Submitted URL: https://www.hackread.com/android=
Effective URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Submission: On March 25 via api from US

Summary

This website contacted 21 IPs in 6 countries across 21 domains to perform 83 HTTP transactions. The main IP is 67.227.194.195, located in Lansing, United States and belongs to LIQUIDWEB, US. The main domain is www.hackread.com.
TLS certificate: Issued by Let's Encrypt Authority X3 on February 13th 2020. Valid for: 3 months.
This is the only time www.hackread.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 39 67.227.194.195 32244 (LIQUIDWEB)
2 2606:4700::68... 13335 (CLOUDFLAR...)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a04:fa87:fff... 2635 (AUTOMATTIC)
4 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
7 52.30.187.156 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
6 2a00:1450:400... 15169 (GOOGLE)
2 2 70.42.32.31 22075 (AS-OUTBRAIN)
2 2 185.33.223.204 29990 (ASN-APPNEX)
3 3 54.93.143.102 16509 (AMAZON-02)
1 1 188.165.27.173 16276 (OVH)
1 192.132.33.46 18568 (BIDTELLECT)
2 2 18.194.31.52 16509 (AMAZON-02)
1 2 2a00:1450:400... 15169 (GOOGLE)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
9 151.139.128.10 20446 (HIGHWINDS3)
1 3.215.85.88 14618 (AMAZON-AES)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 99.86.7.105 16509 (AMAZON-02)
2 2a00:1450:400... 15169 (GOOGLE)
83 21
Domain Requested by
39 www.hackread.com 1 redirects www.hackread.com
ajax.googleapis.com
7 img.revcontent.com cdn.revcontent.com
7 trends.revcontent.com www.hackread.com
trends.revcontent.com
cdn.revcontent.com
5 googleads.g.doubleclick.net pagead2.googlesyndication.com
4 pagead2.googlesyndication.com www.hackread.com
pagead2.googlesyndication.com
3 x.bidswitch.net 3 redirects
2 tpc.googlesyndication.com pagead2.googlesyndication.com
tpc.googlesyndication.com
2 cdn.revcontent.com www.hackread.com
2 www.google-analytics.com 1 redirects www.googletagmanager.com
2 rtb.mfadsrvr.com 2 redirects
2 ib.adnxs.com 2 redirects
2 b1sync.zemanta.com 2 redirects
2 fonts.gstatic.com ajax.googleapis.com
2 secure.gravatar.com www.hackread.com
2 cdnjs.cloudflare.com www.hackread.com
1 cdn.amurege.com cdn.revcontent.com
1 static.earnify.com cdn.revcontent.com
1 ri.amurege.com www.hackread.com
1 www.google.de www.hackread.com
1 www.google.com 1 redirects
1 stats.g.doubleclick.net 1 redirects
1 bttrack.com www.hackread.com
1 green.erne.co 1 redirects
1 www.googletagservices.com pagead2.googlesyndication.com
1 adservice.google.com pagead2.googlesyndication.com
1 adservice.google.de pagead2.googlesyndication.com
1 www.googletagmanager.com www.hackread.com
1 fonts.googleapis.com ajax.googleapis.com
1 ajax.googleapis.com www.hackread.com
83 29
Subject Issuer Validity Valid
hackread.com
Let's Encrypt Authority X3
2020-02-13 -
2020-05-13
3 months crt.sh
cloudflare.com
CloudFlare Inc ECC CA-2
2020-01-07 -
2020-10-09
9 months crt.sh
*.storage.googleapis.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
*.gravatar.com
COMODO RSA Domain Validation Secure Server CA
2018-09-06 -
2020-09-05
2 years crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
*.google-analytics.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
*.google.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
revcontent.com
Amazon
2019-09-19 -
2020-10-19
a year crt.sh
*.bttrack.com
Sectigo RSA Domain Validation Secure Server CA
2019-03-19 -
2021-04-13
2 years crt.sh
www.google.de
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
cdn.revcontent.com
Sectigo RSA Domain Validation Secure Server CA
2020-02-09 -
2020-05-09
3 months crt.sh
amurege.com
Amazon
2019-10-08 -
2020-11-08
a year crt.sh
ssl450535.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2020-03-18 -
2020-09-24
6 months crt.sh
img.revcontent.com
Sectigo RSA Domain Validation Secure Server CA
2020-02-09 -
2020-05-09
3 months crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh

This page contains 7 frames:

Primary Page: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Frame ID: 404C4B553888FC59365A029B138022A5
Requests: 78 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20200319/r20190131/zrt_lookup.html
Frame ID: 6A9413FD264E6FC057807EEA26629214
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=1082465236&adk=2021027549&adf=3499435812&w=570&fwrn=4&lmt=1585155382&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=570x90_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Fandroid-ad-fraud-campaign-drains-battery-eats-data%2F&flash=0&fwr=0&wgl=1&adsid=NT&dt=1585155382197&bpp=15&bdt=720&fdt=51&idt=52&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&correlator=3319838988378&frm=20&pv=2&ga_vid=1638074144.1585155382&ga_sid=1585155382&ga_hid=487893061&ga_fc=0&iag=0&icsg=603103935&dssz=30&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=458&ady=2620&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2231671226433643&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=1&uci=a!1&btvi=1&fsb=1&xpc=OnDLTXQgF0&p=https%3A//www.hackread.com&dtd=66
Frame ID: C3B9CA47688AE225E2277981B89EF56C
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=600&slotname=3047884612&adk=2945537484&adf=1398944667&w=300&lmt=1585155382&psa=0&guci=1.2.0.0.2.2.0.0&format=300x600&url=https%3A%2F%2Fwww.hackread.com%2Fandroid-ad-fraud-campaign-drains-battery-eats-data%2F&flash=0&wgl=1&adsid=NT&dt=1585155382212&bpp=5&bdt=735&fdt=80&idt=80&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al&correlator=3319838988378&frm=20&pv=1&ga_vid=1638074144.1585155382&ga_sid=1585155382&ga_hid=487893061&ga_fc=0&iag=0&icsg=44009401343&dssz=33&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1113&ady=225&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2231671226433643&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=2&uci=a!2&fsb=1&xpc=GcMSmDnvAJ&p=https%3A//www.hackread.com&dtd=83
Frame ID: 0EFBEDF24776FF71F010FAAC039181E9
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=280&slotname=6531121012&adk=752714257&adf=3714235230&w=1200&fwrn=4&fwrnh=100&lmt=1585155382&rafmt=1&psa=0&guci=1.2.0.0.2.2.0.0&format=1200x280&url=https%3A%2F%2Fwww.hackread.com%2Fandroid-ad-fraud-campaign-drains-battery-eats-data%2F&flash=0&fwr=0&rpe=1&resp_fmts=3&wgl=1&adsid=NT&dt=1585155382217&bpp=4&bdt=739&fdt=86&idt=86&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x600&correlator=3319838988378&frm=20&pv=1&ga_vid=1638074144.1585155382&ga_sid=1585155382&ga_hid=487893061&ga_fc=0&iag=0&icsg=44009401343&dssz=33&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=193&ady=3650&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2231671226433643&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=3&uci=a!3&btvi=2&fsb=1&xpc=UJfzughJp5&p=https%3A//www.hackread.com&dtd=88
Frame ID: 90C6D1F1F85526CE0261D26438B1A801
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&adk=1812271804&adf=3025194257&lmt=1585155382&plat=1%3A32776%2C2%3A16809992%2C8%3A134250504%2C9%3A134250504%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fwww.hackread.com%2Fandroid-ad-fraud-campaign-drains-battery-eats-data%2F&ea=0&flash=0&pra=7&wgl=1&adsid=NT&dt=1585155382514&bpp=3&bdt=1037&fdt=4&idt=4&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x600%2C1200x280&nras=1&correlator=3319838988378&frm=20&pv=1&ga_vid=1638074144.1585155382&ga_sid=1585155382&ga_hid=487893061&ga_fc=0&iag=0&icsg=11266406744060&dssz=41&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2231671226433643&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&ifi=3&uci=a!3&fsb=1&dtd=11
Frame ID: 5DA58369372B3B0B6D7D856CC9080057
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Frame ID: DEFE4C8F023F130346F97F1EE242BB60
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://www.hackread.com/android= HTTP 301
    https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • script /googlesyndication\.com\//i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • script /googleapis\.com\/.+webfont/i

