf53947f65&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=1600x1000&zMoatSZPS=1600x1000%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&fs=151613&na=515595181&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:02 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=617&fi=1&apd=628&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25477209&L2id=2356361194&L3id=4745166436&L4id=138239321298&S1id=23605329&S2id=23619609&ord=1539175742310&r=399276656800&t=nht&os=1&fi2=0&div1=0&ait=431&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=4&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:02 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=577&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=241984809&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1539175742376&r=41331287829&t=nht&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=3&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:02 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:02 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/ Frame 9A07
196 KB
0
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:817::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
7b21595c32caa7b47cec4b349b47e05298c32c5cf065915c2bc6058c1d7f7522
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

date
Wed, 10 Oct 2018 12:49:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
74377
x-xss-protection
1; mode=block
server
cafe
etag
1244184442415605674
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Wed, 10 Oct 2018 12:49:01 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 4720
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=250&slotname=8385808081&adk=1919950094&adf=4077151325&w=300&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1539175741771&bpp=37&bdt=1293&fdt=1340&idt=1342&shv=r20181008&cbv=r20180604&saldr=sa&correlator=5564504658635&frm=23&ife=5&pv=1&ga_vid=768515829.1539175743&ga_sid=1539175743&ga_hid=1354558742&ga_fc=0&iag=3&icsg=693856&nhd=1&dssz=21&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1043&ady=1501&biw=1585&bih=1200&isw=300&ish=250&ifk=1789179933&scr_x=0&scr_y=0&eid=21060853%2C214678100%2C828064255&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=3832671437&ifi=1&fsb=1&dtd=1365
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/show_ads_impl.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:80b::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-1991679624331369&output=html&h=250&slotname=8385808081&adk=1919950094&adf=4077151325&w=300&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1539175741771&bpp=37&bdt=1293&fdt=1340&idt=1342&shv=r20181008&cbv=r20180604&saldr=sa&correlator=5564504658635&frm=23&ife=5&pv=1&ga_vid=768515829.1539175743&ga_sid=1539175743&ga_hid=1354558742&ga_fc=0&iag=3&icsg=693856&nhd=1&dssz=21&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1043&ady=1501&biw=1585&bih=1200&isw=300&ish=250&ifk=1789179933&scr_x=0&scr_y=0&eid=21060853%2C214678100%2C828064255&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=3832671437&ifi=1&fsb=1&dtd=1365
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
cookie
test_cookie=CheckForPermission
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
gzip
date
Wed, 10 Oct 2018 12:49:03 GMT
server
cafe
cache-control
private
content-length
18958
x-xss-protection
1; mode=block
set-cookie
IDE=AHWqTUnloAKub989RJaHyOk0sPmO7S5G1xDfQyzyGzrx14umIr97ty99JVK8xd_H; expires=Mon, 04-Nov-2019 12:49:03 GMT; path=/; domain=.doubleclick.net; HttpOnly test_cookie=; domain=.doubleclick.net; path=/; expires=Mon, 21 Jul 2008 23:59:00 GMT
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
expires
Wed, 10 Oct 2018 12:49:03 GMT
osd.js
pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/ Frame 0E18
73 KB
26 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/osd.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/show_ads_impl.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:817::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
fdfc01efb2956b260c841eadb2948b85dda3184d9a933541e933e70ed188817a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 09 Oct 2018 04:32:06 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
116217
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27010
x-xss-protection
1; mode=block
server
cafe
etag
4497184731343855560
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Tue, 23 Oct 2018 04:32:06 GMT
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/ Frame E06B
74 KB
0
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81d::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e195ed8d9e79ce4d32ac163cb8e9101fcc6bea6a812a30d58a6d73515ddd3329
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

date
Mon, 08 Oct 2018 13:12:18 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
171403
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27477
x-xss-protection
1; mode=block
server
cafe
etag
1272360511746383795
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Mon, 22 Oct 2018 13:12:18 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame E06B
282 KB
0
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_264.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
3c8d46ce7a439b972f3f0a6e442465ba93031aa02cbdf1ad2d620b70234be45a

Request headers

Response headers

Date
Wed, 10 Oct 2018 12:49:01 GMT
Content-Encoding
gzip
Last-Modified
Thu, 13 Sep 2018 20:59:52 GMT
Server
AmazonS3
x-amz-request-id
25D6AC8AA22D4A26
ETag
"1adf55d105640034a34014345c541efc"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=50233
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88359
x-amz-id-2
XgrK90nFu+RTGPmnsbtpaMjO0xIuzs8X3D7CVFzI25+zRLJg+UsPX9huUfAb0h3qu/C4frICOsI=
osd.js
pagead2.googlesyndication.com/pagead/ Frame 5BA5
73 KB
26 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/osd.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_264.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:817::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
fdfc01efb2956b260c841eadb2948b85dda3184d9a933541e933e70ed188817a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:22:25 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1598
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27010
x-xss-protection
1; mode=block
server
cafe
etag
4497184731343855560
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=3600
timing-allow-origin
*
expires
Wed, 10 Oct 2018 13:22:25 GMT
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/ Frame CAAC
74 KB
0
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181008/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81d::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e195ed8d9e79ce4d32ac163cb8e9101fcc6bea6a812a30d58a6d73515ddd3329
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

date
Mon, 08 Oct 2018 13:12:18 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
171403
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27477
x-xss-protection
1; mode=block
server
cafe
etag
1272360511746383795
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Mon, 22 Oct 2018 13:12:18 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame CAAC
282 KB
0
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_264.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
3c8d46ce7a439b972f3f0a6e442465ba93031aa02cbdf1ad2d620b70234be45a

