URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Submission: On February 04 via manual from US

Summary

This website contacted 25 IPs in 5 countries across 19 domains to perform 86 HTTP transactions. The main IP is 192.0.78.12, located in San Francisco, United States and belongs to AUTOMATTIC - Automattic, Inc, US. The main domain is hackerpython.wordpress.com.
TLS certificate: Issued by COMODO RSA Domain Validation Secure S... on September 6th 2018. Valid for: 2 years.
This is the only time hackerpython.wordpress.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 192.0.78.12 2635 (AUTOMATTIC)
15 192.0.77.32 2635 (AUTOMATTIC)
1 2a00:1450:400... 15169 (GOOGLE)
10 52.212.214.82 16509 (AMAZON-02)
4 2a04:fa87:fff... 2635 (AUTOMATTIC)
5 192.0.76.3 2635 (AUTOMATTIC)
2 2a00:1450:400... 15169 (GOOGLE)
1 192.0.78.22 2635 (AUTOMATTIC)
3 2a00:1450:400... 15169 (GOOGLE)
1 2a03:2880:f02... 32934 (FACEBOOK)
1 4 34.255.224.65 16509 (AMAZON-02)
3 2606:4700::68... 13335 (CLOUDFLAR...)
1 185.33.223.215 29990 (ASN-APPNEXUS)
2 2.18.232.7 16625 (AKAMAI-AS)
6 54.241.163.74 16509 (AMAZON-02)
12 30 152.195.15.114 15133 (EDGECAST)
1 54.37.115.97 16276 (OVH)
1 2.18.232.130 16625 (AKAMAI-AS)
1 35.156.2.6 16509 (AMAZON-02)
1 1 151.101.0.166 54113 (FASTLY)
1 2a02:fa8:8806... 25751 (VALUECLICK)
1 52.18.226.220 16509 (AMAZON-02)
1 2a02:fa8:8806... 25751 (VALUECLICK)
1 54.93.148.82 16509 (AMAZON-02)
3 192.0.78.13 2635 (AUTOMATTIC)
86 25
Domain Requested by
30 adserver-us.adtech.advertising.com 12 redirects hackerpython.wordpress.com
10 s.pubmine.com hackerpython.wordpress.com
s.pubmine.com
6 hb.nexage.com s.pubmine.com
6 s2.wp.com hackerpython.wordpress.com
5 s0.wp.com hackerpython.wordpress.com
s1.wp.com
public-api.wordpress.com
4 api.viglink.com 1 redirects cdn.viglink.com
4 pixel.wp.com hackerpython.wordpress.com
3 pubpress.net hackerpython.wordpress.com
3 cdn.viglink.com hackerpython.wordpress.com
3 fonts.gstatic.com hackerpython.wordpress.com
3 0.gravatar.com hackerpython.wordpress.com
s1.wp.com
2 widgets.wp.com hackerpython.wordpress.com
s1.wp.com
2 ssl.google-analytics.com hackerpython.wordpress.com
2 s1.wp.com hackerpython.wordpress.com
1 pixel.advertising.com
1 aol-match.dotomi.com
1 match.adsrvr.org
1 openx2-match.dotomi.com
1 bh.contextweb.com 1 redirects
1 pixel.quantserve.com
1 acdn.adnxs.com s.pubmine.com
1 sync.teads.tv s.pubmine.com
1 hb-api.omnitagjs.com s.pubmine.com
1 a.teads.tv s.pubmine.com
1 ib.adnxs.com s.pubmine.com
1 graph.facebook.com s1.wp.com
1 public-api.wordpress.com hackerpython.wordpress.com
1 stats.wp.com hackerpython.wordpress.com
1 1.gravatar.com hackerpython.wordpress.com
1 fonts.googleapis.com hackerpython.wordpress.com
1 hackerpython.wordpress.com
86 31
Subject Issuer Validity Valid
*.wordpress.com
COMODO RSA Domain Validation Secure Server CA
2018-09-06 -
2020-09-05
2 years crt.sh
*.wp.com
Go Daddy Secure Certificate Authority - G2
2018-04-10 -
2020-05-11
2 years crt.sh
*.googleapis.com
Google Internet Authority G3
2019-01-15 -
2019-04-09
3 months crt.sh
s.pubmine.com
Go Daddy Secure Certificate Authority - G2
2017-11-01 -
2020-11-01
3 years crt.sh
*.gravatar.com
COMODO RSA Domain Validation Secure Server CA
2018-09-06 -
2020-09-05
2 years crt.sh
*.google-analytics.com
Google Internet Authority G3
2019-01-15 -
2019-04-09
3 months crt.sh
*.google.com
Google Internet Authority G3
2019-01-15 -
2019-04-09
3 months crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-01-21 -
2019-04-21
3 months crt.sh
ssl418259.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-09-22 -
2019-03-31
6 months crt.sh
*.adnxs.com
DigiCert ECC Secure Server CA
2019-01-23 -
2021-03-08
2 years crt.sh
teads.tv
Let's Encrypt Authority X3
2019-01-02 -
2019-04-02
3 months crt.sh
*.nexage.com
DigiCert SHA2 High Assurance Server CA
2018-10-19 -
2019-04-17
6 months crt.sh
*.adtech.advertising.com
DigiCert SHA2 High Assurance Server CA
2018-05-22 -
2020-05-26
2 years crt.sh
omnitagjs.com
COMODO RSA Organization Validation Secure Server CA
2018-04-17 -
2019-04-17
a year crt.sh
viglink.com
Amazon
2018-03-09 -
2019-04-09
a year crt.sh
cdn.adnxs.com
GeoTrust RSA CA 2018
2018-11-20 -
2020-02-19
a year crt.sh
*.quantserve.com
DigiCert SHA2 High Assurance Server CA
2018-10-16 -
2019-10-21
a year crt.sh
*.dotomi.com
GlobalSign Organization Validation CA - SHA256 - G2
2017-07-11 -
2019-08-01
2 years crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2017-02-15 -
2019-04-19
2 years crt.sh
pixel.advertising.com
DigiCert SHA2 High Assurance Server CA
2017-06-14 -
2020-06-18
3 years crt.sh
tls.automattic.com
Let's Encrypt Authority X3
2019-02-02 -
2019-05-03
3 months crt.sh

This page contains 9 frames:

Primary Page: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Frame ID: 2890BBDBC41FCEA81F3D5A13E58ABE3F
Requests: 75 HTTP requests in this frame

Frame: https://public-api.wordpress.com/connect/?googleplus-sign-in=https%3A%2F%2Fhackerpython.wordpress.com&color_scheme=light
Frame ID: 1F6B34C16C4F7E943500785EA4AA88AB
Requests: 2 HTTP requests in this frame

Frame: https://widgets.wp.com/likes/master.html?ver=20180319
Frame ID: A46F5C1C409796AB32369EA4724C09F9
Requests: 1 HTTP requests in this frame

Frame: https://widgets.wp.com/likes/index.html?ver=20180319
Frame ID: 46481BA7AC68B3D67B5C0FA57CB02812
Requests: 1 HTTP requests in this frame

Frame: https://sync.teads.tv/iframe
Frame ID: E1CB0982ED34CD9EC983D48B76FC05F6
Requests: 1 HTTP requests in this frame

Frame: https://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
Frame ID: 92F36F8D33B5F508F6A1908F3EC57FD4
Requests: 1 HTTP requests in this frame

Frame: https://pubpress.net/houseads/2018/03/15/wordads/3-10-300x250.png
Frame ID: 180365107774D5B3EA455C1C1C99A6CC
Requests: 2 HTTP requests in this frame

Frame: https://pubpress.net/houseads/2017/11/22/hiring/house/en/300x250_mrec_hiring.png
Frame ID: B8FCBBA13FB445FC5E332A2A8837439B
Requests: 2 HTTP requests in this frame

Frame: https://pubpress.net/houseads/2018/03/15/wordads/3-1B-160x600.png
Frame ID: 13660295E631B0E1DE78054A608F347D
Requests: 2 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+wp-(?:content|includes)/i
  • html /<link[^>]+s\d+\.wp\.com/i
  • script /\/wp-includes\//i
  • meta generator /WordPress( [\d.]+)?/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+wp-(?:content|includes)/i
  • html /<link[^>]+s\d+\.wp\.com/i
  • script /\/wp-includes\//i
  • meta generator /WordPress( [\d.]+)?/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • env /pbjs/i

Overall confidence: 100%
Detected patterns
  • html /<(?:iframe|img)[^>]+adnxs\.(?:net|com)/i

Overall confidence: 100%
Detected patterns
  • env /^gaGlobal$/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Overall confidence: 100%
Detected patterns
  • env /^Gravatar$/i