Page Statistics

83
Requests

100 %
HTTPS

59 %
IPv6

21
Domains

29
Subdomains

21
IPs

6
Countries

1527 kB
Transfer

3191 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://www.hackread.com/android= HTTP 301
    https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 55
  • https://b1sync.zemanta.com/usersync/revcontent/?puid=ZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI%3D&cb=https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fexchange_uid%3DZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI%253D%26bidder%3D3%26bidder_uid%3D__ZUID__&rev_dt=1585155382 HTTP 302
  • https://b1sync.zemanta.com/usersync/revcontent/?cb=https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fexchange_uid%3DZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI%253D%26bidder%3D3%26bidder_uid%3D__ZUID__&puid=ZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI%3D&rev_dt=1585155382&s=2 HTTP 302
  • https://trends.revcontent.com/cm/pixel_sync?exchange_uid=ZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI%3D&bidder=3&bidder_uid=VBGk-htCmYiwvcMbQD1K
Request Chain 56
  • https://ib.adnxs.com/getuid?https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fbidder%3D115%26bidder_uid%3D%24UID%26exchange_uid%3DZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI%253D&geo=35&rev_dt=1585155382 HTTP 307
  • https://ib.adnxs.com/bounce?%2Fgetuid%3Fhttps%253A%252F%252Ftrends.revcontent.com%252Fcm%252Fpixel_sync%253Fbidder%253D115%2526bidder_uid%253D%2524UID%2526exchange_uid%253DZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI%25253D%26geo%3D35%26rev_dt%3D1585155382 HTTP 302
  • https://trends.revcontent.com/cm/pixel_sync?bidder=115&bidder_uid=7832699342995059050&exchange_uid=ZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI%3D&geo=35&rev_dt=1585155382
Request Chain 57
  • https://x.bidswitch.net/sync?ssp=revcontent&rev_dt=1585155382 HTTP 302
  • https://x.bidswitch.net/ul_cb/sync?ssp=revcontent&rev_dt=1585155382 HTTP 302
  • https://green.erne.co/bidswitch/cm?bidswitch_ssp_id=revcontent&gdpr=&gdpr_consent= HTTP 302
  • https://x.bidswitch.net/sync?dsp_id=270&expires=10&user_id=clJcSKqJIdIeWXsMQ79jUhr4&ssp=revcontent HTTP 302
  • https://trends.revcontent.com/cm/pixel_sync?bidder=118&bidder_uid=aba33064-7efb-4699-96d4-2b06a9e1e410
Request Chain 59
  • https://rtb.mfadsrvr.com/sync?ssp=revcontent&ssp_user_id=ZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI%3D&rev_dt=1585155382 HTTP 302
  • https://rtb.mfadsrvr.com/ul_cb/sync?ssp=revcontent&ssp_user_id=ZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI%3D&rev_dt=1585155382 HTTP 302
  • https://trends.revcontent.com/cm/pixel_sync?exchange_uid=ZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI=&bidder=154&bidder_uid=883c759f-5e1a-4982-8f9a-63ddec13aad1
Request Chain 65
  • https://www.google-analytics.com/r/collect?v=1&_v=j81&a=487893061&t=pageview&_s=1&dl=https%3A%2F%2Fwww.hackread.com%2Fandroid-ad-fraud-campaign-drains-battery-eats-data%2F&ul=en-us&de=UTF-8&dt=Major%20Android%20ad%20fraud%20scam%20campaign%20drains%20battery%20%26%20eats%20data&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=IAhAAUAB~&jid=1048300620&gjid=266516918&cid=1638074144.1585155382&tid=UA-36230183-1&_gid=1690720166.1585155383&_r=1&gtm=2ou3i0&z=1773049026 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-36230183-1&cid=1638074144.1585155382&jid=1048300620&_gid=1690720166.1585155383&gjid=266516918&_v=j81&z=1773049026 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=1638074144.1585155382&jid=1048300620&_v=j81&z=1773049026 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=1638074144.1585155382&jid=1048300620&_v=j81&z=1773049026&slf_rd=1&random=2372828178

83 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Redirect Chain
  • https://www.hackread.com/android=
  • https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
83 KB
17 KB
Document
General
Full URL
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
b47639c1a012928735cc0234a9d3fbda1c9cd9fb62edea275c641ab528e6ff18

Request headers

Host
www.hackread.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document

Response headers

Date
Wed, 25 Mar 2020 16:56:20 GMT
Server
Apache
Link
<https://www.hackread.com/wp-json/>; rel="https://api.w.org/", <https://www.hackread.com/?p=69508>; rel=shortlink
Cache-Control
max-age=2592000
Expires
Fri, 24 Apr 2020 16:56:20 GMT
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
17008
Keep-Alive
timeout=2, max=99
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Wed, 25 Mar 2020 16:56:20 GMT
Server
Apache
Expires
Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control
no-cache, must-revalidate, max-age=0
X-Redirect-By
WordPress
Location
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Content-Length
0
Keep-Alive
timeout=2, max=100
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
style.min.css
www.hackread.com/wp-includes/css/dist/block-library/
29 KB
5 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-includes/css/dist/block-library/style.min.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
4b8fe5c3d0e5ef7a6582185cbf5c535b5d369c8df1da98c03ed69833e55f474d

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Sun, 17 Nov 2019 13:59:40 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=98
Content-Length
4767
Expires
Fri, 24 Apr 2020 16:56:21 GMT
blocks.style.build.css
www.hackread.com/wp-content/plugins/quick-adsense-reloaded/includes/gutenberg/dist/
184 B
514 B
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/plugins/quick-adsense-reloaded/includes/gutenberg/dist/blocks.style.build.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
36ed85dd058e4c2843e06146946e0ff1f9ace65760c22af5eb4f1b22319dddb5

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Mar 2020 22:13:31 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=97
Content-Length
155
Expires
Fri, 24 Apr 2020 16:56:21 GMT
styles.css
www.hackread.com/wp-content/plugins/contact-form-7/includes/css/
2 KB
1 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/plugins/contact-form-7/includes/css/styles.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
811e8960b8f79f14983e30df80a4ccc69d82430ccc0520d2a1a3d1405cfbb2a1

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Sat, 07 Mar 2020 22:25:04 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=100
Content-Length
677
Expires
Fri, 24 Apr 2020 16:56:21 GMT
mashsb.min.css
www.hackread.com/wp-content/plugins/mashsharer/assets/css/
46 KB
28 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/plugins/mashsharer/assets/css/mashsb.min.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
0500bd58f47403106f2f10da96d8d196941a02a4046e88611a59494557861f98

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Sun, 22 Mar 2020 12:13:59 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=100
Content-Length
28578
Expires
Fri, 24 Apr 2020 16:56:21 GMT
bootstrap.min.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/
120 KB
20 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/bootstrap.min.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
31fbd99641c212a6ad3681a2397bde13c148c0ccd98385bce6a7eb7c81417d87

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=100
Content-Length
19883
Expires
Fri, 24 Apr 2020 16:56:21 GMT
mip.external.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/
87 KB
18 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/mip.external.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
8afc1a2899ec2d2c29c203e17c69fe00b369d1aec1634a58653208d6db298958

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=100
Content-Length
17673
Expires
Fri, 24 Apr 2020 16:56:21 GMT
style.css
www.hackread.com/wp-content/themes/newsgamer/
113 KB
18 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/style.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
f9934e8ca51663923f923910d8b0ac7e849f46e87f65f75fcd513dac5e9f16d5

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Fri, 02 Nov 2018 17:34:12 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=100
Content-Length
18556
Expires
Fri, 24 Apr 2020 16:56:21 GMT
media-queries.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/
26 KB
4 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/media-queries.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
b5b0cab3bf2be0ec59bd3b301364a639d993e99d0d526e436442065b9406067b

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=96
Content-Length
3798
Expires
Fri, 24 Apr 2020 16:56:21 GMT
dynamic.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/
308 KB
12 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/dynamic.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
3ac3228e00d2bbbcb08bb7c5586e8744512c0c43c3cf13b2b5df10cd75e6040a

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Wed, 25 Mar 2020 16:13:49 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=99
Content-Length
12196
Expires
Fri, 24 Apr 2020 16:56:21 GMT
typography.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/
19 KB
2 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/typography.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
106d020c501875011ff5aab5034da42ba83e096c17f901fda9e8f4c92ecde8b4

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Wed, 25 Mar 2020 16:13:49 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=95
Content-Length
1771
Expires
Fri, 24 Apr 2020 16:56:21 GMT
jquery.js
www.hackread.com/wp-includes/js/jquery/
95 KB
33 KB
Script
General
Full URL
https://www.hackread.com/wp-includes/js/jquery/jquery.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
1db21d816296e6939ba1f42962496e4134ae2b0081e26970864c40c6d02bb1df

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Wed, 22 May 2019 07:16:05 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=99
Content-Length
33776
Expires
Fri, 24 Apr 2020 16:56:21 GMT
jquery-migrate.min.js
www.hackread.com/wp-includes/js/jquery/
10 KB
4 KB
Script
General
Full URL
https://www.hackread.com/wp-includes/js/jquery/jquery-migrate.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
48eb8b500ae6a38617b5738d2b3faec481922a7782246e31d2755c034a45cd5d

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Tue, 21 Jun 2016 19:13:07 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=99
Content-Length
4014
Expires
Fri, 24 Apr 2020 16:56:21 GMT
cookieconsent.min.css
cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/
4 KB
1 KB
Stylesheet
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4104 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
79b378e8f3c1fece39a1472a2e7d920ab80eb5881525a1622d9dbaa954aa23c3
Security Headers
Name Value
Strict-Transport-Security max-age=15780000; includeSubDomains