Request headers

Response headers

Date
Wed, 10 Oct 2018 12:49:01 GMT
Content-Encoding
gzip
Last-Modified
Thu, 13 Sep 2018 20:59:52 GMT
Server
AmazonS3
x-amz-request-id
25D6AC8AA22D4A26
ETag
"1adf55d105640034a34014345c541efc"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=50233
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88359
x-amz-id-2
XgrK90nFu+RTGPmnsbtpaMjO0xIuzs8X3D7CVFzI25+zRLJg+UsPX9huUfAb0h3qu/C4frICOsI=
view
securepubads.g.doubleclick.net/pcs/ Frame E06B
0
269 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvpqooYqKRxpa7g3iSd01rzVTNoWuYhOvQdd9tJJ44TZU9EYK9tX66t28P12HHy53rKA5_QyIpamhU186KYHOdZbHXjX829T7M9PiyS4-l2T6dO9tnst9jtxLoDLQia7n41vT0eaUU2FzogGFl4-hRAwsc1E7Thk5IBZ9ZmIejZ_udU4YNewDlgVIoujCJXQTPFeQGpQv-hzA2Z1gC8IFM2GJEdejEhP0ypQYfRM5xc5pNwtrkQJMp1dT4X9R-3hQ&sai=AMfl-YR2oMXrxGxzRVepRltsQkiQzGRg9PoFhhCsR1r0qFFRb81LLUQSR8zzskco-pVnEeWsOiNnwogarjG4LSJSQQs7Xeuaav8Puj9nMpeG&sig=Cg0ArKJSzG1NKcbF_NcKEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.98 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 10 Oct 2018 12:49:03 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
expires
Wed, 10 Oct 2018 12:49:03 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame CAAC
0
244 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuDdOZRk6uTijRAqmNUrANd3M_x7dNDs9Ls_qmI0Z2665ZoYhIZR58fzvDPSOcvJS62KgnqfySgd7qR1xo9qUc0-41W51F4PO4-_-CyfLaZOBxkqi6fSvqX7nKoijfPGozHTOHCeaMmZHKSSOG8ocjV5TgzOKz2OPtHYofHMRkJXuJtbNBKD0h4vhDm4J0zuK2zxLujlCHp2AByihzS0_v-3SAVVJxAdSjc4-GEJxYNjW6SZ8gAcaQZF3g_wuGZHA&sai=AMfl-YRxZSwgvLa1iGQ8VoA5NNC1cNNb35yU9owHmjlrAIUI52CmPKSc0Ia7r-WnTqkBEcm8ViITW_jXDryhpgpaiE7lJv9m8jOy3iHgZpHu&sig=Cg0ArKJSzAQ3Vi8ATAjzEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
172.217.22.98 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 10 Oct 2018 12:49:03 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
expires
Wed, 10 Oct 2018 12:49:03 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=840&tet=1152&fi=1&apd=1161&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1539175742084&r=926853331262&t=iv&os=1&fi2=0&div1=1&ait=890&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=5&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:03 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:03 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=924&tet=1254&fi=0&apd=1272&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75374362809&S1id=23605329&S2id=23619609&ord=1539175742000&r=216954221504&t=iv&os=1&fi2=0&div1=1&ait=962&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=4&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:03 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:03 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&kq=1&lo=0&qs=1&ak=https%3A%2F%2Fwww.zdnet.com%2F%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2FBODY&i=CBSDFPCW2&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&bq=0&wp=3&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=1200&w=1600&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&cm=14&f=0&j=&o=3&t=1539175742310&de=399276656800&cu=1539175742310&m=34&ar=7680696953-clean&cb=0&ll=2&lm=0&ln=1&r=0&dl=0&dm=1000&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5969&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&as=0&ag=11&an=0&gf=11&gg=0&ix=11&ic=11&ez=1&aj=1&pg=100&pf=0&cc=0&bw=11&bx=0&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=22&cd=0&ah=22&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=25477209%3A2356361194%3A4745166436%3A138239321298&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=1600x1000&zMoatPS=top&zMoatSZPS=1600x1000%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&zMoatW=1600&zMoatH=1000&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatSN=d&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=skin&zMoatDfpSlotId=skin-5bbdf53947f65&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=1%3A1&fs=151613&na=2080101609&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:03 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:03 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/ Frame 9932
196 KB
0
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:817::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
7b21595c32caa7b47cec4b349b47e05298c32c5cf065915c2bc6058c1d7f7522
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

date
Wed, 10 Oct 2018 12:49:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
74377
x-xss-protection
1; mode=block
server
cafe
etag
1244184442415605674
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Wed, 10 Oct 2018 12:49:01 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 6583
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=90&slotname=3084619100&adk=3828543735&adf=4077151327&w=728&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1539175741840&bpp=20&bdt=1364&fdt=1444&idt=1445&shv=r20181008&cbv=r20180604&saldr=sa&correlator=5564504658635&frm=23&ife=5&pv=1&ga_vid=17796702.1539175743&ga_sid=1539175743&ga_hid=1152038625&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=429&ady=393&biw=1585&bih=1200&isw=728&ish=90&ifk=2834320770&scr_x=0&scr_y=0&eid=21060853%2C828064255%2C20196256&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C728%2C90&vis=1&rsz=%7C%7CoeE%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=4066913089&ifi=1&fsb=1&dtd=1454
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/show_ads_impl.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:80b::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-1991679624331369&output=html&h=90&slotname=3084619100&adk=3828543735&adf=4077151327&w=728&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1539175741840&bpp=20&bdt=1364&fdt=1444&idt=1445&shv=r20181008&cbv=r20180604&saldr=sa&correlator=5564504658635&frm=23&ife=5&pv=1&ga_vid=17796702.1539175743&ga_sid=1539175743&ga_hid=1152038625&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=429&ady=393&biw=1585&bih=1200&isw=728&ish=90&ifk=2834320770&scr_x=0&scr_y=0&eid=21060853%2C828064255%2C20196256&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C728%2C90&vis=1&rsz=%7C%7CoeE%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=4066913089&ifi=1&fsb=1&dtd=1454
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
cookie
IDE=AHWqTUmsgh8nbFM4wIQRYZjl3tYblJXk5x16txu_HVtEcNcuPaEkW-Oc5yAlD09_
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
gzip
date
Wed, 10 Oct 2018 12:49:03 GMT
server
cafe
cache-control
private
content-length
50923
x-xss-protection
1; mode=block
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
osd.js
pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/ Frame F33E
73 KB
26 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/osd.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/show_ads_impl.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:817::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
fdfc01efb2956b260c841eadb2948b85dda3184d9a933541e933e70ed188817a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 09 Oct 2018 04:32:06 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
116217
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27010
x-xss-protection
1; mode=block
server
cafe
etag
4497184731343855560
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Tue, 23 Oct 2018 04:32:06 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/ Frame 92EF
196 KB
0
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:817::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
7b21595c32caa7b47cec4b349b47e05298c32c5cf065915c2bc6058c1d7f7522
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

date
Wed, 10 Oct 2018 12:49:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
74377
x-xss-protection
1; mode=block
server
cafe
etag
1244184442415605674
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Wed, 10 Oct 2018 12:49:01 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame DFB3
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=250&slotname=8385808081&adk=1919950094&adf=4077151324&w=300&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1539175741887&bpp=12&bdt=1409&fdt=1524&idt=1531&shv=r20181008&cbv=r20180604&saldr=sa&correlator=5564504658635&frm=23&ife=5&pv=1&ga_vid=1952706785.1539175743&ga_sid=1539175743&ga_hid=1604975321&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1043&ady=513&biw=1585&bih=1200&isw=300&ish=250&ifk=2180882631&scr_x=0&scr_y=0&eid=21060853%2C828064255&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CoeE%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=3832671437&ifi=1&fsb=1&dtd=1556
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/show_ads_impl.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:80b::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-1991679624331369&output=html&h=250&slotname=8385808081&adk=1919950094&adf=4077151324&w=300&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1539175741887&bpp=12&bdt=1409&fdt=1524&idt=1531&shv=r20181008&cbv=r20180604&saldr=sa&correlator=5564504658635&frm=23&ife=5&pv=1&ga_vid=1952706785.1539175743&ga_sid=1539175743&ga_hid=1604975321&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1043&ady=513&biw=1585&bih=1200&isw=300&ish=250&ifk=2180882631&scr_x=0&scr_y=0&eid=21060853%2C828064255&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CoeE%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=3832671437&ifi=1&fsb=1&dtd=1556
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
cookie
IDE=AHWqTUnloAKub989RJaHyOk0sPmO7S5G1xDfQyzyGzrx14umIr97ty99JVK8xd_H
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
gzip
date
Wed, 10 Oct 2018 12:49:03 GMT
server
cafe
cache-control
private
content-length
18991
x-xss-protection
1; mode=block
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
osd.js
pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/ Frame 7312
73 KB
26 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/osd.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20181008/r20180604/show_ads_impl.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:817::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
fdfc01efb2956b260c841eadb2948b85dda3184d9a933541e933e70ed188817a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 09 Oct 2018 04:32:06 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
116217
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27010
x-xss-protection
1; mode=block
server
cafe
etag
4497184731343855560
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Tue, 23 Oct 2018 04:32:06 GMT
analytics.js
www.google-analytics.com/
42 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: widget.perfectmarket.com
URL: https://widget.perfectmarket.com/cbsinteractive-zdnet/pmk-201618008.1.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81d::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
316fe2ef7b6caac81936e79571e2e0b742200f1c5b0e02d6bdeeb375eb419026
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 01 Oct 2018 17:56:18 GMT
server
Golfe2
age
1184
date
Wed, 10 Oct 2018 12:29:19 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
17285
expires
Wed, 10 Oct 2018 14:29:19 GMT
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: widget.perfectmarket.com
URL: https://widget.perfectmarket.com/cbsinteractive-zdnet/pmk-201618008.1.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
172.227.85.103 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a172-227-85-103.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d0fd74148f4cbe78bd0e6328dc5ce5955f0a0ecdb1eb2919da4a7e596ac65912