Overall confidence: 100%
Detected patterns
  • env /^twemoji$/i


Overall confidence: 100%
Detected patterns
  • env /^jQuery$/i

Page Statistics

86
Requests

100 %
HTTPS

32 %
IPv6

19
Domains

31
Subdomains

25
IPs

5
Countries

491 kB
Transfer

1263 kB
Size

5
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 36
  • https://api.viglink.com/api/vglnk.js HTTP 301
  • https://cdn.viglink.com/api/vglnk.js
Request Chain 45
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672981/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=4672981;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672981/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672981;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Request Chain 46
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772762/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=4772762;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772762/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772762;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Request Chain 47
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672979/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=4672979;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672979/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672979;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Request Chain 48
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672980/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=4672980;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672980/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672980;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Request Chain 49
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4743313/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=4743313;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4743313/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4743313;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Request Chain 50
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772763/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=4772763;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772763/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772763;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Request Chain 54
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772763/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772763;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772763/0/0/ADTECH;apid=1A4f9e3f86-289d-11e9-be13-d89d6719f098;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772763;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Request Chain 55
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772762/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772762;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772762/0/0/ADTECH;apid=1A4fa205a8-289d-11e9-bd47-a0d3c10186b8;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772762;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Request Chain 56
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672980/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672980;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672980/0/0/ADTECH;apid=1A4fa1f036-289d-11e9-b207-a0d3c10698c4;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672980;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Request Chain 57
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672979/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672979;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672979/0/0/ADTECH;apid=1A4fa1f680-289d-11e9-90f3-a0d3c101f21c;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672979;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Request Chain 58
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4743313/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4743313;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4743313/0/0/ADTECH;apid=1A4fa222ae-289d-11e9-8ca3-a0d3c101969c;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4743313;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Request Chain 59
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672981/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672981;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672981/0/0/ADTECH;apid=1A4fa20422-289d-11e9-bf36-d89d67320750;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672981;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Request Chain 74
  • https://bh.contextweb.com/bh/rtset?pid=558299&ev=1&gdpr=1&gdpr_consent=BObdEreObdEreAAABBENB64AAAAiyAAA&rurl=https%3A%2F%2Fpixel.advertising.com%2Fups%2F55972%2Fsync%3Fuid%3D%25%25VGUID%25%25%26_origin%3D0 HTTP 302
  • https://openx2-match.dotomi.com/pulsepoint/match

86 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
49 KB
14 KB
Document
General
Full URL
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.78.12 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
6ed7f2c1aafb9810028d651d1934b4d0f0efa4b77c7f23517d3d7467307de199
Security Headers
Name Value
Strict-Transport-Security max-age=15552000

Request headers

:method
GET
:authority
hackerpython.wordpress.com
:scheme
https
:path
/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
server
nginx
date
Mon, 04 Feb 2019 16:52:51 GMT
content-type
text/html; charset=UTF-8
vary
Accept-Encoding Cookie
x-hacker
If you're reading this, you should visit automattic.com/jobs and apply to join the fun, mention this header.
x-pingback
https://hackerpython.wordpress.com/xmlrpc.php
link
<https://wp.me/p6Mae7-1d>; rel=shortlink
content-encoding
gzip
x-ac
1.5am _dfw
strict-transport-security
max-age=15552000
/
s0.wp.com/_static/
94 KB
34 KB
Stylesheet
General
Full URL
https://s0.wp.com/_static/??-eJx9kN1uwzAIhV9oLtrURbmZ9iz+QQmtsS1jq8rblyRbp61TbhCg83EAuBXjc2qYGnA3JfaJksCt+MxGmCIuf6qTF3mB/7FIVxS4YCvWX81WPcldzNOPT67BBoEpZmfjQ0vJxx50lDYgkGzUNtFVWxeQtkQ8MaWjZXyuqH0utq0KxkAWI7LKjjAuwze1prNecnjz/hznSkURo5Gps2mzGh1ySq2r7F/aDv3V2VGClBspLY/kaeZuBaU7KJjEV9v8/PUi1X7yx+v7eRjH8Ty8Xe5hu7oO?cssminify=yes
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
90e1e16cbdcb123ffd88ceca6d6cf266f1b189d97a57cd7c2b809ab6c37e63a9

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-nc
HIT fra 32
date
Mon, 04 Feb 2019 16:52:51 GMT
content-encoding
gzip
last-modified
Mon, 07 Jan 2019 19:14:29 GMT
server
nginx
etag
W/"5c33a515-177a8"
vary
Accept-Encoding
content-type
text/css;charset=utf-8
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Wed, 22 Jan 2020 10:49:35 GMT
css
fonts.googleapis.com/
7 KB
735 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto+Slab%3A300%2C400%2C700&subset=latin%2Clatin-ext
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:808::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
ba2550a583496b3b6539410d234c8f36c51cad33b494800474ec64b0d6a9095b
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Mon, 04 Feb 2019 16:52:51 GMT
server
ESF
access-control-allow-origin
*
date
Mon, 04 Feb 2019 16:52:51 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
x-xss-protection
1; mode=block
expires
Mon, 04 Feb 2019 16:52:51 GMT
/
s2.wp.com/_static/
31 KB
17 KB
Stylesheet
General
Full URL
https://s2.wp.com/_static/??-eJyNjs0OAiEMhF9IbFbX9WR8FqyVRctPoIT49qJeMMaNt5lMv+lAjQqDF/ICrqjIxVifwZCnZFvwQ64x5xV0rMzkKEMsJ4jkMyYtOIP1CFnuTKpGDO6L6j5WezYkGai0NNwsKdYVhFxkLa35VfNPQQ5oNav34t4swYaC4oBabPAfRl1Y27SEJjpxME0aaFedfUJHdxh2m/20HYdxuj4Aq+KJTA==?cssminify=yes
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
c37e07b1c6cd31b29f2650cd947fa97e17a1fa431998b303adac9ea14d81194a

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-nc
HIT fra 32
date
Mon, 04 Feb 2019 16:52:51 GMT
content-encoding
gzip
last-modified
Tue, 29 May 2018 22:49:12 GMT
server
nginx
etag
W/"5b0dd8e8-7de8"
vary
Accept-Encoding
content-type
text/css;charset=utf-8
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Fri, 22 Nov 2019 08:30:24 GMT
/
s0.wp.com/_static/
54 KB
24 KB
Stylesheet
General
Full URL
https://s0.wp.com/_static/??-eJx9i0EKQjEMBS9kDdVfXIlnyS+1jaRJafLx+uJCRBRXbx7MwH2ErOJFHPoWBm+VxACzk8qK8037bLaD3/pQ83BlpAnWcJLU1/6rTDMhB9aqn+cr8lZ6MWgLVNYV+Slc+jmmQzrFtMTj7QHFQEmu?cssminify=yes
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
db4d5fd4cb9d0adf12e70f3cd0155fd917561844aaed0ff596c18712c989757d

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-nc
HIT fra 32
date
Mon, 04 Feb 2019 16:52:51 GMT
content-encoding
gzip
last-modified
Mon, 07 May 2018 17:50:26 GMT
server
nginx
etag
W/"5af091e2-d8d3"
vary
Accept-Encoding
content-type
text/css;charset=utf-8
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Fri, 22 Nov 2019 08:30:13 GMT
/
s1.wp.com/_static/
155 KB
49 KB
Script
General
Full URL
https://s1.wp.com/_static/??-eJyFztEKwjAMBdAfsquTiXsRv6XWOFKXtDbphn69HeiDMBQC9+EeuLFzMsh+LBcQG+rdC+THO5ogG/sLGMIhO4WGkD/YR1ZgXWyKogQiboCVluIZRzBFIFfAWmeuccV9v4Q8Icx/WQBNzt9MBsHnsn6iY9v1h13f7rtteAE4/VvS
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
ed51b6e097b80ac9a3f0164d935ac40581c1d54d6f94abb0c319471b3a05bd2b

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-nc
HIT fra 32
date
Mon, 04 Feb 2019 16:52:51 GMT
content-encoding
gzip
last-modified
Thu, 16 Feb 2017 21:47:59 GMT
server
nginx
etag
W/"58a61e0f-26d19"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Sat, 04 Jan 2020 20:52:33 GMT
style.css
s0.wp.com/wp-content/mu-plugins/highlander-comments/
19 KB
3 KB
Stylesheet
General
Full URL
https://s0.wp.com/wp-content/mu-plugins/highlander-comments/style.css?m=1530132353h&cssminify=yes
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
89d01b152beefa0885d7821cea6cc319054d5e272549b004479a6ac81ecafee3