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Wed, 25 Mar 2020 16:56:21 GMT
content-encoding
br
cf-cache-status
HIT
age
4139473
cf-ray
579a2a2eab85dfbf-FRA
status
200
strict-transport-security
max-age=15780000; includeSubDomains
alt-svc
h3-27=":443"; ma=86400, h3-25=":443"; ma=86400, h3-24=":443"; ma=86400, h3-23=":443"; ma=86400
last-modified
Tue, 17 Jul 2018 12:30:51 GMT
server
cloudflare
etag
W/"5b4de17b-fe0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
access-control-allow-origin
*
expires
Mon, 15 Mar 2021 16:56:21 GMT
cache-control
public, max-age=30672000
timing-allow-origin
*
served-in-seconds
0.001
cookieconsent.min.js
cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/
20 KB
6 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4104 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
cb41292903f6bd996333bdfe6fbc58e1dbdb6109074505ee3ea46373bb23be70
Security Headers
Name Value
Strict-Transport-Security max-age=15780000; includeSubDomains

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:56:21 GMT
content-encoding
br
cf-cache-status
HIT
age
4091905
cf-ray
579a2a2eab8adfbf-FRA
status
200
strict-transport-security
max-age=15780000; includeSubDomains
alt-svc
h3-27=":443"; ma=86400, h3-25=":443"; ma=86400, h3-24=":443"; ma=86400, h3-23=":443"; ma=86400
last-modified
Tue, 17 Jul 2018 12:30:51 GMT
server
cloudflare
etag
W/"5b4de17b-5148"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
expires
Mon, 15 Mar 2021 16:56:21 GMT
cache-control
public, max-age=30672000
timing-allow-origin
*
served-in-seconds
0.001
hackread-logo.png
www.hackread.com/wp-content/uploads/2015/12/
5 KB
6 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2015/12/hackread-logo.png
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
c89ff58885f6c99c896f0d833df56bd3ffd048276624c7b31b934cadc9e57ee1

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 23:37:46 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=99
Content-Length
5519
Expires
Thu, 25 Mar 2021 16:56:21 GMT
webfont.js
ajax.googleapis.com/ajax/libs/webfont/1.5.3/
17 KB
7 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/webfont/1.5.3/webfont.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
36ef095d011c4ced97b0acef551ca36d76b95299518595dc1acab792a2344601
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Fri, 06 Mar 2020 05:04:17 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1684324
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
6791
x-xss-protection
0
last-modified
Tue, 20 Dec 2016 18:17:03 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 06 Mar 2021 05:04:17 GMT
wp-emoji-release.min.js
www.hackread.com/wp-includes/js/
14 KB
5 KB
Script
General
Full URL
https://www.hackread.com/wp-includes/js/wp-emoji-release.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
f4799ef2939b8377cf33f07b07b6d90a4a245adbf1c6eaf47ee3b0fcefcc07fe

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Sun, 17 Nov 2019 13:59:40 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=98
Content-Length
4622
Expires
Fri, 24 Apr 2020 16:56:21 GMT
css
fonts.googleapis.com/
4 KB
803 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto%7CRoboto+Slab&subset=latin
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/webfont/1.5.3/webfont.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
6a0c466dd72e7d2fdd6ed71f97d8b6901714d154c572aeee1f18685ff30c92f2
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
x-xss-protection
0
last-modified
Wed, 25 Mar 2020 16:56:21 GMT
server
ESF
date
Wed, 25 Mar 2020 16:56:21 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Wed, 25 Mar 2020 16:56:21 GMT
cf728b76a63b387b11edeafcb1b9b654
secure.gravatar.com/avatar/
5 KB
5 KB
Image
General
Full URL
https://secure.gravatar.com/avatar/cf728b76a63b387b11edeafcb1b9b654?s=100&d=mm&r=g
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
cef751c2539d57a209824973bf2687ce2923e6b3b349b2984dbb79e9cf8e7e26

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

x-nc
MISS lb7.dfw.gravatar.com, BYPASS fra 2
date
Wed, 25 Mar 2020 16:56:22 GMT
last-modified
Wed, 27 Nov 2019 23:34:40 GMT
server
nginx
access-control-allow-origin
*
content-type
image/jpeg
status
200
cache-control
max-age=300
content-disposition
inline; filename="cf728b76a63b387b11edeafcb1b9b654.jpeg"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/cf728b76a63b387b11edeafcb1b9b654?s=100&d=mm&r=g>; rel="canonical"
content-length
4838
expires
Wed, 25 Mar 2020 17:01:22 GMT
410njbnz9ol_go1_icon.ico
www.hackread.com/wp-content/uploads/2015/12/
37 KB
3 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2015/12/410njbnz9ol_go1_icon.ico
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
a83b6dc4e04e6e657a3c36c83d61e410ac5ef9615e0c3dfcf3c454cde68bf243

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Thu, 08 Aug 2019 11:48:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/x-icon
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=98
Content-Length
2909
Expires
Thu, 25 Mar 2021 16:56:21 GMT
adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/
107 KB
38 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
3c005dba1d518d8fcd6bb8b0cd5264947d7c8c5b53363556d98c453428a376ef
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:56:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
39033
x-xss-protection
0
server
cafe
etag
13352514705584774431
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Wed, 25 Mar 2020 16:56:22 GMT
cf728b76a63b387b11edeafcb1b9b654
secure.gravatar.com/avatar/
6 KB
6 KB
Image
General
Full URL
https://secure.gravatar.com/avatar/cf728b76a63b387b11edeafcb1b9b654?s=115&d=mm&r=g
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
300ecda43616d76a68644bdd74c139eb08f811ab4acd6abdc1f18a67be50c3f8

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

x-nc
MISS lb9.dfw.gravatar.com, BYPASS fra 2
date
Wed, 25 Mar 2020 16:56:22 GMT
last-modified
Wed, 27 Nov 2019 23:34:40 GMT
server
nginx
access-control-allow-origin
*
content-type
image/jpeg
status
200
cache-control
max-age=300
content-disposition
inline; filename="cf728b76a63b387b11edeafcb1b9b654.jpeg"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/cf728b76a63b387b11edeafcb1b9b654?s=115&d=mm&r=g>; rel="canonical"
content-length
5940
expires
Wed, 25 Mar 2020 17:01:22 GMT
who-becomes-target-of-live-hack-attack-277x190.jpg
www.hackread.com/wp-content/uploads/2020/03/
11 KB
11 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/who-becomes-target-of-live-hack-attack-277x190.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
56800b0f8b907015c53a2337585f8a6a12ad6a51e6501c347ceb17055641e999

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Mar 2020 21:00:15 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=96
Content-Length
10941
Expires
Thu, 25 Mar 2021 16:56:21 GMT
hackers-are-exploiting-a-critical-unpatched-flaw-in-windows-1-277x190.jpg
www.hackread.com/wp-content/uploads/2020/03/
8 KB
9 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/hackers-are-exploiting-a-critical-unpatched-flaw-in-windows-1-277x190.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
4688fa461c9ac373185ce5b8fcf955eb447069c8cc397078e32ab07d5df097c7

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Mar 2020 18:08:14 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=97
Content-Length
8469
Expires
Thu, 25 Mar 2021 16:56:21 GMT
malware-family-generated-fake-ad-clicks-in-66-apps-on-android-2-277x190.jpg
www.hackread.com/wp-content/uploads/2020/03/
12 KB
12 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/malware-family-generated-fake-ad-clicks-in-66-apps-on-android-2-277x190.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
e9037c0b7cb100083a1afe09da02a6180153692406c04478f7e15edcfa0d4691

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Mar 2020 14:52:49 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=94
Content-Length
11944
Expires
Thu, 25 Mar 2021 16:56:21 GMT
who-becomes-target-of-live-hack-attack-350x245.jpg
www.hackread.com/wp-content/uploads/2020/03/
17 KB
17 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/who-becomes-target-of-live-hack-attack-350x245.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
e1240b4fff3ba45047d409abd5d38143700a153ae349b17cea437e16e3a71fc1

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Mar 2020 21:00:14 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=93
Content-Length
17555
Expires
Thu, 25 Mar 2021 16:56:21 GMT
hackers-are-exploiting-a-critical-unpatched-flaw-in-windows-1-350x245.jpg
www.hackread.com/wp-content/uploads/2020/03/
12 KB
13 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/hackers-are-exploiting-a-critical-unpatched-flaw-in-windows-1-350x245.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
c30768df1b5c99e68664ae0ed7db9b2bc95e1c89e9e5c01b5ef92a408c3e6b13

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Mar 2020 18:08:13 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=95
Content-Length
12519
Expires
Thu, 25 Mar 2021 16:56:21 GMT
malware-family-generated-fake-ad-clicks-in-66-apps-on-android-2-350x245.jpg
www.hackread.com/wp-content/uploads/2020/03/
18 KB
19 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/malware-family-generated-fake-ad-clicks-in-66-apps-on-android-2-350x245.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
c4289b26e4f32f2fdd514a4d1deb6aa6dca1f4e8e9989c1dc042eb20b29df57b