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 10 Oct 2018 12:49:03 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
901
Expires
Thu, 11 Oct 2018 12:49:03 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&kq=1&lo=0&qs=1&ak=-&i=CBSDFPCW2&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&vf=1&vg=100&bq=0&wp=3&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=1200&w=1600&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&cm=14&f=0&j=&o=3&t=1539175742310&de=399276656800&cu=1539175742310&m=1399&ar=7680696953-clean&cb=0&ll=2&lm=0&ln=1&r=0&dl=0&dm=1000&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6299&le=1&lf=398&lg=1&lh=290&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A19%3A-&as=1&ag=1379&an=11&gi=1&gf=1379&gg=11&ix=1379&ic=1379&ez=1&ck=1379&kw=966&aj=1&pg=100&pf=100&cc=1&bw=1379&bx=11&ci=1379&jz=966&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=966&cd=22&ah=966&am=22&rf=0&re=1&ft=1193&fv=0&fw=1193&wb=1&cl=0&at=0&d=25477209%3A2356361194%3A4745166436%3A138239321298&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=1600x1000&zMoatPS=top&zMoatSZPS=1600x1000%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&zMoatW=1600&zMoatH=1000&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatSN=d&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=skin&zMoatDfpSlotId=skin-5bbdf53947f65&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=1%3A1&fs=151613&na=262523426&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:03 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:03 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=966&tet=1379&fi=1&apd=1390&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25477209&L2id=2356361194&L3id=4745166436&L4id=138239321298&S1id=23605329&S2id=23619609&ord=1539175742310&r=399276656800&t=iv&os=1&fi2=0&div1=1&ait=1193&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=5&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:03 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:03 GMT
tboptevent.html
widget.perfectmarket.com/opt/ Frame 3BBC
0
0
Document
General
Full URL
https://widget.perfectmarket.com/opt/tboptevent.html?v=2&a=u&d=%7B%22stp%22%3A%7B%22a%22%3A1%7D%7D
Requested by
Host: widget.perfectmarket.com
URL: https://widget.perfectmarket.com/cbsinteractive-zdnet/pmk-201618008.1.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.193.181 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Varnish /
Resource Hash

Request headers

:method
GET
:authority
widget.perfectmarket.com
:scheme
https
:path
/opt/tboptevent.html?v=2&a=u&d=%7B%22stp%22%3A%7B%22a%22%3A1%7D%7D
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
404
server
Varnish
retry-after
0
accept-ranges
bytes
date
Wed, 10 Oct 2018 12:49:03 GMT
via
1.1 varnish
x-served-by
cache-fra19143-FRA
x-cache
MISS
x-cache-hits
0
x-timer
S1539175744.836005,VS0,VE0
content-length
0
activeview
pagead2.googlesyndication.com/pcs/ Frame F33E
42 B
178 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjstjPeKH5PcERlqOLm0wP1e71agoyXy6wcRaI_1HMeAHIkVD9gEcjOCBfAxfAmD2XpGpPLkus8DUrNC4a_DeVnfrmgO4adxGr4kRxMk&sig=Cg0ArKJSzMRhWO32n0UmEAE&adk=3883059105&tt=2391&bs=1585%2C1200&mtos=1208,1208,1208,1208,1208&tos=1208,0,0,0,0&p=393,429,483,1157&mcvt=1208&rs=3&ht=0&tfs=1197&tls=2405&mc=1&lte=1&bas=0&bac=0&avms=geo&rst=1539175741036&rpt=1579&ps=1585%2C5939&ss=1600%2C1200&pt=15&deb=1-8-8-28-14-16-105-5&tvt=2392&r=v&id=osdim&uc=8&tgt=DIV&cl=1&cec=14&clc=1&cac=0&cd=728x94&v=r20181008
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:817::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 10 Oct 2018 12:49:03 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 7312
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsuTxp-t_L3FiJFc127jn6TEz5XxKR9O8Q8jcihSsmqPq4pKbfQkkvWS8l0woBsLukCSCgfXIVkGKIlIwdvbze_nMB9mLejEpf7VFEc&sig=Cg0ArKJSzD1FrbbefAJBEAE&adk=797870492&tt=2391&bs=1585%2C1200&mtos=1202,1202,1202,1202,1202&tos=1202,0,0,0,0&p=513,1043,763,1343&mcvt=1202&rs=3&ht=0&tfs=1203&tls=2405&mc=1&lte=1&bas=0&bac=0&avms=geo&rst=1539175741051&rpt=1569&ps=1585%2C5939&ss=1600%2C1200&pt=15&deb=1-8-8-28-14-16-105-5&tvt=2392&r=v&id=osdim&uc=8&tgt=DIV&cl=1&cec=14&clc=1&cac=0&cd=300x254&v=r20181008
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:817::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 10 Oct 2018 12:49:03 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
www.google-analytics.com/r/
35 B
111 B
Image
General
Full URL
https://www.google-analytics.com/r/collect?v=1&_v=j70&aip=1&a=1086664752&t=pageview&_s=1&dl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&ul=en-us&de=UTF-8&dt=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=YAhAAEAB~&jid=1975869219&gjid=1196505662&cid=1830778820.1539175740&tid=UA-33613588-22&_gid=1224815690.1539175744&_r=1&cd2=other&z=2069742092
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81d::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 10 Oct 2018 12:49:03 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&kq=1&lo=0&qs=1&ak=-&i=CBSDFPCW2&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&vf=1&vg=100&bq=0&wp=3&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=1200&w=1600&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&cm=14&f=0&j=&o=3&t=1539175742310&de=399276656800&cu=1539175742310&m=1401&ar=7680696953-clean&cb=0&ll=2&lm=0&ln=1&r=0&dl=0&dm=1000&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6299&le=1&lf=398&lg=1&lh=290&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A19%3A-&as=1&ag=1379&an=1379&gi=1&gf=1379&gg=1379&ix=1379&ic=1379&ez=1&ck=1379&kw=966&aj=1&pg=100&pf=100&cc=1&bw=1379&bx=1379&ci=1379&jz=966&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=966&cd=966&ah=966&am=966&rf=0&re=1&ft=1193&fv=1193&fw=1193&wb=1&cl=0&at=0&d=25477209%3A2356361194%3A4745166436%3A138239321298&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=1600x1000&zMoatPS=top&zMoatSZPS=1600x1000%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&zMoatW=1600&zMoatH=1000&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatSN=d&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=skin&zMoatDfpSlotId=skin-5bbdf53947f65&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=1%3A1&fs=151613&na=1452712392&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:03 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:03 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&kq=1&lo=0&qs=1&ak=-&i=CBSDFPCW2&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&vf=1&vg=100&bq=0&wp=3&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=1200&w=1600&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&cm=14&f=0&j=&o=3&t=1539175742310&de=399276656800&cu=1539175742310&m=1402&ar=7680696953-clean&cb=0&ll=2&lm=0&ln=1&r=0&dl=0&dm=1000&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6299&le=1&lf=398&lg=1&lh=290&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A19%3A-&as=1&ag=1379&an=1379&gi=1&gf=1379&gg=1379&ix=1379&ic=1379&ez=1&ck=1379&kw=966&aj=1&pg=100&pf=100&cc=1&bw=1379&bx=1379&ci=1379&jz=966&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=966&cd=966&ah=966&am=966&rf=0&re=1&ft=1193&fv=1193&fw=1193&wb=1&cl=0&at=0&d=25477209%3A2356361194%3A4745166436%3A138239321298&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=1600x1000&zMoatPS=top&zMoatSZPS=1600x1000%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&zMoatW=1600&zMoatH=1000&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatSN=d&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=skin&zMoatDfpSlotId=skin-5bbdf53947f65&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=1%3A1&fs=151613&na=1324006664&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:04 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:04 GMT
tboptevent.html
widget.perfectmarket.com/opt/ Frame 027D
0
0
Document
General
Full URL
https://widget.perfectmarket.com/opt/tboptevent.html?v=2&a=u&d=%7B%22stp%22%3A%7B%22v%22%3A1%7D%7D
Requested by
Host: widget.perfectmarket.com
URL: https://widget.perfectmarket.com/cbsinteractive-zdnet/pmk-201618008.1.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.193.181 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Varnish /
Resource Hash