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-nc
HIT fra 32
date
Mon, 04 Feb 2019 16:52:51 GMT
content-encoding
gzip
server
nginx
etag
W/"5b33f7b7-5e1f"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Fri, 22 Nov 2019 08:30:13 GMT
head.js
s.pubmine.com/
380 KB
137 KB
Script
General
Full URL
https://s.pubmine.com/head.js
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.212.214.82 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-212-214-82.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
1d4259e7b795d14a31f60da1ea12807374b73f2301148002cb9cfd5022bb9f97

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Mon, 04 Feb 2019 16:52:51 GMT
Content-Encoding
gzip
Last-Modified
Tue, 25 Dec 2007 09:50:38 GMT
Server
nginx
Transfer-Encoding
chunked
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Cache-Control
max-age=3600
Connection
keep-alive
Content-Type
application/javascript
wp-emoji-release.min.js
s2.wp.com/wp-includes/js/
12 KB
4 KB
Script
General
Full URL
https://s2.wp.com/wp-includes/js/wp-emoji-release.min.js?m=1532082729h&ver=5.1-beta2-44721
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
d2458b9fd9089fdcb9de317093e004ef3a65597dc68b9adfdeb15a7c9968d0d5

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-nc
HIT fra 32
date
Mon, 04 Feb 2019 16:52:51 GMT
content-encoding
gzip
server
nginx
etag
W/"5b51ba56-2efa"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Tue, 04 Feb 2020 15:58:52 GMT
global-print.css
s2.wp.com/wp-content/mu-plugins/global-print/
5 KB
2 KB
Stylesheet
General
Full URL
https://s2.wp.com/wp-content/mu-plugins/global-print/global-print.css?m=1465851035h&cssminify=yes
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
7d08e9159f7d2bf0835085cbd1ffb0252b0e11de45ed07db4447f8e63f181dbf

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-nc
HIT fra 32
date
Mon, 04 Feb 2019 16:52:51 GMT
content-encoding
gzip
server
nginx
etag
W/"575f1ca1-1f6c"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Fri, 22 Nov 2019 08:30:13 GMT
ad516503a11cd5ca435acc9bb6523536
1.gravatar.com/avatar/
2 KB
2 KB
Image
General
Full URL
https://1.gravatar.com/avatar/ad516503a11cd5ca435acc9bb6523536?s=25&d=identicon&forcedefault=y&r=G
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
cb3e87ff58a5e66937ffb6013c8265ed549658a4ff59c1f8d8ae193f488390a5

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-nc
HIT vie 3
date
Mon, 04 Feb 2019 16:52:51 GMT
last-modified
Sat, 01 Mar 2008 02:44:06 GMT
server
nginx
access-control-allow-origin
*
source-age
8953283
content-type
image/png
status
200
cache-control
max-age=300
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/ad516503a11cd5ca435acc9bb6523536?s=25&d=identicon&forcedefault=y&r=G>; rel="canonical"
content-length
1792
expires
Mon, 04 Feb 2019 16:57:51 GMT
gprofiles.js
0.gravatar.com/js/
20 KB
7 KB
Script
General
Full URL
https://0.gravatar.com/js/gprofiles.js?ver=201906y
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
9c42615b9f87888a452f177c5ea19899fb8a835b8f6d0b458824e6c332a0adce

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 04 Feb 2019 16:52:51 GMT
content-encoding
gzip
last-modified
Thu, 23 Aug 2018 15:01:14 GMT
server
nginx
etag
W/"5b7ecc3a-50bc"
content-type
application/x-javascript
status
200
cache-control
max-age=604800
expires
Mon, 11 Feb 2019 16:52:51 GMT
wpgroho.js
s1.wp.com/wp-content/mu-plugins/gravatar-hovercards/
582 B
365 B
Script
General
Full URL
https://s1.wp.com/wp-content/mu-plugins/gravatar-hovercards/wpgroho.js?m=1380573781h
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
21c557180f1bd074974eb41ae4228b6aa9c41234ab1729d780bc8f05761110bb

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-nc
HIT fra 32
date
Mon, 04 Feb 2019 16:52:51 GMT
content-encoding
gzip
server
nginx
etag
W/"57391252-2f0"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Fri, 22 Nov 2019 08:30:13 GMT
/
s2.wp.com/_static/
42 KB
11 KB
Script
General
Full URL
https://s2.wp.com/_static/??/wp-content/js/jquery/jquery.autoresize.js,/wp-content/mu-plugins/highlander-comments/script.js?m=1521806916j
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
e006b2e9c836d246df8e779c911d71302fc8c17dcb0320b386c3f2ee3e6e04ae

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-nc
HIT fra 32
date
Mon, 04 Feb 2019 16:52:51 GMT
content-encoding
gzip
last-modified
Fri, 23 Mar 2018 12:08:53 GMT
server
nginx
etag
W/"5ab4ee55-a6ba"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Fri, 22 Nov 2019 08:30:13 GMT
/
s2.wp.com/_static/
106 KB
29 KB
Script
General
Full URL
https://s2.wp.com/_static/??-eJyVkN1ugzAMhV9owVvRVPVi2qNMIRgw5G+xA9vbL2gaoq2E1qtYx+eznQNLVCZ4QS8wMrQ4k8H4VY38BLuWyyra3JNnsDQhw2fGjIP2rcV0YDbBuSKpX2hc6QZ4oYiPQFfCLSgDumKLuYGInk3SYoaV8nqmXgsF/2+EJ4pli59UF0xm1dGWBHljc3t9T8JovytHdwt2n1mo7VEYMJdumAiV1QsIumi14I1+MEe3ZY9qdAKnWTCVSoUZU6L1qE17cIIkbaa7SPeQWQNcoa06ck/EDkXV1TN8lMSgC8kd+GNgUZ3VlIAHncj3f2+B3t3by2t9upxP9eU8/gA1R/6m
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
285177028f2a644fd361bfb1cc4fd6a908e3bd24b01ec2aaa14d4d8e3197cbe8

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-nc
HIT fra 32
date
Mon, 04 Feb 2019 16:52:51 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 17:40:33 GMT
server
nginx
etag
W/"5b5f4d91-1a95c"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Wed, 18 Dec 2019 16:59:19 GMT
w.js
stats.wp.com/
13 KB
4 KB
Script
General
Full URL
https://stats.wp.com/w.js?59
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.76.3 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
df2f1b708c0dcd1b45b7924c9ee58a8374301fab275d46ea6b846ebddc0f67df

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 04 Feb 2019 16:52:51 GMT
content-encoding
gzip
server
nginx
etag
W/"5c363707-4dba"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=31536000
expires
Thu, 09 Jan 2020 18:09:00 GMT
ga.js
ssl.google-analytics.com/
45 KB
17 KB
Script
General
Full URL
https://ssl.google-analytics.com/ga.js
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81d::2008 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
1259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 16 Jan 2019 20:01:45 GMT
server
Golfe2
age
768
date
Mon, 04 Feb 2019 16:40:03 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
17168
expires
Mon, 04 Feb 2019 18:40:03 GMT
/
public-api.wordpress.com/connect/ Frame 1F6B
2 KB
977 B
Document
General
Full URL
https://public-api.wordpress.com/connect/?googleplus-sign-in=https%3A%2F%2Fhackerpython.wordpress.com&color_scheme=light
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.78.22 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
41cef2194cd24f4c7d2b2f7aa71463a767b9de47842515f61703aad44a93420a
Security Headers
Name Value
Strict-Transport-Security max-age=15552000

Request headers

:method
GET
:authority
public-api.wordpress.com
:scheme
https
:path
/connect/?googleplus-sign-in=https%3A%2F%2Fhackerpython.wordpress.com&color_scheme=light
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/

Response headers

status
200
server
nginx
date
Mon, 04 Feb 2019 16:52:51 GMT
content-type
text/html; charset=utf-8
vary
Accept-Encoding
content-encoding
gzip
x-ac
2.5am _dfw
strict-transport-security
max-age=15552000
BngRUXZYTXPIvIBgJJSb6u9mxLCGwR2oefDo.woff2
fonts.gstatic.com/s/robotoslab/v7/
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/robotoslab/v7/BngRUXZYTXPIvIBgJJSb6u9mxLCGwR2oefDo.woff2
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:818::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
be324f832c99a743be6e9bb6e888e37f1d6ad4e3fb0b9390477a40c2d5d6ce99
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Roboto+Slab%3A300%2C400%2C700&subset=latin%2Clatin-ext
Origin
https://hackerpython.wordpress.com