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Mar 2020 14:52:49 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=96
Content-Length
18605
Expires
Thu, 25 Mar 2021 16:56:21 GMT
coronavirus-sextortion-scam-350x245.jpg
www.hackread.com/wp-content/uploads/2020/03/
20 KB
21 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/coronavirus-sextortion-scam-350x245.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
81d1aa922759e01b41a5290dcf461e8664d016d18cc24da57bfa6a06c98a8786

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Mon, 23 Mar 2020 14:00:42 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=96
Content-Length
20630
Expires
Thu, 25 Mar 2021 16:56:21 GMT
hackread-logo.png
www.hackread.com/wp-content/uploads/2015/12/
5 KB
6 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2015/12/hackread-logo.png?x62286
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
c89ff58885f6c99c896f0d833df56bd3ffd048276624c7b31b934cadc9e57ee1

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 23:37:46 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=93
Content-Length
5519
Expires
Thu, 25 Mar 2021 16:56:21 GMT
scripts.js
www.hackread.com/wp-content/plugins/contact-form-7/includes/js/
14 KB
4 KB
Script
General
Full URL
https://www.hackread.com/wp-content/plugins/contact-form-7/includes/js/scripts.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
b7e17926b30342edecee8b3a93029ac51462e2b479277d8e077ba57173eb1900

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Sat, 07 Mar 2020 22:25:04 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=98
Content-Length
3993
Expires
Fri, 24 Apr 2020 16:56:21 GMT
mashsb.min.js
www.hackread.com/wp-content/plugins/mashsharer/assets/js/
4 KB
2 KB
Script
General
Full URL
https://www.hackread.com/wp-content/plugins/mashsharer/assets/js/mashsb.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
a13a1fe4a87c09c6e9122834b5351f80012e2c539b32bc1d33c6982efab21b4b

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Sun, 22 Mar 2020 12:13:59 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=97
Content-Length
1533
Expires
Fri, 24 Apr 2020 16:56:21 GMT
ta.js
www.hackread.com/wp-content/plugins/thirstyaffiliates/js/app/
10 KB
3 KB
Script
General
Full URL
https://www.hackread.com/wp-content/plugins/thirstyaffiliates/js/app/ta.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
31c020e98d623d9d86a904d64f4b923726a1ab664bff40a7550866ea2d4f5e03

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Fri, 21 Feb 2020 18:34:40 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=98
Content-Length
2584
Expires
Fri, 24 Apr 2020 16:56:21 GMT
bootstrap.min.js
www.hackread.com/wp-content/themes/newsgamer/assets/js/
36 KB
10 KB
Script
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/js/bootstrap.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
4a4de7903ea62d330e17410ea4db6c22bcbeb350ac6aa402d6b54b4c0cbed327

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=98
Content-Length
9745
Expires
Fri, 24 Apr 2020 16:56:21 GMT
mip.external.min.js
www.hackread.com/wp-content/themes/newsgamer/assets/js/
135 KB
42 KB
Script
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/js/mip.external.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
cd605c7d4107ef5b9d511b13cb1e053db59d2daa7df99e1e5754e54c0c7cec87

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=94
Content-Length
42900
Expires
Fri, 24 Apr 2020 16:56:21 GMT
functions.js
www.hackread.com/wp-content/themes/newsgamer/assets/js/
17 KB
5 KB
Script
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/js/functions.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
afe9c8752a20b726104d37ce2f099e89eba3b62bb31a3307c5a9bbf9de3c2e2d

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=99
Content-Length
4438
Expires
Fri, 24 Apr 2020 16:56:21 GMT
wp-embed.min.js
www.hackread.com/wp-includes/js/
1 KB
1 KB
Script
General
Full URL
https://www.hackread.com/wp-includes/js/wp-embed.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
2152557cac69e2bd7d6debef5037a9f554f9209cc305b8141b3329acb10c42b7

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Sun, 17 Nov 2019 13:59:40 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=95
Content-Length
753
Expires
Fri, 24 Apr 2020 16:56:21 GMT
comment-reply.min.js
www.hackread.com/wp-includes/js/
2 KB
1 KB
Script
General
Full URL
https://www.hackread.com/wp-includes/js/comment-reply.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
31cb76c05cbf5d71466f93078e8ba0f6e39cd92d0acc86d385b8cf2899963695

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Sun, 17 Nov 2019 13:59:40 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=96
Content-Length
1093
Expires
Fri, 24 Apr 2020 16:56:21 GMT
js
www.googletagmanager.com/gtag/
75 KB
28 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=UA-36230183-1
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
1392c66fd47cf940b980aa04cf6aad81b7bba5dc75894f692ba806ef2a3a5eb6
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:56:22 GMT
content-encoding
br
status
200
strict-transport-security
max-age=31536000; includeSubDomains
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
28642
x-xss-protection
0
last-modified
Wed, 25 Mar 2020 15:00:00 GMT
server
Google Tag Manager
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Wed, 25 Mar 2020 16:56:22 GMT
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v20/
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v20/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/webfont/1.5.3/webfont.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5d1bc9b443f3f81fa4b4ad4634c1bb9702194c1898e3a9de0ab5e2cdc0e9f479
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/css?family=Roboto%7CRoboto+Slab&subset=latin
Origin
https://www.hackread.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 27 Feb 2020 08:47:06 GMT
x-content-type-options
nosniff
last-modified
Wed, 24 Jul 2019 01:18:50 GMT
server
sffe
age
2362155
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
11016
x-xss-protection
0
expires
Fri, 26 Feb 2021 08:47:06 GMT
dynamic.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/
64 KB
64 KB
Image
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/dynamic.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/dynamic.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Wed, 25 Mar 2020 16:13:49 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=96
Content-Length
12196
Expires
Fri, 24 Apr 2020 16:56:21 GMT
fontawesome-webfont.woff2
www.hackread.com/wp-content/themes/newsgamer/assets/fonts/
75 KB
76 KB
Font
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/fonts/fontawesome-webfont.woff2?v=4.7.0
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe

Request headers

Referer
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/mip.external.css
Origin
https://www.hackread.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
font/woff2
Cache-Control
max-age=2592000
Transfer-Encoding
chunked
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=97
Expires
Fri, 24 Apr 2020 16:56:21 GMT
vertical-right-shadow.png
www.hackread.com/wp-content/themes/newsgamer/images/
3 KB
2 KB
Image
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/images/vertical-right-shadow.png
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/webfont/1.5.3/webfont.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
dfbf744b87270c5e4148371216220d1421d01dfdbf7ad35afff64763cb852484

Request headers

Referer
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/dynamic.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:34 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=97
Content-Length
1777
Expires
Thu, 25 Mar 2021 16:56:21 GMT
top-left-shadow.png
www.hackread.com/wp-content/themes/newsgamer/images/
2 KB
2 KB
Image
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/images/top-left-shadow.png
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/webfont/1.5.3/webfont.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
3329ee5bb1edc52b18015e9bdedd275415080788f9c1fdd7165bca609874c9c5

Request headers

Referer
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/dynamic.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:34 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=97
Content-Length
1599
Expires
Thu, 25 Mar 2021 16:56:21 GMT
BngbUXZYTXPIvIBgJJSb6s3BzlRRfKOFbvjojISmb2RlV9Su1cai.woff
fonts.gstatic.com/s/robotoslab/v11/
15 KB
15 KB
Font
General
Full URL
https://fonts.gstatic.com/s/robotoslab/v11/BngbUXZYTXPIvIBgJJSb6s3BzlRRfKOFbvjojISmb2RlV9Su1cai.woff
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/webfont/1.5.3/webfont.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
ce677696c57a6b97fee81d149546716b76f236cf7bb35845fa771feb91914f95
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/css?family=Roboto%7CRoboto+Slab&subset=latin
Origin
https://www.hackread.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 27 Feb 2020 14:02:43 GMT
x-content-type-options
nosniff
last-modified
Tue, 04 Feb 2020 23:46:05 GMT
server
sffe
age
2343219
content-type
font/woff
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
15244
x-xss-protection
0
expires
Fri, 26 Feb 2021 14:02:43 GMT
truncated
/
11 KB
11 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
745caffca4b97cf5cf2374d82c6dfb6fb7c7b694e85432f92ec4dcb35f4418c9

Request headers

Origin
https://www.hackread.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
application/octet-stream
serve.js.php
trends.revcontent.com/
4 KB
2 KB
Script
General
Full URL
https://trends.revcontent.com/serve.js.php?w=3420&t=rc_403&c=1585155382166&width=1600&referer=https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.30.187.156 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-30-187-156.eu-west-1.compute.amazonaws.com
Software
Apache/2.4.25 (Debian) /
Resource Hash
3325852b4bc0f0fa2f15051bd45b9c4272d533ce643cd9b455ad8f0a65042d5a
Security Headers
Name Value
Strict-Transport-Security max-age=931536000; includeSubDomains