Request headers

:method
GET
:authority
widget.perfectmarket.com
:scheme
https
:path
/opt/tboptevent.html?v=2&a=u&d=%7B%22stp%22%3A%7B%22v%22%3A1%7D%7D
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
404
server
Varnish
retry-after
0
accept-ranges
bytes
date
Wed, 10 Oct 2018 12:49:04 GMT
via
1.1 varnish
x-served-by
cache-fra19143-FRA
x-cache
MISS
x-cache-hits
0
x-timer
S1539175744.025400,VS0,VE0
content-length
0
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&kq=1&lo=0&qs=1&ak=-&i=CBSDFPCW2&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&vf=1&vg=100&bq=0&wp=3&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=1200&w=1600&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&cm=14&f=0&j=&o=3&t=1539175742310&de=399276656800&cu=1539175742310&m=1402&ar=7680696953-clean&cb=0&ll=2&lm=0&ln=1&r=0&dl=0&dm=1000&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6299&le=1&lf=398&lg=1&lh=290&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A19%3A-&as=1&ag=1379&an=1379&gi=1&gf=1379&gg=1379&ix=1379&ic=1379&ez=1&ck=1379&kw=966&aj=1&pg=100&pf=100&cc=1&bw=1379&bx=1379&ci=1379&jz=966&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1390&cd=966&ah=1390&am=966&rf=0&re=1&ft=1193&fv=1193&fw=1193&wb=1&cl=0&at=0&d=25477209%3A2356361194%3A4745166436%3A138239321298&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=1600x1000&zMoatPS=top&zMoatSZPS=1600x1000%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&zMoatW=1600&zMoatH=1000&zMoatVGUID=7162bf48-0ccd-4007-b28c-e5153fda4868&zMoatSN=d&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=skin&zMoatDfpSlotId=skin-5bbdf53947f65&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=1%3A1&fs=151613&na=1817683289&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:04 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 10 Oct 2018 12:49:04 GMT
json
trc.taboola.com/cbsinteractive-zdnet/trc/3/
11 KB
4 KB
Script
General
Full URL
https://trc.taboola.com/cbsinteractive-zdnet/trc/3/json?tim=12%3A49%3A04.542&data=%7B%22id%22%3A135%2C%22ii%22%3A%22%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%22%2C%22it%22%3A%22text%22%2C%22sd%22%3Anull%2C%22ui%22%3Anull%2C%22uifp%22%3Anull%2C%22vi%22%3A1539175744522%2C%22cv%22%3A%22327-86-RELEASE%22%2C%22uiv%22%3A%22default%22%2C%22u%22%3A%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F%22%2C%22bv%22%3A%220%22%2C%22ul%22%3A%5B%22en-US%22%5D%2C%22cmps%22%3A3%2C%22btv%22%3A%220%22%2C%22cos%22%3A%224g%22%2C%22bad%22%3A-1%2C%22bw%22%3A1600%2C%22sw%22%3A1600%2C%22sh%22%3A1200%2C%22r%22%3A%5B%7B%22li%22%3A%22rbox-t2m%22%2C%22s%22%3A8%2C%22uim%22%3A%22alternating-thumbnails-a%3Aabp%3D0%22%2C%22uip%22%3A%22ZDNETarticleDesktop%2FTablet-Below%20Article%20Thumbnails%22%2C%22orig_uip%22%3A%22ZDNETarticleDesktop%2FTablet-Below%20Article%20Thumbnails%22%2C%22cd%22%3A5349.015625%2C%22mw%22%3A770%7D%5D%2C%22cb%22%3A%22TRC.callbacks.recommendations_1%22%2C%22lt%22%3A%22normal%22%7D
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.327-86-RELEASE.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
1eddce3a056c4e2649041d1345e99e37f6f293fbb863c967c52a4d547db2a0a8

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:04 GMT
content-encoding
gzip
access-control-allow-origin
*
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
status
200
x-cache-hits
0
x-served-by
cache-hhn1549-HHN
server
nginx
x-timer
S1539175745.564540,VS0,VE226
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
access-control-allow-credentials
true
accept-ranges
bytes
expires
Thu, 01 Jan 1970 00:00:00 GMT
f539211219b796ffbb49949997c764f0.png
cdn.taboola.com/libtrc/static/thumbnails/
254 B
699 B
Image
General
Full URL
https://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.327-86-RELEASE.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
f68019eb4b4e5933301d4ee75969e0cb94ed8333bf514630fa749eb9c3e483c9