Response headers

date
Fri, 25 Jan 2019 06:50:56 GMT
x-content-type-options
nosniff
last-modified
Wed, 11 Oct 2017 18:32:10 GMT
server
sffe
age
900115
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
11092
x-xss-protection
1; mode=block
expires
Sat, 25 Jan 2020 06:50:56 GMT
BngMUXZYTXPIvIBgJJSb6ufN5qWr4xCC.woff2
fonts.gstatic.com/s/robotoslab/v7/
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/robotoslab/v7/BngMUXZYTXPIvIBgJJSb6ufN5qWr4xCC.woff2
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:818::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
11f18af740f9727666190b83a8999d30ade3421e0148bf1b1586eaaad25dd781
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Roboto+Slab%3A300%2C400%2C700&subset=latin%2Clatin-ext
Origin
https://hackerpython.wordpress.com

Response headers

date
Thu, 03 Jan 2019 09:50:35 GMT
x-content-type-options
nosniff
last-modified
Wed, 11 Oct 2017 18:31:41 GMT
server
sffe
age
2790136
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
10988
x-xss-protection
1; mode=block
expires
Fri, 03 Jan 2020 09:50:35 GMT
BngRUXZYTXPIvIBgJJSb6u92w7CGwR2oefDo.woff2
fonts.gstatic.com/s/robotoslab/v7/
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/robotoslab/v7/BngRUXZYTXPIvIBgJJSb6u92w7CGwR2oefDo.woff2
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:818::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8c055f4fc89b73bc480ac07d607782cb3482fc98cbec6f89135ff76ce5512280
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Roboto+Slab%3A300%2C400%2C700&subset=latin%2Clatin-ext
Origin
https://hackerpython.wordpress.com

Response headers

date
Thu, 31 Jan 2019 14:15:59 GMT
x-content-type-options
nosniff
last-modified
Wed, 11 Oct 2017 18:32:29 GMT
server
sffe
age
355012
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
11096
x-xss-protection
1; mode=block
expires
Fri, 31 Jan 2020 14:15:59 GMT
truncated
/
18 KB
0
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
895964971ebdb56ee76d08850bcb4c5a88ec4c65e6a235882304e8ff6767cd7c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Origin
https://hackerpython.wordpress.com

Response headers

Content-Type
application/x-font-woff;charset=utf-8
button-back.gif
s0.wp.com/wp-content/mu-plugins/highlander-comments/images/
1 KB
1 KB
Image
General
Full URL
https://s0.wp.com/wp-content/mu-plugins/highlander-comments/images/button-back.gif
Requested by
Host: s1.wp.com
URL: https://s1.wp.com/_static/??-eJyFztEKwjAMBdAfsquTiXsRv6XWOFKXtDbphn69HeiDMBQC9+EeuLFzMsh+LBcQG+rdC+THO5ogG/sLGMIhO4WGkD/YR1ZgXWyKogQiboCVluIZRzBFIFfAWmeuccV9v4Q8Icx/WQBNzt9MBsHnsn6iY9v1h13f7rtteAE4/VvS
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
0dab369eac5fd3a06420395d02d292bc3e3ab0bf62add857c72804fd9f4edd35

Request headers

Referer
https://s0.wp.com/wp-content/mu-plugins/highlander-comments/style.css?m=1530132353h&cssminify=yes
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-nc
HIT fra 32
date
Mon, 04 Feb 2019 16:52:51 GMT
x-ac
4.fra _dfw
last-modified
Mon, 16 May 2016 00:20:34 GMT
server
nginx
etag
"57391252-4d0"
content-type
image/gif
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
1232
expires
Fri, 22 Nov 2019 08:30:13 GMT
__utm.gif
ssl.google-analytics.com/r/
35 B
101 B
Image
General
Full URL
https://ssl.google-analytics.com/r/__utm.gif?utmwv=5.7.2&utms=1&utmn=1706455672&utmhn=hackerpython.wordpress.com&utmcs=UTF-8&utmsr=1600x1200&utmvp=1585x1200&utmsc=24-bit&utmul=en-us&utmje=0&utmfl=-&utmdt=How%20to%20pass%20on%20NTLM%20authentication%20tokens%20using%20Python%20%7C%20Hacker%20Python&utmhid=1402399132&utmr=-&utmp=%2F2015%2F10%2F05%2Fhow-to-pass-on-ntlm-authentication-tokens-using-python%2F&utmht=1549299171647&utmac=UA-52447-2&utmcc=__utma%3D11735858.2089165530.1549299172.1549299172.1549299172.1%3B%2B__utmz%3D11735858.1549299172.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)%3B&utmjid=176351057&utmredir=1&utmu=uBAAAAAAAAAAAAAAAAAAAAAE~
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81d::2008 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:51 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
*
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="44,43,39"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
wpcom-gray-white.png
s2.wp.com/i/logo/
8 KB
8 KB
Image
General
Full URL
https://s2.wp.com/i/logo/wpcom-gray-white.png
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
c0e93b5ebf107af77d9e7d101d186b3b93e9d5ad4fbb6a74e2dea60173cc04f8

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-nc
HIT fra 32
date
Mon, 04 Feb 2019 16:52:51 GMT
x-ac
4.fra _dfw
last-modified
Sat, 31 Dec 2016 05:45:35 GMT
server
nginx
etag
"586745ff-200b"
content-type
image/png
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
8203
expires
Fri, 22 Nov 2019 08:30:13 GMT
master.html
widgets.wp.com/likes/ Frame A46F
0
0
Document
General
Full URL
https://widgets.wp.com/likes/master.html?ver=20180319
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash

Request headers

:method
GET
:authority
widgets.wp.com
:scheme
https
:path
/likes/master.html?ver=20180319
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/

Response headers

status
200
server
nginx
date
Mon, 04 Feb 2019 16:52:51 GMT
content-type
text/html
last-modified
Thu, 03 May 2018 03:31:23 GMT
vary
Accept-Encoding
etag
W/"5aea828b-84e"
content-encoding
gzip
x-ac
4.fra _dfw
x-nc
HIT fra 32
hovercard.min.css
0.gravatar.com/dist/css/
7 KB
2 KB
Stylesheet
General
Full URL
https://0.gravatar.com/dist/css/hovercard.min.css?ver=201906y
Requested by
Host: s1.wp.com
URL: https://s1.wp.com/_static/??-eJyFztEKwjAMBdAfsquTiXsRv6XWOFKXtDbphn69HeiDMBQC9+EeuLFzMsh+LBcQG+rdC+THO5ogG/sLGMIhO4WGkD/YR1ZgXWyKogQiboCVluIZRzBFIFfAWmeuccV9v4Q8Icx/WQBNzt9MBsHnsn6iY9v1h13f7rtteAE4/VvS
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
7b5e32cb325e9aaef357a421cd16ddf6d6ddb70fec74b6c35a73eccc6817664c

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 04 Feb 2019 16:52:51 GMT
content-encoding
gzip
last-modified
Thu, 22 Mar 2018 09:46:04 GMT
server
nginx
etag
W/"5ab37b5c-1a2e"
content-type
text/css
status
200
cache-control
max-age=604800
expires
Mon, 11 Feb 2019 16:52:51 GMT
services.min.css
0.gravatar.com/dist/css/
3 KB
564 B
Stylesheet
General
Full URL
https://0.gravatar.com/dist/css/services.min.css?ver=201906y
Requested by
Host: s1.wp.com
URL: https://s1.wp.com/_static/??-eJyFztEKwjAMBdAfsquTiXsRv6XWOFKXtDbphn69HeiDMBQC9+EeuLFzMsh+LBcQG+rdC+THO5ogG/sLGMIhO4WGkD/YR1ZgXWyKogQiboCVluIZRzBFIFfAWmeuccV9v4Q8Icx/WQBNzt9MBsHnsn6iY9v1h13f7rtteAE4/VvS
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
e9fc9b1878db1b13b973252b048d19a17abb34a8da464a552c6d401728ed1e86