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:56:22 GMT
content-encoding
gzip
server
Apache/2.4.25 (Debian)
access-control-allow-origin
https://www.hackread.com
vary
Accept-Encoding
p3p
CP="NOI DSP COR NID ADM DEV OUR NOR CNT"
status
200
access-control-allow-credentials
true
strict-transport-security
max-age=931536000; includeSubDomains
content-type
text/html; charset=UTF-8
integrator.js
adservice.google.de/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.hackread.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:56:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.hackread.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:56:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
104
x-xss-protection
0
show_ads_impl_fy2019.js
pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/
224 KB
84 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
1fea51227a0d0a882dcf26ad5791bdf3bbb79958e076630e86427a8266300a2a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:56:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
85515
x-xss-protection
0
server
cafe
etag
13950792502640807200
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Wed, 25 Mar 2020 16:56:22 GMT
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20200319/r20190131/ Frame 6A94
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/html/r20200319/r20190131/zrt_lookup.html
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/html/r20200319/r20190131/zrt_lookup.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
vary
Accept-Encoding
date
Sat, 21 Mar 2020 14:49:24 GMT
expires
Sat, 04 Apr 2020 14:49:24 GMT
content-type
text/html; charset=UTF-8
etag
17714563530871986051
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
4497
x-xss-protection
0
cache-control
public, max-age=1209600
age
353218
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
ads
googleads.g.doubleclick.net/pagead/ Frame C3B9
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=1082465236&adk=2021027549&adf=3499435812&w=570&fwrn=4&lmt=1585155382&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=570x90_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Fandroid-ad-fraud-campaign-drains-battery-eats-data%2F&flash=0&fwr=0&wgl=1&adsid=NT&dt=1585155382197&bpp=15&bdt=720&fdt=51&idt=52&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&correlator=3319838988378&frm=20&pv=2&ga_vid=1638074144.1585155382&ga_sid=1585155382&ga_hid=487893061&ga_fc=0&iag=0&icsg=603103935&dssz=30&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=458&ady=2620&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2231671226433643&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=1&uci=a!1&btvi=1&fsb=1&xpc=OnDLTXQgF0&p=https%3A//www.hackread.com&dtd=66
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=1082465236&adk=2021027549&adf=3499435812&w=570&fwrn=4&lmt=1585155382&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=570x90_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Fandroid-ad-fraud-campaign-drains-battery-eats-data%2F&flash=0&fwr=0&wgl=1&adsid=NT&dt=1585155382197&bpp=15&bdt=720&fdt=51&idt=52&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&correlator=3319838988378&frm=20&pv=2&ga_vid=1638074144.1585155382&ga_sid=1585155382&ga_hid=487893061&ga_fc=0&iag=0&icsg=603103935&dssz=30&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=458&ady=2620&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2231671226433643&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=1&uci=a!1&btvi=1&fsb=1&xpc=OnDLTXQgF0&p=https%3A//www.hackread.com&dtd=66
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:56:22 GMT
server
cafe
content-length
6049
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Wed, 25-Mar-2020 17:11:22 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:56:22 GMT
cache-control
private
osd.js
www.googletagservices.com/activeview/js/current/
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
351e508c1da4f9d1535747086accb41121466a52044aa868eba4a36009fdb101
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:56:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1584962844677376"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
27941
x-xss-protection
0
expires
Wed, 25 Mar 2020 16:56:22 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 0EFB
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=600&slotname=3047884612&adk=2945537484&adf=1398944667&w=300&lmt=1585155382&psa=0&guci=1.2.0.0.2.2.0.0&format=300x600&url=https%3A%2F%2Fwww.hackread.com%2Fandroid-ad-fraud-campaign-drains-battery-eats-data%2F&flash=0&wgl=1&adsid=NT&dt=1585155382212&bpp=5&bdt=735&fdt=80&idt=80&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al&correlator=3319838988378&frm=20&pv=1&ga_vid=1638074144.1585155382&ga_sid=1585155382&ga_hid=487893061&ga_fc=0&iag=0&icsg=44009401343&dssz=33&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1113&ady=225&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2231671226433643&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=2&uci=a!2&fsb=1&xpc=GcMSmDnvAJ&p=https%3A//www.hackread.com&dtd=83
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=600&slotname=3047884612&adk=2945537484&adf=1398944667&w=300&lmt=1585155382&psa=0&guci=1.2.0.0.2.2.0.0&format=300x600&url=https%3A%2F%2Fwww.hackread.com%2Fandroid-ad-fraud-campaign-drains-battery-eats-data%2F&flash=0&wgl=1&adsid=NT&dt=1585155382212&bpp=5&bdt=735&fdt=80&idt=80&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al&correlator=3319838988378&frm=20&pv=1&ga_vid=1638074144.1585155382&ga_sid=1585155382&ga_hid=487893061&ga_fc=0&iag=0&icsg=44009401343&dssz=33&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1113&ady=225&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2231671226433643&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=2&uci=a!2&fsb=1&xpc=GcMSmDnvAJ&p=https%3A//www.hackread.com&dtd=83
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:56:22 GMT
server
cafe
content-length
206
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Wed, 25-Mar-2020 17:11:22 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:56:22 GMT
cache-control
private
serve.js.php
trends.revcontent.com/
125 KB
39 KB
XHR
General
Full URL
https://trends.revcontent.com/serve.js.php?w=3420&t=rc_403&c=1585155382166&width=1600&site_url=https%3A%2F%2Fwww.hackread.com%2Fandroid-ad-fraud-campaign-drains-battery-eats-data%2F&referer=&skip_demand=true
Requested by
Host: trends.revcontent.com
URL: https://trends.revcontent.com/serve.js.php?w=3420&t=rc_403&c=1585155382166&width=1600&referer=https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.30.187.156 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-30-187-156.eu-west-1.compute.amazonaws.com
Software
Apache/2.4.25 (Debian) /
Resource Hash
c062c1b2692575539bd74ca731901b5a1897b59b04962195e22304b31a3ebbd6
Security Headers
Name Value
Strict-Transport-Security max-age=931536000; includeSubDomains

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

date
Wed, 25 Mar 2020 16:56:22 GMT
content-encoding
gzip
server
Apache/2.4.25 (Debian)
status
200
strict-transport-security
max-age=931536000; includeSubDomains
p3p
CP="NOI DSP COR NID ADM DEV OUR NOR CNT"
access-control-allow-origin
https://www.hackread.com
access-control-allow-credentials
true
content-type
text/javascript; charset=utf-8
pixel_sync
trends.revcontent.com/cm/
Redirect Chain
  • https://b1sync.zemanta.com/usersync/revcontent/?puid=ZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI%3D&cb=https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fexchange_uid%3DZjVlMWU1ZTNkYTVjMDE2YzI...
  • https://b1sync.zemanta.com/usersync/revcontent/?cb=https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fexchange_uid%3DZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI%253D%26bidder%3D3%26bidder_uid%...
  • https://trends.revcontent.com/cm/pixel_sync?exchange_uid=ZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI%3D&bidder=3&bidder_uid=VBGk-htCmYiwvcMbQD1K
35 B
213 B
Image
General
Full URL
https://trends.revcontent.com/cm/pixel_sync?exchange_uid=ZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI%3D&bidder=3&bidder_uid=VBGk-htCmYiwvcMbQD1K
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.30.187.156 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-30-187-156.eu-west-1.compute.amazonaws.com
Software
/ Express
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Wed, 25 Mar 2020 16:56:23 GMT
x-powered-by
Express
content-length
35
content-type
image/gif

Redirect headers

Pragma
no-cache
Date
Wed, 25 Mar 2020 16:56:23 GMT
P3p
CP="We do not support P3P header."
Location
https://trends.revcontent.com/cm/pixel_sync?exchange_uid=ZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI%3D&bidder=3&bidder_uid=VBGk-htCmYiwvcMbQD1K
Cache-Control
no-cache, no-store, must-revalidate
Content-Type
text/html; charset=utf-8
Content-Length
175
Expires
Thu, 01 Dec 1994 16:00:00 GMT
pixel_sync
trends.revcontent.com/cm/
Redirect Chain
  • https://ib.adnxs.com/getuid?https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fbidder%3D115%26bidder_uid%3D%24UID%26exchange_uid%3DZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI%253D&geo=35&rev_d...
  • https://ib.adnxs.com/bounce?%2Fgetuid%3Fhttps%253A%252F%252Ftrends.revcontent.com%252Fcm%252Fpixel_sync%253Fbidder%253D115%2526bidder_uid%253D%2524UID%2526exchange_uid%253DZjVlMWU1ZTNkYTVjMDE2YzI0Y...
  • https://trends.revcontent.com/cm/pixel_sync?bidder=115&bidder_uid=7832699342995059050&exchange_uid=ZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI%3D&geo=35&rev_dt=1585155382
35 B
215 B
Image
General
Full URL
https://trends.revcontent.com/cm/pixel_sync?bidder=115&bidder_uid=7832699342995059050&exchange_uid=ZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI%3D&geo=35&rev_dt=1585155382
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.30.187.156 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-30-187-156.eu-west-1.compute.amazonaws.com
Software
/ Express
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Wed, 25 Mar 2020 16:56:22 GMT
x-powered-by
Express
content-length
35
content-type
image/gif