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
hL.cyLD7Q4TL5ceY.7JQwF9m5IYI8mkC
via
1.1 varnish
etag
"dfa7b52c86e56bd67fa4002f6ed19854"
age
19537987
x-cache
HIT
status
200
x-amz-replication-status
COMPLETED
content-length
254
x-amz-id-2
XvamycYj5i9elo1HIxQVWoqB3bzM0MDs3mgweXjpvYdi7ZZIyzbyvzEvbwKvdJGIx5LiaLJce0k=
x-served-by
cache-hhn1549-HHN
last-modified
Wed, 24 Jun 2015 07:14:11 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:0/gname:root/uname:root/gid:0/mode:33188/mtime:1377415166/atime:1435052450/md5:dfa7b52c86e56bd67fa4002f6ed19854/ctime:1422381567
x-timer
S1539175745.857341,VS0,VE0
date
Wed, 10 Oct 2018 12:49:04 GMT
x-req
/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
x-amz-request-id
093E8082E423E036
cache-control
private,max-age=31536000
accept-ranges
bytes
content-type
image/png
x-cache-hits
6349587
social
trc.taboola.com/cbsinteractive-zdnet/log/3/
0
55 B
Image
General
Full URL
https://trc.taboola.com/cbsinteractive-zdnet/log/3/social?ri=dcc8f1464322cf8420dcf1559bb10c5f&sd=v2_7e5ce7a85192eec812a9794427223983_61048a26-f74d-46cb-babf-201b5beae2d7-tuct2b77ac0_1539175744_1539175744_CNawjgYQzro_GIqImPDlLCABKAEwODib4wlAgooQSJjEF1Cl7BBYAWAA&ui=61048a26-f74d-46cb-babf-201b5beae2d7-tuct2b77ac0&pi=/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&wi=-8074983690569660263&pt=text&vi=1539175744522&st=social-available&d=%7B%22data%22%3A%5B%7B%22i%22%3A%22w%22%2C%22tp%22%3A%22custom-share%22%2C%22nm%22%3A%22facebook%22%2C%22c%22%3A2%2C%22m%22%3A%22stp%22%7D%2C%7B%22i%22%3A%22w%22%2C%22tp%22%3A%22custom-link%22%2C%22nm%22%3A%22twitter%22%2C%22c%22%3A2%2C%22m%22%3A%22stp%22%7D%2C%7B%22i%22%3A%22ctx%22%2C%22ism%22%3Afalse%2C%22srx%22%3A1600%2C%22sry%22%3A1200%2C%22pd%22%3Anull%2C%22tpl%22%3A%22%22%2C%22url%22%3A%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%22%2C%22rref%22%3A%22%22%2C%22sref%22%3A%22_sessionPending_%22%2C%22hdl%22%3A%22%22%2C%22sec%22%3A%22%22%2C%22aut%22%3A%22%22%2C%22img%22%3A%22%22%2C%22v%22%3A13%7D%5D%7D&tim=12%3A49%3A04.941&id=4200&llvl=1&cv=327-86-RELEASE&
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 10 Oct 2018 12:49:04 GMT
via
1.1 varnish
server
nginx
x-timer
S1539175745.944125,VS0,VE22
x-served-by
cache-hhn1549-HHN
status
204
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
access-control-allow-origin
*
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
content-type
image/gif
x-cache-hits
0
social
trc.taboola.com/cbsinteractive-zdnet/log/3/
0
97 B
Image
General
Full URL
https://trc.taboola.com/cbsinteractive-zdnet/log/3/social?ri=dcc8f1464322cf8420dcf1559bb10c5f&sd=v2_7e5ce7a85192eec812a9794427223983_61048a26-f74d-46cb-babf-201b5beae2d7-tuct2b77ac0_1539175744_1539175744_CNawjgYQzro_GIqImPDlLCABKAEwODib4wlAgooQSJjEF1Cl7BBYAWAA&ui=61048a26-f74d-46cb-babf-201b5beae2d7-tuct2b77ac0&pi=/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&wi=-8074983690569660263&pt=text&vi=1539175744522&st=social-visible&d=%7B%22data%22%3A%5B%7B%22i%22%3A%22w%22%2C%22tp%22%3A%22custom-share%22%2C%22nm%22%3A%22facebook%22%2C%22c%22%3A1%2C%22ln%22%3A%22above-fold%22%2C%22lx%22%3A362%2C%22ly%22%3A518%2C%22m%22%3A%22stp%22%2C%22v%22%3A3%7D%2C%7B%22i%22%3A%22w%22%2C%22tp%22%3A%22custom-link%22%2C%22nm%22%3A%22twitter%22%2C%22c%22%3A1%2C%22ln%22%3A%22above-fold%22%2C%22lx%22%3A670%2C%22ly%22%3A518%2C%22m%22%3A%22stp%22%2C%22v%22%3A3%7D%5D%7D&tim=12%3A49%3A04.942&id=8779&llvl=1&cv=327-86-RELEASE&
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 10 Oct 2018 12:49:04 GMT
via
1.1 varnish
server
nginx
x-timer
S1539175745.944225,VS0,VE8
x-served-by
cache-hhn1549-HHN
status
204
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
access-control-allow-origin
*
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
content-type
image/gif
x-cache-hits
0
domains
api.viglink.com/api/
87 B
532 B
XHR
General
Full URL
https://api.viglink.com/api/domains
Requested by
Host: cdn.viglink.com
URL: https://cdn.viglink.com/api/vglnk.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.76.79.78 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-76-79-78.eu-west-1.compute.amazonaws.com
Software
Apache-Coyote/1.1 /
Resource Hash
09bf50962ea0cd783ea77c644a87255616149f2cf84ff8a1dd0684ec45b5a447

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Wed, 10 Oct 2018 12:49:05 GMT
Server
Apache-Coyote/1.1
P3P
CP="ALL IND DSP COR CUR ADM TAIo PSDo OUR COM INT NAV PUR STA UNI"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript;charset=UTF-8
Content-Length
87
Expires
Thu, 01 Jan 1970 00:00:00 GMT
available
trc.taboola.com/cbsinteractive-zdnet/log/3/
0
95 B
XHR
General
Full URL
https://trc.taboola.com/cbsinteractive-zdnet/log/3/available
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.327-86-RELEASE.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

pragma
no-cache
date
Wed, 10 Oct 2018 12:49:05 GMT
via
1.1 varnish
server
nginx
x-timer
S1539175745.238823,VS0,VE9
x-served-by
cache-hhn1549-HHN
status
204
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
content-type
image/gif
x-cache-hits
0
a8b71cfc4b1045a7b5116fbf612cab41.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.workandmoney.com/a8/b7/
11 KB
12 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.workandmoney.com/a8/b7/a8b71cfc4b1045a7b5116fbf612cab41.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
0d4d27d1dbd55db469aae9050ebd7c33b45acb7ec8b28af8608c516e5a4c9964

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:05 GMT
via
1.1 varnish
age
1609727
x-cache
HIT
status
200, 200 OK
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.workandmoney.com/a8/b7/a8b71cfc4b1045a7b5116fbf612cab41.jpg
content-length
11706
x-request-id
99b41a186fba8f52
x-served-by
cache-hhn1549-HHN
last-modified
Fri, 21 Sep 2018 15:27:05 GMT
server
cloudinary
x-timer
S1539175745.264480,VS0,VE1
etag
"54101f93c1e8278d1cc2d69e69279032"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1
b12f0a6566d4f3da51345f02c888cfe9.jpeg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
33 KB
33 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/b12f0a6566d4f3da51345f02c888cfe9.jpeg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
91f98e2d25c9887f4a67cd5e937962b819f678f6a895d091eedb4b756dc15fe5

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:05 GMT
via
1.1 varnish
age
1326745
x-cache
HIT
status
200
expiration
expiry-date="Wed, 17 Oct 2018 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/b12f0a6566d4f3da51345f02c888cfe9.jpeg
content-length
33741
x-served-by
cache-hhn1549-HHN
last-modified
Sun, 16 Sep 2018 16:20:06 GMT
server
cloudinary
x-timer
S1539175745.264508,VS0,VE0
etag
"06fb9f4506690281654172e0bfb39a64"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
82
bf8d31214bd1697afc98ebf799d5ab38.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
28 KB
28 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/bf8d31214bd1697afc98ebf799d5ab38.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
cebed9fd64894db8598f58581c15844bc47f618c291ef50e89ff84e8c35a0fda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:05 GMT
via
1.1 varnish
age
1748455
edge-cache-tag
358211046686789605380063675163452050723,553231981581714319628150088830979202071,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Tue, 25 Sep 2018 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/bf8d31214bd1697afc98ebf799d5ab38.jpg
content-length
28210
x-served-by
cache-hhn1549-HHN
last-modified
Sat, 25 Aug 2018 12:47:18 GMT
server
cloudinary
x-timer
S1539175745.264682,VS0,VE0
etag
"8a9c990858a9c251dd0fd65feef80d79"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
97
7794824ae28c8000341974c7c56d1796.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
23 KB
24 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/7794824ae28c8000341974c7c56d1796.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
2c678c26001d2819e6c9b8faf2b51a388f03bebaad859abf871fbf4887143518

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:05 GMT
via
1.1 varnish
age
1205133
x-cache
HIT
status
200
expiration
expiry-date="Sat, 27 Oct 2018 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/7794824ae28c8000341974c7c56d1796.jpg
content-length
23879
x-served-by
cache-hhn1549-HHN
last-modified
Wed, 26 Sep 2018 14:00:06 GMT
server
cloudinary
x-timer
S1539175745.264710,VS0,VE0
etag
"b0791e274af9f642d189d0d313ae2b3a"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
8
bdcf00a11b14e0708b87287293753efe.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
24 KB
24 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/bdcf00a11b14e0708b87287293753efe.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
ba32e7bb93fb23193ecc2030e3a1a8c5c4f38ce1c0f9c74d03be38dbb309cba4