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 04 Feb 2019 16:52:51 GMT
content-encoding
gzip
last-modified
Thu, 22 Mar 2018 09:46:04 GMT
server
nginx
etag
W/"5ab37b5c-a54"
content-type
text/css
status
200
cache-control
max-age=604800
expires
Mon, 11 Feb 2019 16:52:51 GMT
/
graph.facebook.com/
804 B
801 B
Script
General
Full URL
https://graph.facebook.com/?callback=WPCOMSharing.update_facebook_count&ids=https%3A%2F%2Fhackerpython.wordpress.com%2F2015%2F10%2F05%2Fhow-to-pass-on-ntlm-authentication-tokens-using-python%2F&_=1549299171495
Requested by
Host: s1.wp.com
URL: https://s1.wp.com/_static/??-eJyFztEKwjAMBdAfsquTiXsRv6XWOFKXtDbphn69HeiDMBQC9+EeuLFzMsh+LBcQG+rdC+THO5ogG/sLGMIhO4WGkD/YR1ZgXWyKogQiboCVluIZRzBFIFfAWmeuccV9v4Q8Icx/WQBNzt9MBsHnsn6iY9v1h13f7rtteAE4/VvS
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a03:2880:f029:11:face:b00c:0:2 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
95afc0460f7eef551c5b02305fb930fecd5f149f1a3a81ce54f73f7fa42d1007
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=15552000; preload
content-encoding
br
x-app-usage
{"call_count":0,"total_cputime":0,"total_time":0}
status
200
date
Mon, 04 Feb 2019 16:52:51 GMT
x-fb-rev
4735306
content-length
389
pragma
no-cache
x-fb-debug
sbSzGu9VfXGDs+VGz5F3/J0MZ1xbikojS2Dbuug8NuczRvw1+Saf7fL48z/WwaP4S8HfrSAEUo7Nb368wsnOaw==
x-fb-trace-id
AVQNpaiSryN
etag
"eed33fc3625bfb4ec1037be8532da309492edcb6"
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, no-cache, no-store, must-revalidate
facebook-api-version
v2.8
expires
Sat, 01 Jan 2000 00:00:00 GMT
g.gif
pixel.wp.com/
50 B
92 B
Image
General
Full URL
https://pixel.wp.com/g.gif?v=wpcom-no-pv&x_sharing-count-request=facebook&r=0.4940715581510351
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.76.3 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
f3a8992acb9ab911e0fa4ae12f4b85ef8e61008619f13ee51c7a121ff87f63b1

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
date
Mon, 04 Feb 2019 16:52:51 GMT
cache-control
no-cache
server
nginx
content-length
50
content-type
image/gif
g.gif
pixel.wp.com/
50 B
74 B
Image
General
Full URL
https://pixel.wp.com/g.gif?x_stats-initial-visibility=visible&v=wpcom-no-pv&rand=0.37257372330210314
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.76.3 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
f3a8992acb9ab911e0fa4ae12f4b85ef8e61008619f13ee51c7a121ff87f63b1

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
date
Mon, 04 Feb 2019 16:52:51 GMT
cache-control
no-cache
server
nginx
content-length
50
content-type
image/gif
g.gif
pixel.wp.com/
50 B
74 B
Image
General
Full URL
https://pixel.wp.com/g.gif?blog=100137075&v=wpcom&tz=0&user_id=0&post=75&subd=hackerpython&host=hackerpython.wordpress.com&ref=&fcp=450&rand=0.32327740818774164
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.76.3 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
f3a8992acb9ab911e0fa4ae12f4b85ef8e61008619f13ee51c7a121ff87f63b1

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
date
Mon, 04 Feb 2019 16:52:51 GMT
cache-control
no-cache
server
nginx
content-length
50
content-type
image/gif
g.gif
pixel.wp.com/
50 B
74 B
Image
General
Full URL
https://pixel.wp.com/g.gif?crypt=UE5XaGUuOTlwaD85flAmcm1mcmZsaDhkV11YdWFnNncxc1tjZG9XVXhRUmpicH5qamxuMVpNdUlTflExbFBIbGFdZVNBJl1FTEQxNHY9VT1aJXFofk9jUDFmeVAzfnhFYmlTLWF6TDZUU3JVVS54eU0mbkQ0VV1xK2Vqc0dZaGJtREddTy4%2FZVFXV2tqXXxMbFUwVj9jeEJMVk9kWnN1ZFRPWT9iOC8wSm4%2FbE5OK1dQMCZdbUtEek9qUEROK3pfNHpfRiU4N0trYlFjaEhhN0Z4LTYtJVR%2BcDYtNFhma09nLWdJbGhja1h6cVV6OVZ2UytRWVRjUk0rNFFHRl9VSThTRi5waGNbaDdfNXxJLD8zQz9rMW9SWGJ0ND0%3D&v=wpcom-no-pv&rand=0.7651005752833584
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.76.3 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
f3a8992acb9ab911e0fa4ae12f4b85ef8e61008619f13ee51c7a121ff87f63b1

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
date
Mon, 04 Feb 2019 16:52:51 GMT
cache-control
no-cache
server
nginx
content-length
50
content-type
image/gif
googleplus-sign-in.js
s0.wp.com/wp-content/js/ Frame 1F6B
11 KB
4 KB
Script
General
Full URL
https://s0.wp.com/wp-content/js/googleplus-sign-in.js
Requested by
Host: public-api.wordpress.com
URL: https://public-api.wordpress.com/connect/?googleplus-sign-in=https%3A%2F%2Fhackerpython.wordpress.com&color_scheme=light
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
c35ec23086f5e55c4b8940d0fb3fd5d4838d000ae0dce7a2f0bfd9849cf796c5

Request headers

Referer
https://public-api.wordpress.com/connect/?googleplus-sign-in=https%3A%2F%2Fhackerpython.wordpress.com&color_scheme=light
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-nc
HIT fra 32
date
Mon, 04 Feb 2019 16:52:51 GMT
content-encoding
gzip
server
nginx
etag
W/"5a7e35f6-45de"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Fri, 22 Nov 2019 08:30:13 GMT
push_sync
s.pubmine.com/
43 B
366 B
Image
General
Full URL
https://s.pubmine.com/push_sync?bidder_id=1&rid=126782346907
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.212.214.82 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-212-214-82.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Mon, 04 Feb 2019 16:52:51 GMT
Content-Encoding
gzip
Server
nginx
Transfer-Encoding
chunked
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
pixel
s.pubmine.com/
43 B
366 B
Image
General
Full URL
https://s.pubmine.com/pixel?id=15&type=img
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.212.214.82 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-212-214-82.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Mon, 04 Feb 2019 16:52:51 GMT
Content-Encoding
gzip
Server
nginx
Transfer-Encoding
chunked
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
hbconf
s.pubmine.com/
6 KB
2 KB
Script
General
Full URL
https://s.pubmine.com/hbconf?pp=%7B%22pt%22%3A1%2C%22ht%22%3A0%2C%22tn%22%3A%22penscratch%22%2C%22amp%22%3Afalse%2C%22siteid%22%3A8982%2C%22blogid%22%3A100137075%2C%22consent%22%3A0%7D&vmt=%5B%22video%2Fogg%22%2C%22video%2Fmp4%22%2C%22video%2Fwebm%22%5D&vp=%7B%22w%22%3A1600%2C%22h%22%3A1200%7D&ab=0&rid=126782346907&v=1.49.0&callbackPubmine=callback__jrqkq3w8_1
Requested by
Host: s.pubmine.com
URL: https://s.pubmine.com/head.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.212.214.82 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-212-214-82.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
6008d29cdfaabbacdfb198873fc39ab26503021a556b4c5dbd750b523366f0d2

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Mon, 04 Feb 2019 16:52:51 GMT
Content-Encoding
gzip
Server
nginx
Transfer-Encoding
chunked
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
text/javascript; charset=utf-8
vglnk.js
cdn.viglink.com/api/
Redirect Chain
  • https://api.viglink.com/api/vglnk.js
  • https://cdn.viglink.com/api/vglnk.js
77 KB
27 KB
Script
General
Full URL
https://cdn.viglink.com/api/vglnk.js
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6810:a00d , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
92ddb95968552aa3cb8cb1278157775e40b8346a70abccdbe59bc51200dc8f15

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 04 Feb 2019 16:52:52 GMT
content-encoding
gzip
cf-cache-status
HIT
x-amz-request-id
E8DCFEBDEDCFF3E7
status
200
content-length
27272
x-amz-id-2
3fWZsWtgb9BZc9PsHQwt2+STDLb4bm/jV9ZfC963iqY3tlN5/6shCdPomkOg17fB6sqWeMxHBeg=
last-modified
Thu, 31 Jan 2019 16:02:49 GMT
server
cloudflare
etag
"063f8f812475485a951d2ac541252ac6"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=1800
accept-ranges
bytes
cf-ray
4a3ea6724c0264d5-FRA
expires
Mon, 04 Feb 2019 17:22:52 GMT

Redirect headers

Location
https://cdn.viglink.com/api/vglnk.js
Connection
keep-alive
Content-Length
0
prebid
ib.adnxs.com/ut/v3/
1 KB
1 KB
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: s.pubmine.com
URL: https://s.pubmine.com/head.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.215 , European Union, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
Software
nginx/1.13.4 /
Resource Hash
9214e5efe2aed23e3c05edacea99c4375c9c56fc9aba673f879bcab0b215b66d
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Origin
https://hackerpython.wordpress.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain

Response headers

Date
Mon, 04 Feb 2019 16:52:54 GMT
Content-Encoding
gzip
Transfer-Encoding
chunked
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Connection
keep-alive
X-Proxy-Origin
185.220.70.202; 185.220.70.202; 315.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.17:80
X-XSS-Protection
0
Pragma
no-cache
AN-X-Request-Uuid
d3457b8d-f986-43e2-a940-71fa51f44e70
Server
nginx/1.13.4
Vary
Accept-Encoding
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
https://hackerpython.wordpress.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Expires
Sat, 15 Nov 2008 16:00:00 GMT
bid-request
a.teads.tv/hb/
16 B
354 B
XHR
General
Full URL
https://a.teads.tv/hb/bid-request
Requested by
Host: s.pubmine.com
URL: https://s.pubmine.com/head.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.7 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-7.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6a7b0c8bf87b2bd5ca31557f25cf2a6c80f93af72bf68a6085e9b55a87fe908c

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Origin
https://hackerpython.wordpress.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
content-encoding
gzip
status
200
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
https://hackerpython.wordpress.com
cache-control
max-age=0, no-cache, no-store
access-control-allow-credentials
true
content-length
42
expires
Mon, 04 Feb 2019 16:52:52 GMT
bidRequest
hb.nexage.com/
62 B
283 B
XHR
General
Full URL
https://hb.nexage.com/bidRequest?dcn=2c9d2b4f01646444af68468bac080021&pos=automattic_mobile_hb_300x250_1&cmd=bid&secure=1&gdpr=1&euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Requested by
Host: s.pubmine.com
URL: https://s.pubmine.com/head.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.241.163.74 San Jose, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-241-163-74.us-west-1.compute.amazonaws.com
Software
Jetty(9.4.7.v20170914) /
Resource Hash
aa2eaacce3a25af8f538034fc525c90aadd3a20ff5e88d0ea9112fa3fc942dc7

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Origin
https://hackerpython.wordpress.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain

Response headers

date
Mon, 04 Feb 2019 16:52:52 GMT
server
Jetty(9.4.7.v20170914)
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
application/json;charset=utf-8
access-control-allow-origin
https://hackerpython.wordpress.com
access-control-allow-credentials
true
content-length
62
bidRequest
hb.nexage.com/
62 B
283 B
XHR
General
Full URL
https://hb.nexage.com/bidRequest?dcn=2c9d2b4f01646444af68468bac080021&pos=automattic_mobile_hb_300x250_2&cmd=bid&secure=1&gdpr=1&euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Requested by
Host: s.pubmine.com
URL: https://s.pubmine.com/head.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.241.163.74 San Jose, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-241-163-74.us-west-1.compute.amazonaws.com
Software
Jetty(9.4.7.v20170914) /
Resource Hash
2e0789e4afdc2b2c00b3618e18554061bcedb2f007f6f2159d696ad85201551f

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Origin
https://hackerpython.wordpress.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain

Response headers

date
Mon, 04 Feb 2019 16:52:53 GMT
server
Jetty(9.4.7.v20170914)
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
application/json;charset=utf-8
access-control-allow-origin
https://hackerpython.wordpress.com
access-control-allow-credentials
true
content-length
62
bidRequest
hb.nexage.com/
62 B
283 B
XHR
General
Full URL
https://hb.nexage.com/bidRequest?dcn=2c9d2b4f01646444af68468bac080021&pos=automattic_mobile_hb_300x250_3&cmd=bid&secure=1&gdpr=1&euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Requested by
Host: s.pubmine.com
URL: https://s.pubmine.com/head.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.241.163.74 San Jose, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-241-163-74.us-west-1.compute.amazonaws.com
Software
Jetty(9.4.7.v20170914) /
Resource Hash
17512d1c6d84fc47f3616eee9eda4b64a5dc80605b20c4498edd3903c6310605

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Origin
https://hackerpython.wordpress.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain

Response headers

date
Mon, 04 Feb 2019 16:52:52 GMT
server
Jetty(9.4.7.v20170914)
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
application/json;charset=utf-8
access-control-allow-origin
https://hackerpython.wordpress.com
access-control-allow-credentials
true
content-length
62
bidRequest
hb.nexage.com/
62 B
283 B
XHR
General
Full URL
https://hb.nexage.com/bidRequest?dcn=2c9d2b4f01646444af68468bac080021&pos=automattic_mobile_hb_160x600_1&cmd=bid&secure=1&gdpr=1&euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Requested by
Host: s.pubmine.com
URL: https://s.pubmine.com/head.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.241.163.74 San Jose, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-241-163-74.us-west-1.compute.amazonaws.com
Software
Jetty(9.4.7.v20170914) /
Resource Hash
32460de93a4bf365d7a89c1d0d383f1d04ff592ca84e016783a54dcd85644153

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Origin
https://hackerpython.wordpress.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain

Response headers

date
Mon, 04 Feb 2019 16:52:52 GMT
server
Jetty(9.4.7.v20170914)
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
application/json;charset=utf-8
access-control-allow-origin
https://hackerpython.wordpress.com
access-control-allow-credentials
true
content-length
62
bidRequest
hb.nexage.com/
62 B
283 B
XHR
General
Full URL
https://hb.nexage.com/bidRequest?dcn=2c9d2b4f01646444af68468bac080021&pos=automattic_mobile_hb_160x600_2&cmd=bid&secure=1&gdpr=1&euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Requested by
Host: s.pubmine.com
URL: https://s.pubmine.com/head.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.241.163.74 San Jose, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-241-163-74.us-west-1.compute.amazonaws.com
Software
Jetty(9.4.7.v20170914) /
Resource Hash
d42d98afb05aceb83411ed52eff7a0ef110d86d8b2e4b88cf47719d056eedbad

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Origin
https://hackerpython.wordpress.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain

Response headers

date
Mon, 04 Feb 2019 16:52:52 GMT
server
Jetty(9.4.7.v20170914)
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
application/json;charset=utf-8
access-control-allow-origin
https://hackerpython.wordpress.com
access-control-allow-credentials
true
content-length
62
bidRequest
hb.nexage.com/
62 B
283 B
XHR
General
Full URL
https://hb.nexage.com/bidRequest?dcn=2c9d2b4f01646444af68468bac080021&pos=automattic_mobile_hb_728x90_2&cmd=bid&secure=1&gdpr=1&euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Requested by
Host: s.pubmine.com
URL: https://s.pubmine.com/head.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.241.163.74 San Jose, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-241-163-74.us-west-1.compute.amazonaws.com
Software
Jetty(9.4.7.v20170914) /
Resource Hash
51273bb78750e41197e8ab748275363ad8411857771d31d2f2fe89f230b1fbd3

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Origin
https://hackerpython.wordpress.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain

Response headers

date
Mon, 04 Feb 2019 16:52:53 GMT
server
Jetty(9.4.7.v20170914)
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
application/json;charset=utf-8
access-control-allow-origin
https://hackerpython.wordpress.com
access-control-allow-credentials
true
content-length
62
ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672981;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672981/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672981/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=4672981;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672981/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672981;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64A...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672981/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672981;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
nginx
access-control-allow-origin
https://hackerpython.wordpress.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672981/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672981;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672981/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672981;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://hackerpython.wordpress.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772762;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772762/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772762/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=4772762;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772762/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772762;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64A...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772762/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772762;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
nginx
access-control-allow-origin
https://hackerpython.wordpress.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772762/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772762;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772762/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772762;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://hackerpython.wordpress.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672979;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672979/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672979/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=4672979;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672979/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672979;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64A...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672979/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672979;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
nginx
access-control-allow-origin
https://hackerpython.wordpress.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672979/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672979;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672979/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672979;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://hackerpython.wordpress.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672980;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672980/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672980/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=4672980;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672980/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672980;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64A...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672980/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672980;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
nginx
access-control-allow-origin
https://hackerpython.wordpress.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672980/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672980;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672980/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672980;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://hackerpython.wordpress.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4743313;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4743313/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4743313/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=4743313;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4743313/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4743313;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64A...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4743313/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4743313;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
nginx
access-control-allow-origin
https://hackerpython.wordpress.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4743313/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4743313;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4743313/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4743313;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://hackerpython.wordpress.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772763;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772763/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772763/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=4772763;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772763/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772763;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64A...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772763/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772763;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
nginx
access-control-allow-origin
https://hackerpython.wordpress.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772763/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772763;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772763/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772763;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://hackerpython.wordpress.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
v1
hb-api.omnitagjs.com/hb-api/prebid/
374 B
733 B
XHR
General
Full URL
https://hb-api.omnitagjs.com/hb-api/prebid/v1?CanonicalUrl=https%3A%2F%2Fhackerpython.wordpress.com%2F2015%2F10%2F05%2Fhow-to-pass-on-ntlm-authentication-tokens-using-python%2F
Requested by
Host: s.pubmine.com
URL: https://s.pubmine.com/head.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
54.37.115.97 Woodbridge, United States, ASN16276 (OVH, FR),
Reverse DNS
hb-api-fra01.omnitagjs.com
Software
/
Resource Hash
461c7d42c355ee6c61cba894ed9406290c48335d0963da8b07a67e7f5bea6d9e
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Origin
https://hackerpython.wordpress.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Mon, 04 Feb 2019 16:52:52 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Vary
Accept-Encoding
Access-Control-Allow-Methods
OPTIONS, POST
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
https://hackerpython.wordpress.com
Access-Control-Max-Age
3600
Cache-Control
no-cache, no-store, must-revalidate
Access-Control-Allow-Credentials
true
Access-Control-Allow-Headers
Accept-Encoding, Content-Type
Content-Length
206
Expires
0
hba
s.pubmine.com/
0
429 B
XHR
General
Full URL
https://s.pubmine.com/hba?rid=126782346907
Requested by
Host: s.pubmine.com
URL: https://s.pubmine.com/head.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.212.214.82 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-212-214-82.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Origin
https://hackerpython.wordpress.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Pragma
no-cache
Date
Mon, 04 Feb 2019 16:52:52 GMT
Server
nginx
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Access-Control-Allow-Origin
https://hackerpython.wordpress.com
Cache-Control
no-cache, no-store, must-revalidate
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=UTF-8
Content-Length
0
Expires
0
index.html
widgets.wp.com/likes/ Frame 4648
0
0
Document
General
Full URL
https://widgets.wp.com/likes/index.html?ver=20180319
Requested by
Host: s1.wp.com
URL: https://s1.wp.com/_static/??-eJyFztEKwjAMBdAfsquTiXsRv6XWOFKXtDbphn69HeiDMBQC9+EeuLFzMsh+LBcQG+rdC+THO5ogG/sLGMIhO4WGkD/YR1ZgXWyKogQiboCVluIZRzBFIFfAWmeuccV9v4Q8Icx/WQBNzt9MBsHnsn6iY9v1h13f7rtteAE4/VvS
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash

Request headers

:method
GET
:authority
widgets.wp.com
:scheme
https
:path
/likes/index.html?ver=20180319
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/

Response headers

status
200
server
nginx
date
Mon, 04 Feb 2019 16:52:52 GMT
content-type
text/html
content-length
126
last-modified
Sat, 23 Dec 2017 00:24:47 GMT
etag
"5a3da24f-7e"
x-ac
4.fra _dfw
x-nc
HIT fra 32
accept-ranges
bytes
ADTECH;apid=1A4f9e3f86-289d-11e9-be13-d89d6719f098;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772763;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772763/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772763/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772763;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64A...
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772763/0/0/ADTECH;apid=1A4f9e3f86-289d-11e9-be13-d89d6719f098;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772763;misc=15492991720...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772763/0/0/ADTECH;apid=1A4f9e3f86-289d-11e9-be13-d89d6719f098;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772763;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
nginx
access-control-allow-origin
https://hackerpython.wordpress.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772763/0/0/ADTECH;apid=1A4f9e3f86-289d-11e9-be13-d89d6719f098;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772763;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772763/0/0/ADTECH;apid=1A4f9e3f86-289d-11e9-be13-d89d6719f098;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772763;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://hackerpython.wordpress.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A4fa205a8-289d-11e9-bd47-a0d3c10186b8;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772762;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772762/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772762/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772762;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64A...
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772762/0/0/ADTECH;apid=1A4fa205a8-289d-11e9-bd47-a0d3c10186b8;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772762;misc=15492991720...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772762/0/0/ADTECH;apid=1A4fa205a8-289d-11e9-bd47-a0d3c10186b8;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772762;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
nginx
access-control-allow-origin
https://hackerpython.wordpress.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772762/0/0/ADTECH;apid=1A4fa205a8-289d-11e9-bd47-a0d3c10186b8;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772762;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772762/0/0/ADTECH;apid=1A4fa205a8-289d-11e9-bd47-a0d3c10186b8;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772762;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://hackerpython.wordpress.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A4fa1f036-289d-11e9-b207-a0d3c10698c4;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672980;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672980/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672980/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672980;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64A...
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672980/0/0/ADTECH;apid=1A4fa1f036-289d-11e9-b207-a0d3c10698c4;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672980;misc=15492991720...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672980/0/0/ADTECH;apid=1A4fa1f036-289d-11e9-b207-a0d3c10698c4;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672980;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
nginx
access-control-allow-origin
https://hackerpython.wordpress.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672980/0/0/ADTECH;apid=1A4fa1f036-289d-11e9-b207-a0d3c10698c4;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672980;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672980/0/0/ADTECH;apid=1A4fa1f036-289d-11e9-b207-a0d3c10698c4;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672980;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://hackerpython.wordpress.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A4fa1f680-289d-11e9-90f3-a0d3c101f21c;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672979;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672979/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672979/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672979;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64A...
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672979/0/0/ADTECH;apid=1A4fa1f680-289d-11e9-90f3-a0d3c101f21c;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672979;misc=15492991720...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672979/0/0/ADTECH;apid=1A4fa1f680-289d-11e9-90f3-a0d3c101f21c;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672979;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
nginx
access-control-allow-origin
https://hackerpython.wordpress.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672979/0/0/ADTECH;apid=1A4fa1f680-289d-11e9-90f3-a0d3c101f21c;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672979;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672979/0/0/ADTECH;apid=1A4fa1f680-289d-11e9-90f3-a0d3c101f21c;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672979;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://hackerpython.wordpress.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A4fa222ae-289d-11e9-8ca3-a0d3c101969c;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4743313;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4743313/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4743313/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4743313;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64A...
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4743313/0/0/ADTECH;apid=1A4fa222ae-289d-11e9-8ca3-a0d3c101969c;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4743313;misc=15492991720...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4743313/0/0/ADTECH;apid=1A4fa222ae-289d-11e9-8ca3-a0d3c101969c;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4743313;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
nginx
access-control-allow-origin
https://hackerpython.wordpress.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4743313/0/0/ADTECH;apid=1A4fa222ae-289d-11e9-8ca3-a0d3c101969c;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4743313;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4743313/0/0/ADTECH;apid=1A4fa222ae-289d-11e9-8ca3-a0d3c101969c;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4743313;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://hackerpython.wordpress.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A4fa20422-289d-11e9-bf36-d89d67320750;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672981;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672981/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672981/0/0/ADTECH;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672981;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64A...
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672981/0/0/ADTECH;apid=1A4fa20422-289d-11e9-bf36-d89d67320750;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672981;misc=15492991720...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672981/0/0/ADTECH;apid=1A4fa20422-289d-11e9-bf36-d89d67320750;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672981;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
nginx
access-control-allow-origin
https://hackerpython.wordpress.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672981/0/0/ADTECH;apid=1A4fa20422-289d-11e9-bf36-d89d67320750;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672981;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672981/0/0/ADTECH;apid=1A4fa20422-289d-11e9-bf36-d89d67320750;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672981;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://hackerpython.wordpress.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
pixel.gif
cdn.viglink.com/images/
43 B
261 B
Image
General
Full URL
https://cdn.viglink.com/images/pixel.gif?ch=1&rn=8.415915375796436
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6810:a00d , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
89fe0ee6020314794fc2cfeacf3d10c31050cfe56f8ebddf1ed0a33fbe941fa7

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 04 Feb 2019 16:52:52 GMT
cf-cache-status
HIT
last-modified
Tue, 10 Feb 2015 03:29:39 GMT
server
cloudflare
x-amz-request-id
FEBE606C5DECB366
etag
"221d8352905f2c38b3cb2bd191d630b0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=15, must-revalidate
accept-ranges
bytes
cf-ray
4a3ea672ac8b64d5-FRA
content-length
43
x-amz-id-2
gS5XkMggYRNl5IVeD43MPHc1acwGYP+2kPDT5kinEeBjE2GSezl4IATqkQ72xX1AcZi2fCiShnM=
pixel.gif
cdn.viglink.com/images/
43 B
102 B
Image
General
Full URL
https://cdn.viglink.com/images/pixel.gif?ch=2&rn=8.415915375796436
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6810:a00d , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
89fe0ee6020314794fc2cfeacf3d10c31050cfe56f8ebddf1ed0a33fbe941fa7