Redirect headers

Pragma
no-cache
Date
Wed, 25 Mar 2020 16:56:24 GMT
AN-X-Request-Uuid
18ca2371-0d30-4de3-b133-5b8d6a9b250b
Content-Type
text/html; charset=utf-8
Server
nginx/1.13.4
Location
https://trends.revcontent.com/cm/pixel_sync?bidder=115&bidder_uid=7832699342995059050&exchange_uid=ZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI%3D&geo=35&rev_dt=1585155382
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
*
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
X-Proxy-Origin
178.239.168.250; 178.239.168.250; 319.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.122:80
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
pixel_sync
trends.revcontent.com/cm/
Redirect Chain
  • https://x.bidswitch.net/sync?ssp=revcontent&rev_dt=1585155382
  • https://x.bidswitch.net/ul_cb/sync?ssp=revcontent&rev_dt=1585155382
  • https://green.erne.co/bidswitch/cm?bidswitch_ssp_id=revcontent&gdpr=&gdpr_consent=
  • https://x.bidswitch.net/sync?dsp_id=270&expires=10&user_id=clJcSKqJIdIeWXsMQ79jUhr4&ssp=revcontent
  • https://trends.revcontent.com/cm/pixel_sync?bidder=118&bidder_uid=aba33064-7efb-4699-96d4-2b06a9e1e410
35 B
215 B
Image
General
Full URL
https://trends.revcontent.com/cm/pixel_sync?bidder=118&bidder_uid=aba33064-7efb-4699-96d4-2b06a9e1e410
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.30.187.156 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-30-187-156.eu-west-1.compute.amazonaws.com
Software
/ Express
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Wed, 25 Mar 2020 16:56:22 GMT
x-powered-by
Express
content-length
35
content-type
image/gif

Redirect headers

status
302
date
Wed, 25 Mar 2020 16:56:22 GMT
cache-control
no-cache, no-store, must-revalidate
content-length
0
location
//trends.revcontent.com/cm/pixel_sync?bidder=118&bidder_uid=aba33064-7efb-4699-96d4-2b06a9e1e410
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
cookiesync
bttrack.com/pixel/
35 B
380 B
Image
General
Full URL
https://bttrack.com/pixel/cookiesync?source=0b0edea9-c9fe-4b9c-9bcd-a51022f2873f&publisherid=ZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI%253D&pushdata=109&secure=1&rev_dt=1585155382
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
192.132.33.46 , United States, ASN18568 (BIDTELLECT, US),
Reverse DNS
46.bidtellect.com
Software
Microsoft-IIS/8.5 /
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

X-ServerName
Track001-dc3
Pragma
no-cache
Date
Wed, 25 Mar 2020 16:56:21 GMT
X-AspNetMvc-Version
5.2
Server
Microsoft-IIS/8.5
X-AspNet-Version
4.0.30319
P3P
CP="CAO DSP COR ADMo DEVo PSAo PSDo HISo IVAo IVDo OUR IND OTC"
Cache-Control
private,no-cache
Content-Type
image/gif
Content-Length
35
Expires
-1
pixel_sync
trends.revcontent.com/cm/
Redirect Chain
  • https://rtb.mfadsrvr.com/sync?ssp=revcontent&ssp_user_id=ZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI%3D&rev_dt=1585155382
  • https://rtb.mfadsrvr.com/ul_cb/sync?ssp=revcontent&ssp_user_id=ZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI%3D&rev_dt=1585155382
  • https://trends.revcontent.com/cm/pixel_sync?exchange_uid=ZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI=&bidder=154&bidder_uid=883c759f-5e1a-4982-8f9a-63ddec13aad1
35 B
215 B
Image
General
Full URL
https://trends.revcontent.com/cm/pixel_sync?exchange_uid=ZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI=&bidder=154&bidder_uid=883c759f-5e1a-4982-8f9a-63ddec13aad1
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.30.187.156 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-30-187-156.eu-west-1.compute.amazonaws.com
Software
/ Express
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Wed, 25 Mar 2020 16:56:22 GMT
x-powered-by
Express
content-length
35
content-type
image/gif

Redirect headers

Location
//trends.revcontent.com/cm/pixel_sync?exchange_uid=ZjVlMWU1ZTNkYTVjMDE2YzI0Y2U0MmFhMWRjN2RkODI=&bidder=154&bidder_uid=883c759f-5e1a-4982-8f9a-63ddec13aad1
Date
Wed, 25 Mar 2020 16:56:22 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Length
0
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
ads
googleads.g.doubleclick.net/pagead/ Frame 90C6
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=280&slotname=6531121012&adk=752714257&adf=3714235230&w=1200&fwrn=4&fwrnh=100&lmt=1585155382&rafmt=1&psa=0&guci=1.2.0.0.2.2.0.0&format=1200x280&url=https%3A%2F%2Fwww.hackread.com%2Fandroid-ad-fraud-campaign-drains-battery-eats-data%2F&flash=0&fwr=0&rpe=1&resp_fmts=3&wgl=1&adsid=NT&dt=1585155382217&bpp=4&bdt=739&fdt=86&idt=86&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x600&correlator=3319838988378&frm=20&pv=1&ga_vid=1638074144.1585155382&ga_sid=1585155382&ga_hid=487893061&ga_fc=0&iag=0&icsg=44009401343&dssz=33&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=193&ady=3650&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2231671226433643&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=3&uci=a!3&btvi=2&fsb=1&xpc=UJfzughJp5&p=https%3A//www.hackread.com&dtd=88
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=280&slotname=6531121012&adk=752714257&adf=3714235230&w=1200&fwrn=4&fwrnh=100&lmt=1585155382&rafmt=1&psa=0&guci=1.2.0.0.2.2.0.0&format=1200x280&url=https%3A%2F%2Fwww.hackread.com%2Fandroid-ad-fraud-campaign-drains-battery-eats-data%2F&flash=0&fwr=0&rpe=1&resp_fmts=3&wgl=1&adsid=NT&dt=1585155382217&bpp=4&bdt=739&fdt=86&idt=86&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x600&correlator=3319838988378&frm=20&pv=1&ga_vid=1638074144.1585155382&ga_sid=1585155382&ga_hid=487893061&ga_fc=0&iag=0&icsg=44009401343&dssz=33&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=193&ady=3650&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2231671226433643&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=3&uci=a!3&btvi=2&fsb=1&xpc=UJfzughJp5&p=https%3A//www.hackread.com&dtd=88
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:56:22 GMT
server
cafe
content-length
204
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Wed, 25-Mar-2020 17:11:22 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:56:22 GMT
cache-control
private
drainerbot-distributing-infected-apps-that-continuously-drain-your-data.png
www.hackread.com/wp-content/uploads/2019/02/
170 KB
163 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2019/02/drainerbot-distributing-infected-apps-that-continuously-drain-your-data.png
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
9fc8807ff7c9816212de03baeadd6991631ff50617d932c584e74da7c40b3873

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:56:21 GMT
Content-Encoding
gzip
Last-Modified
Thu, 21 Feb 2019 16:14:04 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=31536000
Transfer-Encoding
chunked
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=95
Expires
Thu, 25 Mar 2021 16:56:21 GMT
admin-ajax.php
www.hackread.com/wp-admin/
14 B
591 B
XHR
General
Full URL
https://www.hackread.com/wp-admin/admin-ajax.php
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/wp-includes/js/jquery/jquery.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
dd5228e0e4bef5457b392331a4d7681af62b8be8df569a60c7a89b7d02b63b84
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