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:05 GMT
via
1.1 varnish
age
268138
x-cache
HIT
status
200
expiration
expiry-date="Thu, 18 Oct 2018 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/bdcf00a11b14e0708b87287293753efe.jpg
content-length
24114
x-served-by
cache-hhn1549-HHN
last-modified
Mon, 17 Sep 2018 18:34:57 GMT
server
cloudinary
x-timer
S1539175745.264633,VS0,VE0
etag
"b5b99e306affce1f67887ee9f63383ee"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
54
dc45121536970865a43e546f800c82b4.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
13 KB
13 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/dc45121536970865a43e546f800c82b4.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
82f1d4466a32966e4bbf45ac4d0dad4118f9576861030e8fc4bf52015cfbefcb

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:05 GMT
via
1.1 varnish
age
2258599
edge-cache-tag
613441416004951927231519925297989340181,553231981581714319628150088830979202071,29ecf9b93bbf306179626feeda1fab70
status
200, 200 OK
x-cache
HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/dc45121536970865a43e546f800c82b4.jpg
content-length
13276
x-request-id
fd8ab118fa3e1874
x-served-by
cache-hhn1549-HHN
last-modified
Tue, 14 Aug 2018 14:45:32 GMT
server
cloudinary
x-timer
S1539175745.264620,VS0,VE0
etag
"0f9b81f01107c0212defcc00d2ba3347"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
12
01.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//blogs.dailylifetech.com/b/drone/07/
19 KB
19 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//blogs.dailylifetech.com/b/drone/07/01.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
93d347411ff458b69f13476e8dc0812b1d57eeb8f90674887ff0321a1fdf1127

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:05 GMT
via
1.1 varnish
age
1710797
x-cache
HIT
status
200
expiration
expiry-date="Fri, 21 Sep 2018 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//blogs.dailylifetech.com/b/drone/07/01.jpg
content-length
19219
x-served-by
cache-hhn1549-HHN
last-modified
Tue, 21 Aug 2018 13:34:40 GMT
server
cloudinary
x-timer
S1539175745.280458,VS0,VE1
etag
"c5a01b3195a59da3c6fc029c582cee45"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1
1c21a97bae3d4860b40d70eecb81bea2.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.workandmoney.com/1c/21/
10 KB
10 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.workandmoney.com/1c/21/1c21a97bae3d4860b40d70eecb81bea2.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.194.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
f6639e829137f5898fedbd678b27811af6ffd7baf71950272aa1c4b5a7d4d627

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 10 Oct 2018 12:49:05 GMT
via
1.1 varnish
age
1742016
x-cache
HIT
status
200
expiration
expiry-date="Sat, 22 Sep 2018 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.workandmoney.com/1c/21/1c21a97bae3d4860b40d70eecb81bea2.jpg
content-length
10224
x-served-by
cache-hhn1549-HHN
last-modified
Wed, 22 Aug 2018 14:36:17 GMT
server
cloudinary
x-timer
S1539175745.280508,VS0,VE0
etag
"46e42808c06e4e628d4c4759cf43bae6"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
12

Verdicts & Comments Add Verdict or Comment

328 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| soastaTracking object| ZdnetPageVars object| ZdnetFunctions boolean| gdprConsent object| evidon object| knownServiceWorkers object| cbsiGptDivIds function| UUIDv4 string| __tealium_data_guid object| utag_data function| requirejs function| require function| define number| BOOMR_lstart object| googletag object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken function| $ function| jQuery undefined| easyXDM object| BOOMR object| BOOMR_mq object| headertag function| headertag_render object| pbjs object| __core-js_shared__ function| setImmediate function| clearImmediate function| UUIDv1 function| clamp object| STR undefined| UUID object| fly undefined| testGroup undefined| testName object| GPT_jstiming object| closure_memoize_cache_ undefined| google_measure_js_timing number| BOOMR_configt object| utag_err boolean| utag_condload function| getCookieValue object| isInternal object| js object| s object| adData string| adCookieName undefined| adCookieData undefined| adRegion function| parseJson object| match object| utag function| runInternalUserFuncs function| cbsiInternal function| _tealium_old_error boolean| isEuUser object| vglnk object| omnitureMgr object| dwMgr object| om object| jQuery183010218628972638855 object| _bmrEvents function| pf_notify function| lightboxjs function| lightboxlib object| _ml function| vl_cB function| vl_disable function| vglnk_15391757390025 function| dw_callback object| EF number| pagenum object| NOLBUNDLE object| nSdkInstance function| setUpAgknTag object| Modernizr function| Waypoint function| AppMeasurement_Module_AudienceManagement function| AppMeasurement_Module_ActivityMap function| AppMeasurement function| s_gi function| s_pgicq function| doSiteCatalystTag object| headID object| newScript object| s_c_il number| s_c_in function| Visitor object| visitor function| DIL number| s_objectID number| s_giq function| agknTagBuilder object| _agknTag string| _agknTagName object| _agknEchoTag number| _isAgknTagSet object| debug object| __ql string| path string| host object| scriptTags object| TRUE_ANTHEM object| swfobject object| CryptoJS object| mPulseApp string| emmUrlKey string| optoutCookieKey object| ns object| paramsPassed object| stateObject string| BUILDVERSION object| stateEvents object| DIGIOH_API function| renderAdCallback function| blankAdCallback string| firstpgvar string| waypointContextKey object| sticky undefined| _ function| Hls undefined| uuid function| addResizeListener function| removeResizeListener function| Spinner object| uvpjs function| Class object| mpulseUserTiming undefined| vglnk_15391757395056 object| DW function| dw_anonc object| DW_anonc object| optimizely string| f0 object| omMgr undefined| vglnk_15391757396998 object| s_i_cnetzdnetglobalsite number| BOOMR_onload string| bm_website_code object| $tealium boolean| google_noFetch boolean| google_DisableInitialLoad number| __google_ad_urls_id object| ret number| google_unique_id object| gaGlobal boolean| searchOpen object| $lastFocusedInput string| pageType undefined| jQuery183010218628972638855_1539175738569 undefined| jQuery183010218628972638855_1539175738570 function| udm_ function| ns_order object| ns_ object| ns_p string| ZN_3xeBFJDuSs0SRW5_ed string| ZN_3xeBFJDuSs0SRW5_sampleRate string| ZN_3xeBFJDuSs0SRW5_url function| fbq function| _fbq object| UA number| _rnd string| __prot object| __i function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter object| QSI string| disqus_shortname function| Goog_AdSense_Lidar_sendVastEvent function| Goog_AdSense_Lidar_getViewability function| Goog_AdSense_Lidar_getUrlSignalsArray function| Goog_AdSense_Lidar_getUrlSignalsList object| ima object| google object| NOLCMB object| platform function| mux object| ADB object| closure_lm_891347 boolean| autoplay object| __google_ad_urls boolean| google_osd_loaded boolean| google_onload_fired function| disqus_config object| default object| closure_lm_599213 object| DISQUSWIDGETS undefined| disqus_domain function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| DISQUS string| q object| google_reactive_ads_global_state object| google_jobrunner undefined| vglnk_153917574191911 object| Moat#G26 boolean| Moat#EVA object| MoatSuperV26 object| TRC object| _tblConsole object| _taboola object| _comscore undefined| msg string| pm_pgtp object| COMSCORE string| pm_ppy string| pm_geo string| _pmep string| _pmep_geo string| _pmpmk boolean| _pmasync boolean| _pmoptimization boolean| _pmoptimizationmanipulation boolean| _pmhp boolean| _pmsb function| _pmloadfile object| bbVer object| pmk object| pmglb object| pmfa object| pmad object| pmdebug_c object| _pmenv undefined| _tb_d undefined| _tb_rand function| getBBVersion function| _tb_getUrlParameter object| _pm_mcm function| pmws_request_done object| _tb_ext_xp number| google_global_correlator object| google_prev_clients function| __trcCopyProps function| __trcFromError function| __trcClientTimestamp function| __trcLog function| __trcError function| __trcDebug function| __trcInfo function| __trcWarn function| __trcDOMWalker function| __trcPurgeEventHandlers function| __trcJSONify function| __trcUnJSONify function| __trcGetMargins function| __trcAttachResize function| __trcDetachResize function| __trcTrim function| __trcGetElementsByClass function| __trcToArray function| __trcObjectCreate function| Gettext function| PageManager object| params number| trc_debug_level string| trc_article_id string| trc_item_url boolean| trc_testmode object| TRCImpl object| _pmk function| TBWidgetStorage function| TBWidgetPersonalization function| TBWidgetWhatsApp function| TBWidgetGawkerComments function| TBWidgetGawkerPersonalization function| TBWidgetWeatherStories function| TBWidgetFBCommentPersonalization function| TBWidgetDisqusPersonalization function| TBWidgetFacebookComments function| TBWidgetCommentButton function| TBWidgetMsnTsb function| TBClickToPlayVideo function| TBClickToPlayVideoElem function| TBWidgetVideoPlayer function| TBGenericVideoModule function| TBOtherPlayer function| TBVideoMetaData function| TBKalturaPlayer function| TBBrightcovePlayer function| TBOoYalaPlayer function| TBMSNPlayer function| TBWidgetMsnTsbPersonalization function| TBVideoCarousel function| TBVideoRightRail function| TBWidgetVideoPersonalization function| TBWidgetFPORunner function| PMTargeting function| PMTracking function| PMUniversalGA function| PMMdotLabs function| PMComScore function| PMPublisher function| TBOptimization function| TBWidgetFacebook function| TBWidgetTwitter function| TBWidgetAddThis function| TBWidgetShareThis function| TBWidgetDisqus function| TBWidgetGigya function| TBWidgetReddit function| TBWidgetPinterest function| TBWidgetSC function| TBWidgetSTPPersonalization function| TBWidgetSCPersonalization function| _comcast_fn function| PMRetry function| PMGlobal function| PMIdentifier function| pmws_getlocation_done object| pmdebug object| pmws object| xq string| GoogleAnalyticsObject function| ga object| _pm_mcg object| tbopt function| PMAd function| openx_ad_request_done function| pm_image_onload_done object| google_tag_data object| gaplugins object| sa object| gaData number| taboola_view_id function| vglnk_153917574522912

24 Cookies

Domain/Path Name / Value
.lightboxcdn.com/ Name: __cfduid
Value: d55b0b6c850cea8e268cdb939162727031539175739
.demdex.net/ Name: demdex
Value: 81058010229352235421889480821828399836
www.zdnet.com/ Name: viewGuid
Value: 7162bf48-0ccd-4007-b28c-e5153fda4868
.zdnet.com/ Name: AMCVS_10D31225525FF5790A490D4D%40AdobeOrg
Value: 1
.agkn.com/ Name: u
Value: C|0CEAjULG7I1CxvAAAAAABAg1RAQCADVIBAIABEUEAAAAA
.demdex.net/ Name: dextp
Value: 269-1-1539175739889|3-1-1539175739992|477-1-1539175740096|771-1-1539175740202
.imrworldwide.com/ Name: IMRID
Value: 44485800-6aa6-4c5a-a91a-565259a574a2
www.zdnet.com/ Name: _ccmaid
Value: 5978151440201526240
.agkn.com/ Name: ab
Value: 0001%3A54ao3GGWsJZ1eywfqdhIl%2BcRVO6VCy8v4Loljjv9Sp1eCYiyem9lTg%3D%3D
.zdnet.com/ Name: utag_main
Value: _sn:1$_ss:0$_st:1539177540140$ses_id:1539175738870%3Bexp-session$_pn:1%3Bexp-session$linktag:undefined%3Bexp-session
.zdnet.com/ Name: s_lv_zdnet_s
Value: First%20Visit
.zdnet.com/ Name: aam_uuid
Value: 81058010229352235421889480821828399836
.zdnet.com/ Name: AMCV_10D31225525FF5790A490D4D%40AdobeOrg
Value: -894706358%7CMCMID%7C80823053500865929101904813987310434212%7CMCAAMLH-1539780539%7C6%7CMCAAMB-1539780539%7CRKhpRz8krg2tLO6pguXWp5olkAcUniQYPHaMWWgdJ3xzPWQmdj0y%7CMCOPTOUT-1539182939s%7CNONE%7CMCAID%7C2DDEFA9D85312B44-40000103E0000BB2%7CvVersion%7C2.3.0
.zdnet.com/ Name: RT
Value: "sl=1&ss=1539175736302&tt=3863&obo=0&bcn=%2F%2F22ffabbe.akstat.io%2F&sh=1539175740170%3D1%3A0%3A3863&dm=zdnet.com&si=8b5454d7-9766-40fa-b597-187afe316cb3&ld=1539175740170"
.zdnet.com/ Name: first_page_today
Value: false
.zdnet.com/ Name: s_vnum
Value: 1541767739602%26vn%3D1
www.zdnet.com/ Name: XCLGFbrowser
Value: KRfWEFu99TvT4Nk+3NM
www.zdnet.com/ Name: LDCLGFbrowser
Value: 7c6d8adf-70e7-4f33-86a8-6fee7fc90c0a
.zdnet.com/ Name: zdnet_ad
Value: %7B%22type%22%3A%22gpt%22%2C%22region%22%3A%22uk%22%2C%22session%22%3A%22d%22%2C%22subSession%22%3A%222%22%7D
.zdnet.com/ Name: s_getNewRepeat
Value: 1539175739603-New
.zdnet.com/ Name: s_cc
Value: true
www.zdnet.com/ Name: _ccmsi
Value: 1539175739163_xyckedlix|1539175739163
.zdnet.com/ Name: s_lv_zdnet
Value: 1539175739603
.zdnet.com/ Name: s_invisit
Value: true