Accept
*/*
Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Origin
https://www.hackread.com
X-Requested-With
XMLHttpRequest
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Date
Wed, 25 Mar 2020 16:56:22 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Connection
Keep-Alive
Content-Length
34
Referrer-Policy
strict-origin-when-cross-origin
Server
Apache
X-Frame-Options
SAMEORIGIN
Vary
Accept-Encoding
Content-Type
text/html; charset=UTF-8
Access-Control-Allow-Origin
https://www.hackread.com
Cache-Control
no-cache, must-revalidate, max-age=0
Access-Control-Allow-Credentials
true
X-Robots-Tag
noindex
Keep-Alive
timeout=2, max=92
Expires
Wed, 11 Jan 1984 05:00:00 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 5DA5
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&adk=1812271804&adf=3025194257&lmt=1585155382&plat=1%3A32776%2C2%3A16809992%2C8%3A134250504%2C9%3A134250504%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fwww.hackread.com%2Fandroid-ad-fraud-campaign-drains-battery-eats-data%2F&ea=0&flash=0&pra=7&wgl=1&adsid=NT&dt=1585155382514&bpp=3&bdt=1037&fdt=4&idt=4&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x600%2C1200x280&nras=1&correlator=3319838988378&frm=20&pv=1&ga_vid=1638074144.1585155382&ga_sid=1585155382&ga_hid=487893061&ga_fc=0&iag=0&icsg=11266406744060&dssz=41&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2231671226433643&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&ifi=3&uci=a!3&fsb=1&dtd=11
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&adk=1812271804&adf=3025194257&lmt=1585155382&plat=1%3A32776%2C2%3A16809992%2C8%3A134250504%2C9%3A134250504%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fwww.hackread.com%2Fandroid-ad-fraud-campaign-drains-battery-eats-data%2F&ea=0&flash=0&pra=7&wgl=1&adsid=NT&dt=1585155382514&bpp=3&bdt=1037&fdt=4&idt=4&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x600%2C1200x280&nras=1&correlator=3319838988378&frm=20&pv=1&ga_vid=1638074144.1585155382&ga_sid=1585155382&ga_hid=487893061&ga_fc=0&iag=0&icsg=11266406744060&dssz=41&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2231671226433643&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&ifi=3&uci=a!3&fsb=1&dtd=11
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
test_cookie=CheckForPermission
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:56:22 GMT
server
cafe
content-length
34
x-xss-protection
0
set-cookie
IDE=AHWqTUmgSZCt6NdOAlmBgprQEslx0BGhPAVJJWH9tIAVQvA_QZAKs2eHtbnKJ_Om; expires=Mon, 19-Apr-2021 16:56:22 GMT; path=/; domain=.doubleclick.net; Secure; HttpOnly; SameSite=none test_cookie=; domain=.doubleclick.net; path=/; expires=Mon, 21 Jul 2008 23:59:00 GMT; SameSite=none; Secure
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:56:22 GMT
cache-control
private
analytics.js
www.google-analytics.com/
44 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=UA-36230183-1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
eaf1b128b927ac2868755cb7366d35554255c8af362235afe270f9614f8c806d
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 06 Feb 2020 00:21:02 GMT
server
Golfe2
age
1067
date
Wed, 25 Mar 2020 16:38:35 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
18174
expires
Wed, 25 Mar 2020 18:38:35 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j81&a=487893061&t=pageview&_s=1&dl=https%3A%2F%2Fwww.hackread.com%2Fandroid-ad-fraud-campaign-drains-battery-eats-data%2F&ul=en-us&de=UTF-8&dt=Majo...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-36230183-1&cid=1638074144.1585155382&jid=1048300620&_gid=1690720166.1585155383&gjid=266516918&_v=j81&z=1773049026
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=1638074144.1585155382&jid=1048300620&_v=j81&z=1773049026
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=1638074144.1585155382&jid=1048300620&_v=j81&z=1773049026&slf_rd=1&random=2372828178
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=1638074144.1585155382&jid=1048300620&_v=j81&z=1773049026&slf_rd=1&random=2372828178
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 25 Mar 2020 16:56:22 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 25 Mar 2020 16:56:22 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=1638074144.1585155382&jid=1048300620&_v=j81&z=1773049026&slf_rd=1&random=2372828178
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
rev2.min.css
cdn.revcontent.com/build/css/
83 KB
26 KB
Stylesheet
General
Full URL
https://cdn.revcontent.com/build/css/rev2.min.css?v=b8105739289accd23ebdbf436f27bfccb40d2ffe
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
92092346680de76a5598060f7827a818c95b1ae9dc8b527d6123dca3778b51d9

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Wed, 25 Mar 2020 16:56:22 GMT
content-encoding
gzip
last-modified
Wed, 18 Mar 2020 21:50:06 GMT
access-control-allow-origin
*
etag
"1584568206"
x-hw
1585155382.cds083.lo4.hn,1585155382.cds221.lo4.c
content-type
text/css
status
200
cache-control
max-age=40
accept-ranges
bytes
content-length
26346
rev2.min.js
cdn.revcontent.com/build/js/
280 KB
98 KB
Script
General
Full URL
https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
de08c0b7fbe466f95d1706487b3d0c468598ea2a1b8becd8e174a5cd0de6bc42

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:56:22 GMT
content-encoding
gzip
last-modified
Wed, 18 Mar 2020 21:50:06 GMT
access-control-allow-origin
*
etag
"1584568206"
x-hw
1585155382.cds083.lo4.hn,1585155382.cds038.lo4.c
content-type
application/javascript
status
200
cache-control
max-age=30
accept-ranges
bytes
content-length
100286
rendered
ri.amurege.com/notify/
0
99 B
Image
General
Full URL
https://ri.amurege.com/notify/rendered?a=revcontent&cep=zhmUVfedQdPTdukf9hfuyteG28CRbn_uXv6bUg2jFHGLwEbgGqO-0xCEtD5-tZ9u3q8Cj8O_6ElVlXSl9fSSojYfw44UMNI-XMMFXtGrN18Tci-aHNIY0XJbPjeKIaYTPgv07WL0H7DFDKcwcPMeApRCQokPMy9xkhAIAhhfOGtxnHervpa-OLc997_ZjR7e60g8i1nPO3GxEh27dd33xLV1BhEtfU9-itVsBbWyJejTQNyO_EZ3bWwbc8qk93jUaf4h5jc20eYk3FLldoC7FQ==
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.215.85.88 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-3-215-85-88.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Connection
keep-alive
Date
Wed, 25 Mar 2020 16:56:22 GMT
Content-Length
0
imp.php
trends.revcontent.com/
0
205 B
XHR
General
Full URL
https://trends.revcontent.com/imp.php
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.30.187.156 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-30-187-156.eu-west-1.compute.amazonaws.com
Software
Apache/2.4.25 (Debian) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=931536000; includeSubDomains

Request headers

Accept
*/*
Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Wed, 25 Mar 2020 16:56:22 GMT
server
Apache/2.4.25 (Debian)
status
200
strict-transport-security
max-age=931536000; includeSubDomains
content-type
text/html; charset=UTF-8
access-control-allow-origin
https://www.hackread.com
access-control-allow-credentials
true
content-length
0
sodar
pagead2.googlesyndication.com/getconfig/
7 KB
5 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gda&tv=r20200319&st=env
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0ba699724123cbd638f7ab96b9e347f2a9796169a93364a3c6aa01ce32298c05
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 25 Mar 2020 16:56:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5173
x-xss-protection
0
640x480.jpg
static.earnify.com/m/ca4368be-f78c-4cfd-ba34-f3a33e0d2821/45444160-510d-484a-81b4-f1d471e06585/
73 KB
74 KB
Image
General
Full URL
https://static.earnify.com/m/ca4368be-f78c-4cfd-ba34-f3a33e0d2821/45444160-510d-484a-81b4-f1d471e06585/640x480.jpg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6811:860f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a00948dfbd14e9a58138353d46aa2e018b566721ea07315b5e742412ce85a0f4

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:56:23 GMT
cf-cache-status
HIT
age
5351
cf-polished
origFmt=jpeg, origSize=143408
cf-ray
579a2a3a8f8e9754-FRA
status
200
content-disposition
inline; filename="640x480.webp"
cf-bgj
imgq:100
alt-svc
h3-27=":443"; ma=86400, h3-25=":443"; ma=86400, h3-24=":443"; ma=86400, h3-23=":443"; ma=86400
content-length
74662
x-amz-id-2
yZ+qu2q8A6UhQ7B/N5HWmCh3YsFl+9ZSsXeHWKwKK2JzQZ3Smmtf8H1OqsJTr3Piua50mmXZOl4=
last-modified
Mon, 23 Mar 2020 05:36:53 GMT
server
cloudflare
etag
"7d5e6740e21b88814c16850a2b109d0a"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept
x-amz-request-id
BB01C875189A6237
cache-control
public, max-age=7200
x-amz-version-id
k6YPXtAAq.1vMLTpvXv8RiJYUrDP4era
accept-ranges
bytes
content-type
image/webp
expires
Wed, 25 Mar 2020 18:56:23 GMT
/
img.revcontent.com/
69 KB
69 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/15682945132127147593.jpeg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
4faf7846805e1149f981494ebe3a1b5f9fe5ba40c5080b1fee2360e3660145df

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:56:23 GMT
last-modified
Thu, 12 Sep 2019 13:21:54 GMT
etag
"1568294514"
x-hw
1585155383.cds103.lo4.hc,1585155383.cds203.lo4.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
70764
b625c180-1901-4b5c-a191-9065a8d9d734.jpeg
cdn.amurege.com/6f4a2f71-ee33-4558-bacf-560a93d17147/
42 KB
42 KB
Image
General
Full URL
https://cdn.amurege.com/6f4a2f71-ee33-4558-bacf-560a93d17147/b625c180-1901-4b5c-a191-9065a8d9d734.jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.7.105 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-86-7-105.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
88fd69c6e047107a5847973ddfb9e9db56b36c874ca48e705868dac9f37b6368

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 14:35:59 GMT
via
1.1 507b5edb20d0e1a0b73c8687f53defa9.cloudfront.net (CloudFront)
last-modified
Wed, 25 Mar 2020 14:16:22 GMT
server
AmazonS3
age
8425
etag
"ac7d5e8538e4a59576c5c891e38ac642"
x-cache
Hit from cloudfront
content-type
application/octet-stream
status
200
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-length
42529
x-amz-cf-id
ZdQ4FyQ_F4PdV0e11tcTVVHIjMp_nAqlrDyW9jpvp2fW9lFASqNneg==
/
img.revcontent.com/
46 KB
46 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/6bd7813450c3963c77ed56d38f4a7da9.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
602170e4707bad1d75b31d0483f3ea8b71924869d263da364887634c110b8f38