118 Console Messages

Source Level URL
Text
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service pending (GDPR consent not granted): script_indexexchange
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service pending (GDPR consent not granted): script_mpulse
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service pending (GDPR consent not granted): script_gpt
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 733)
Message:
ADS: queuing nav-ad-5bbdf53947f65 for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1207)
Message:
ADS: queuing intromercial-5bbdf53947f65 for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1277)
Message:
ADS: queuing skin-5bbdf53947f65 for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1286)
Message:
ADS: queuing leader-plus-top-5bbdf53947f65 for display
console-api log URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js(Line 1)
Message:
dom not ready, setting event
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1430)
Message:
ADS: queuing inpage-video-top-5bbdf53947f65 for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1440)
Message:
ADS: queuing sharethrough-top-5bbdf53947f65 for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1663)
Message:
ADS: queuing mpu-plus-top-5bbdf53947f65 for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1781)
Message:
ADS: queuing dynamic-showcase-top-5bbdf53947f65 for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1788)
Message:
ADS: queuing mpu-middle-5bbdf53947f65 for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 2076)
Message:
ADS: queuing mpu-bottom-5bbdf53947f65 for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 2093)
Message:
ADS: queuing leader-plus-bottom-5bbdf53947f65 for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service pending (GDPR consent not granted): script_sharethrough
console-api log URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js(Line 1)
Message:
dom ready, triggering load
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
GDPR consent granted
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent finally granted): script_indexexchange
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent finally granted): script_mpulse
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent finally granted): script_gpt
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent finally granted): script_sharethrough
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js(Line 9)
Message:
Missing adCookieData!
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js(Line 92)
Message:
zdnet
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1805.js?utv=ut4.43.201809191808(Line 6)
Message:
!!! LISTENER SETUP
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1805.js?utv=ut4.43.201809191808(Line 4)
Message:
!!! nloadf PARENT
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1805.js?utv=ut4.43.201809191808(Line 4)
Message:
!!! nlsQ CHILD
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1805.js?utv=ut4.43.201809191808(Line 6)
Message:
!!! INITIAL Event: initial
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1805.js?utv=ut4.43.201809191808(Line 6)
Message:
!!! Useless doc state:
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_mpulse
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): _injectQueryStringGCP
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_ad
console-api info URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Info -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api info URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Info -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log (Line 2)
Message:
ADS: queuing mpu-bottom-5bbdf53947f65 for display
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808(Line 177)
Message:
Service: sitecatalyst
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1805.js?utv=ut4.43.201809191808(Line 6)
Message:
!!! DOCUMENT Event:
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1805.js?utv=ut4.43.201809191808(Line 6)
Message:
!!! staticMetadataObject
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1805.js?utv=ut4.43.201809191808(Line 6)
Message:
!!! staticstart
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js(Line 92)
Message:
zdnet
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_sharebar
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_video
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_sharebar
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/user.js?cb=636730487877169813(Line 1224)
Message:
DIGIOH: identityChildReady999999999: zyxcba
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_urban_airship
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_disqus_count
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_disqus_count
console-api log URL: https://vidtech.cbsinteractive.com/uvpjs/2.8.3/CBSI-PLAYER.js(Line 20)
Message:
UVPJS 2.8.3 03/26/18 8:42:19 AM (PDT)
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_taboola
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_medusa_async_load
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): disqus_init
console-api warning URL: https://zdnet1.cbsistatic.com/fly/js/libs/mpulse-1.0.2.js(Line 8)
Message:
mPulse: Custom Timer 'video_ploaded' is not defined
console-api log (Line 33)
Message:
blank creative loaded: 138239360681 (7 x 7, pos=nav)
console-api log (Line 33)
Message:
blank creative loaded: 138239321298 (1600 x 1000, pos=top)
console-api log (Line 33)
Message:
blank creative loaded: 138239321463 (300 x 250, pos=bottom)
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1805.js?utv=ut4.43.201809191808(Line 4)
Message:
!!! nlsQ CHILD
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 164)
Message:
Dynamic Showcase Center container ::: creative id = 72087703209
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js(Line 92)
Message:
zdnet
console-api info URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Info -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api info URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Info -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api info URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Info -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/user.js?cb=636730487877169813(Line 1224)
Message:
DIGIOH: Calling setIsCrossDomainStorageWorking using short circuit!!!!
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log (Line 33)
Message:
blank creative loaded: 138239479696 (372 x 142, pos=)
console-api log (Line 33)
Message:
blank creative loaded: 138239375540 (372 x 142, pos=)
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -
console-api log URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600.bundle.min.js(Line 10)
Message:
Nielsen Log: Debug -

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

22ffabbe.akstat.io
36e4f0eb.akstat.io
ad.yieldmanager.com
ads.rubiconproject.com
adservice.google.com
adservice.google.de
api.viglink.com
as-sec.casalemedia.com
asset.pagefair.com
asset.pagefair.net
beacon-eu-ams3.rubiconproject.com
beacon.tru.am
c.disquscdn.com
c.evidon.com
c.go-mpulse.net
cbsdfp5832910442.s.moatpixel.com
cbsi.demdex.net
cdn-gl.imrworldwide.com
cdn.taboola.com
cdn.viglink.com
cm.everesttech.net
cm.g.doubleclick.net
connect.facebook.net
d.agkn.com
disqus.com
dpm.demdex.net
dw.cbsi.com
eus.rubiconproject.com
geo.moatads.com
googleads.g.doubleclick.net
graph.facebook.com
idsync.rlcdn.com
iicbsi-a.akamaihd.net
images.taboola.com
imasdk.googleapis.com
in.ml314.com
js-sec.indexww.com
js.agkn.com
l.betrad.com
ml314.com
native.sharethrough.com
optimized-by.rubiconproject.com
pagead2.googlesyndication.com
pixel.everesttech.net
pixel.mathtag.com
ps.eyeota.net
px.moatads.com
rev.cbsi.com
s.update.rubiconproject.com
s0.2mdn.net
saa.cbsi.com
sb.scorecardresearch.com
secure-dcr-cert.imrworldwide.com
secure-us.imrworldwide.com
secure.adnxs.com
securepubads.g.doubleclick.net
stats.pagefair.com
sync.crwdcntrl.net
tags.bluekai.com
tags.tiqcdn.com
tpc.googlesyndication.com
trc.taboola.com
tru.am
vidtech.cbsinteractive.com
web-sdk.urbanairship.com
widget.perfectmarket.com
www.everestjs.net
www.facebook.com
www.google-analytics.com
www.google.com
www.google.de
www.googleadservices.com
www.googletagservices.com
www.lightboxcdn.com
www.linkedin.com
www.zdnet.com
z.moatads.com
zdnet-1.disqus.com
zdnet1.cbsistatic.com
zdnet2.cbsistatic.com
zdnet3.cbsistatic.com
zdnet4.cbsistatic.com
zn_3xebfjduss0srw5-cbs.siteintercept.qualtrics.com
104.111.230.142
104.94.183.192
143.204.101.19
151.101.0.134
151.101.120.134
151.101.193.181
151.101.194.2
172.217.21.226
172.217.22.102
172.217.22.66
172.217.22.98
172.227.85.103
18.130.107.65
184.30.221.236
184.30.223.226
185.33.223.221
2.18.233.143
2.18.233.149
2.18.233.201
2.18.234.21
2.18.235.40
213.19.162.27
213.19.162.67
213.19.162.71
23.38.48.113
23.45.101.171
23.53.169.164
23.60.198.210
23.67.129.200
23.67.133.222
2400:cb00:2048:1::6810:4ea6
2400:cb00:2048:1::6810:50a5
2400:cb00:2048:1::6810:a20d
2600:9000:200c:7a00:15:efbc:e300:93a1
2606:4700:20::6819:a222
2606:4700:20::6819:a322
2620:109:c00c:104::b93f:9001
2a00:1288:110:422::3000
2a00:1450:4001:806::2003
2a00:1450:4001:80b::2002
2a00:1450:4001:817::2002
2a00:1450:4001:819::2002
2a00:1450:4001:81c::2004
2a00:1450:4001:81d::2001
2a00:1450:4001:81d::200a
2a00:1450:4001:81d::200e
2a00:1450:4001:81f::2002
2a00:1450:4001:821::2002
2a00:1450:4001:824::2002
2a02:26f0:6c00:19d::e3d
2a02:26f0:6c00::210:ba12
2a03:2880:f01a:1:face:b00c:0:1
2a03:2880:f01c:216:face:b00c:0:3
2a03:2880:f11c:8083:face:b00c:0:25de
34.192.19.184
34.201.183.1
34.202.248.102
34.231.154.145
34.246.247.78
34.255.138.125
35.156.121.57
52.17.182.129
52.3.8.119
52.31.106.135
52.54.117.157
54.154.86.186
54.154.93.90
54.230.93.44
54.76.241.29
54.76.79.78
63.140.43.37
64.30.224.172
64.30.230.22
66.117.28.68
66.117.28.86
68.232.35.180
94.31.29.248
94.31.29.96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