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:56:23 GMT
last-modified
Thu, 16 Jan 2020 23:25:46 GMT
etag
"1579217146"
x-hw
1585155383.cds103.lo4.hc,1585155383.cds062.lo4.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
46673
/
img.revcontent.com/
43 KB
44 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/15805714371652150840.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
2268477350b6858d1d4ea280ea8363946ba979ea71a6de93beb329e560537298

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:56:23 GMT
last-modified
Sat, 01 Feb 2020 15:37:18 GMT
etag
"1580571438"
x-hw
1585155383.cds103.lo4.hc,1585155383.cds033.lo4.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
44441
/
img.revcontent.com/
19 KB
19 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/5e789a953b9f19-86655759.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
0b698085999ff1648450eb4ebede9ffe6133023308ccd70f71ebaf5214d31a25

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:56:23 GMT
last-modified
Mon, 23 Mar 2020 11:16:38 GMT
etag
"1584962198"
x-hw
1585155383.cds103.lo4.hc,1585155383.cds059.lo4.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
19373
/
img.revcontent.com/
41 KB
41 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/15197654120400148573.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
638fe957bbac3f5c8ceb07f22c8241b861ee5c969f344fe80317f2748ec90c30

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:56:23 GMT
last-modified
Tue, 27 Feb 2018 21:03:33 GMT
etag
"1519765413"
x-hw
1585155383.cds103.lo4.hc,1585155383.cds059.lo4.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
42265
/
img.revcontent.com/
48 KB
48 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/5e55183b646d76-48827670.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
185dae0f9afa3ef5b67bcc155c6dfbe1f4da269cd3d9e78d9c0778a22e903ae3

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:56:23 GMT
last-modified
Tue, 25 Feb 2020 12:51:08 GMT
etag
"1582635068"
x-hw
1585155383.cds103.lo4.hc,1585155383.cds236.lo4.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
49321
/
img.revcontent.com/
48 KB
49 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/5e7364b5a4f8c8-69155061.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
259d20d5cc51fb74e3d3d154d03ff14dfb86d9564c1c38c72dd212661d390ac9

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:56:24 GMT
last-modified
Thu, 19 Mar 2020 12:25:26 GMT
etag
"1584620726"
x-hw
1585155383.cds103.lo4.hc,1585155384.cds064.lo4.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
49532
sodar2.js
tpc.googlesyndication.com/sodar/
14 KB
5 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a47f17d6ebbf4621d8fe87ab790d8d8fb5c3086629194d9ff2d64faaa6e46ab6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:56:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1582746470043195"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5456
x-xss-protection
0
expires
Wed, 25 Mar 2020 16:56:23 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/209/ Frame DEFE
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/209/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
5727
date
Wed, 25 Mar 2020 16:21:05 GMT
expires
Thu, 25 Mar 2021 16:21:05 GMT
last-modified
Tue, 25 Feb 2020 17:32:01 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
2118
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
gen_204
pagead2.googlesyndication.com/pagead/
0
49 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=209&t=2&li=gda_r20200319&jk=2231671226433643&bg=!KyilKDBYf-XFV5c8H3ACAAAANFIAAAAImQFcbZolqwS7XvhZEfaXxsalV7tN04W9vN3yfzrXI8wlerLTaiiebrDzrW-CK8fUf9ovTSmsOx3oyKGzk5mhLKuK4ZpUgNruQsAUF8GY9VhV4EB0AZH8E_xzWoA_Ke_Y4EEHFQcHIfTDpOcn7UuhaJs0GwQFbpnGb-L6BVR8zc_PHs-KE94N9imUZpSYMRhfROTOx6yPceVPgFvDN6w6w7RZdVaoBENLtA5LVWUbxjsaxMEJ1tTX5UHzWT11p8dHA2HszzDs2MQ9-UE_7MZ0yhgHO0GbVWaMKA6g6olXyl5a45iCeBS4AbV90JyMHHv3t9cTkS_fRncaPp--NW3A5PQdcAUXYYz8N_gQBOdNp39Ktj-UCNgSgYqyxwYuangJXYj5RIItVWqJziBCzJrfm1eFZK_9sWzbfT0FPyC5wPXTT-Q15Ismn6ooZ2avqeIH5lg_0fcgHLQhm8Yc3lBM
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/android-ad-fraud-campaign-drains-battery-eats-data/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Wed, 25 Mar 2020 16:56:23 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Verdicts & Comments Add Verdict or Comment

114 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| WebFontConfig object| _wpemojiSettings object| webfont object| WebFont object| twemoji object| wp undefined| $ function| jQuery object| cookieconsent number| initStickyMenu object| adsbygoogle object| google_js_reporting_queue number| google_srt object| google_ad_modifications object| google_logging_queue object| ggeac boolean| google_measure_js_timing object| googleToken object| googleIMState function| processGoogleToken object| google_reactive_ads_global_state boolean| _gfp_a_ object| google_sa_queue object| google_sl_win function| google_process_slots boolean| google_apltlad boolean| _gfp_p_ function| google_spfd number| google_lpabyc number| google_unique_id object| google_sv_map object| google_t12n_vars boolean| miptheme_smooth_scrolling number| miptheme_ajaxpagination_timer number| miptheme_sticky_sidebar_margin number| miptheme_parallax_image_height object| mipthemeLocalCache object| wpcf7 object| mashsb undefined| strict object| thirsty_global_vars function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter function| google_sa_impl object| google_jobrunner object| google_persistent_state_async object| __google_ad_urls number| google_global_correlator number| __google_ad_urls_id object| google_prev_clients object| gaGlobal object| ampInaboxIframes object| ampInaboxPendingMessages object| google_iframe_oncopy boolean| google_osd_loaded boolean| google_onload_fired object| thirstyFunctions object| jQuery112409086148345532192 function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb function| SocialMediaStats function| smooth_scroll function| setCookie function| getCookie object| _photobox function| wNumb function| Cookies function| shareSelectedText object| miptheme_ajax_url function| setVideoHeights object| miptheme_ajax_post_views object| addComment function| gtag object| dataLayer object| google_tag_manager string| GoogleAnalyticsObject function| ga object| google_tag_data object| gaplugins object| gaData boolean| clean_io_required object| rc_head object| rc_body object| rc2css object| rc2js undefined| rc2js_beacon_5e7b8d369dee5 object| rcel object| rcds object| beaconNoScript object| rc_segmented_creatives object| rc_segmented_widgets object| rc_loaded_widgets undefined| rc_chosen_interests number| rc_loader_limit number| rc_loader_runs object| rc_loaded_hashes object| rcsc object| RevContentLoader string| rc_p_uuid number| provider string| do_branding object| Base64 function| rcjq boolean| scrolled boolean| swiped boolean| resized boolean| rc_segments_sent function| Hammer object| jQuery1102013524142020531604 object| GoogleGcLKhOms object| google_image_requests

0 Cookies

2 Console Messages

Source Level URL
Text
console-api log URL: https://www.hackread.com/wp-includes/js/jquery/jquery-migrate.min.js(Line 2)
Message:
JQMIGRATE: Migrate is installed, version 1.4.1
console-api log URL: https://www.hackread.com/wp-content/plugins/mashsharer/assets/js/mashsb.min.js(Line 1)
Message:
not rate limited: 1585155410

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

adservice.google.com
adservice.google.de
ajax.googleapis.com
b1sync.zemanta.com
bttrack.com
cdn.amurege.com
cdn.revcontent.com
cdnjs.cloudflare.com
fonts.googleapis.com
fonts.gstatic.com
googleads.g.doubleclick.net
green.erne.co
ib.adnxs.com
img.revcontent.com
pagead2.googlesyndication.com
ri.amurege.com
rtb.mfadsrvr.com
secure.gravatar.com
static.earnify.com
stats.g.doubleclick.net
tpc.googlesyndication.com
trends.revcontent.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
www.hackread.com
x.bidswitch.net
151.139.128.10
18.194.31.52
185.33.223.204
188.165.27.173
192.132.33.46
2606:4700::6811:4104
2606:4700::6811:860f
2a00:1450:4001:800::2002
2a00:1450:4001:800::2008
2a00:1450:4001:806::2004
2a00:1450:4001:808::2002
2a00:1450:4001:80b::200a
2a00:1450:4001:814::2003
2a00:1450:4001:817::200e
2a00:1450:4001:81b::2001
2a00:1450:4001:81d::2002
2a00:1450:4001:81e::2002
2a00:1450:4001:81e::2003
2a00:1450:4001:821::200a
2a00:1450:400c:c00::9b
2a04:fa87:fffe::c000:4902
3.215.85.88
52.30.187.156
54.93.143.102
67.227.194.195
70.42.32.31
99.86.7.105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