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 04 Feb 2019 16:52:52 GMT
cf-cache-status
HIT
last-modified
Tue, 10 Feb 2015 03:29:39 GMT
server
cloudflare
x-amz-request-id
FEBE606C5DECB366
etag
"221d8352905f2c38b3cb2bd191d630b0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=15, must-revalidate
accept-ranges
bytes
cf-ray
4a3ea672ac8d64d5-FRA
content-length
43
x-amz-id-2
gS5XkMggYRNl5IVeD43MPHc1acwGYP+2kPDT5kinEeBjE2GSezl4IATqkQ72xX1AcZi2fCiShnM=
ADTECH;apid=1A4f9e3f86-289d-11e9-be13-d89d6719f098;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772763;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772763/0/0/
10 KB
6 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772763/0/0/ADTECH;apid=1A4f9e3f86-289d-11e9-be13-d89d6719f098;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772763;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
1f9e2587ac6be5dbe56f0193745dc38fd8ebc87059343092f1fc7a008481f316

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Origin
https://hackerpython.wordpress.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
content-encoding
gzip
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://hackerpython.wordpress.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
5586
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A4fa1f680-289d-11e9-90f3-a0d3c101f21c;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672979;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672979/0/0/
1 KB
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672979/0/0/ADTECH;apid=1A4fa1f680-289d-11e9-90f3-a0d3c101f21c;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672979;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
d19778056f407210be33deeec5121671f03f7734316bc7c6bf6e9df93980ba54

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Origin
https://hackerpython.wordpress.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://hackerpython.wordpress.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
1329
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A4fa205a8-289d-11e9-bd47-a0d3c10186b8;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772762;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772762/0/0/
1 KB
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4772762/0/0/ADTECH;apid=1A4fa205a8-289d-11e9-bd47-a0d3c10186b8;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4772762;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
7a39f28e3548c6a3f7959e6fcdb8d02ccc6609bbdad9d45bde0177be09187e23

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Origin
https://hackerpython.wordpress.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://hackerpython.wordpress.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
1329
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A4fa222ae-289d-11e9-8ca3-a0d3c101969c;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4743313;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4743313/0/0/
1 KB
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4743313/0/0/ADTECH;apid=1A4fa222ae-289d-11e9-8ca3-a0d3c101969c;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4743313;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
44a14298fad1ea3aef51e44ecb011e00d00fa29bd615627022f3c20a0278baf6

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Origin
https://hackerpython.wordpress.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://hackerpython.wordpress.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
1329
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A4fa1f036-289d-11e9-b207-a0d3c10698c4;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672980;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672980/0/0/
1 KB
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672980/0/0/ADTECH;apid=1A4fa1f036-289d-11e9-b207-a0d3c10698c4;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672980;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
69f150c5242de21747ab39ef4b2a94936707bb5bcb92028310194a5bec3c3b24

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Origin
https://hackerpython.wordpress.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://hackerpython.wordpress.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
1330
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A4fa20422-289d-11e9-bf36-d89d67320750;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672981;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672981/0/0/
10 KB
6 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/9534.1/4672981/0/0/ADTECH;apid=1A4fa20422-289d-11e9-bf36-d89d67320750;cfp=1;rndc=1549299171;v=2;cmd=bid;cors=yes;alias=4672981;misc=1549299172010;gdpr=1;euconsent=BObdEreObdEreAAABBENB64AAAAiyAAA
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
152.195.15.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
8c711054aa1b92e7b67f746b82cd5ed88d70c7dbaca01c15c70129858d9c174e

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Origin
https://hackerpython.wordpress.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:52 GMT
content-encoding
gzip
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://hackerpython.wordpress.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
5611
expires
Mon, 15 Jun 1998 00:00:00 GMT
ping
api.viglink.com/api/
139 B
832 B
XHR
General
Full URL
https://api.viglink.com/api/ping
Requested by
Host: cdn.viglink.com
URL: https://cdn.viglink.com/api/vglnk.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.255.224.65 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-255-224-65.eu-west-1.compute.amazonaws.com
Software
Apache-Coyote/1.1 /
Resource Hash
74f70c1680219ec2a39975ebf388c5988395364096361a01e844289775f24d59

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Origin
https://hackerpython.wordpress.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Mon, 04 Feb 2019 16:52:52 GMT
Server
Apache-Coyote/1.1
P3P
CP="ALL IND DSP COR CUR ADM TAIo PSDo OUR COM INT NAV PUR STA UNI"
Access-Control-Allow-Origin
https://hackerpython.wordpress.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript;charset=UTF-8
Content-Length
139
Expires
Thu, 01 Jan 1970 00:00:00 GMT
domains
api.viglink.com/api/
41 B
499 B
XHR
General
Full URL
https://api.viglink.com/api/domains
Requested by
Host: cdn.viglink.com
URL: https://cdn.viglink.com/api/vglnk.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.255.224.65 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-255-224-65.eu-west-1.compute.amazonaws.com
Software
Apache-Coyote/1.1 /
Resource Hash
07c9a2f097d8a9781ff3fba08b573203f0245007a0aee75532a180182f4d2f10

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Origin
https://hackerpython.wordpress.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Mon, 04 Feb 2019 16:52:52 GMT
Server
Apache-Coyote/1.1
P3P
CP="ALL IND DSP COR CUR ADM TAIo PSDo OUR COM INT NAV PUR STA UNI"
Access-Control-Allow-Origin
https://hackerpython.wordpress.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript;charset=UTF-8
Content-Length
41
Expires
Thu, 01 Jan 1970 00:00:00 GMT
domains
api.viglink.com/api/
42 B
500 B
XHR
General
Full URL
https://api.viglink.com/api/domains
Requested by
Host: cdn.viglink.com
URL: https://cdn.viglink.com/api/vglnk.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.255.224.65 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-255-224-65.eu-west-1.compute.amazonaws.com
Software
Apache-Coyote/1.1 /
Resource Hash
213662b18db8cbc5167395537fd2fcec7c38d591f9ec7d21ea9d9d5fb86e6b37

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Origin
https://hackerpython.wordpress.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Mon, 04 Feb 2019 16:52:52 GMT
Server
Apache-Coyote/1.1
P3P
CP="ALL IND DSP COR CUR ADM TAIo PSDo OUR COM INT NAV PUR STA UNI"
Access-Control-Allow-Origin
https://hackerpython.wordpress.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript;charset=UTF-8
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT
iframe
sync.teads.tv/ Frame E1CB
0
0
Document
General
Full URL
https://sync.teads.tv/iframe
Requested by
Host: s.pubmine.com
URL: https://s.pubmine.com/head.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.7 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-7.deploy.static.akamaitechnologies.com
Software
akka-http/10.1.5 /
Resource Hash

Request headers

:method
GET
:authority
sync.teads.tv
:scheme
https
:path
/iframe
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
accept-encoding
gzip, deflate, br
cookie
tt_viewer=5e568b1b-fe52-4a82-84d2-1fc42f3546cd
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/

Response headers

status
200
content-type
text/html; charset=UTF-8
server
akka-http/10.1.5
content-length
1368
expires
Mon, 04 Feb 2019 16:52:53 GMT
cache-control
max-age=0, no-cache, no-store
pragma
no-cache
date
Mon, 04 Feb 2019 16:52:53 GMT
set-cookie
tt_exelate=; Expires=Tue, 05 Feb 2019 16:52:53 GMT; Domain=.teads.tv tt_bluekai=; Expires=Tue, 05 Feb 2019 16:52:53 GMT; Domain=.teads.tv tt_emetriq=; Expires=Tue, 05 Feb 2019 16:52:53 GMT; Domain=.teads.tv tt_liveramp=; Expires=Tue, 05 Feb 2019 16:52:53 GMT; Domain=.teads.tv tt_neustar=; Expires=Tue, 05 Feb 2019 16:52:53 GMT; Domain=.teads.tv
async_usersync.html
acdn.adnxs.com/ib/static/usersync/v3/ Frame 92F3
0
0
Document
General
Full URL
https://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
Requested by
Host: s.pubmine.com
URL: https://s.pubmine.com/head.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.130 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-130.deploy.static.akamaitechnologies.com
Software
nginx/1.9.13 /
Resource Hash

Request headers

Host
acdn.adnxs.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/

Response headers

Last-Modified
Fri, 20 May 2016 02:07:09 GMT
ETag
W/"573e714d-3e3"
Server
nginx/1.9.13
Content-Type
text/html
Vary
Accept-Encoding
Access-Control-Allow-Origin
*
Content-Encoding
gzip
Content-Length
506
Cache-Control
max-age=31536000
Expires
Tue, 04 Feb 2020 16:52:53 GMT
Date
Mon, 04 Feb 2019 16:52:53 GMT
Connection
keep-alive
p-NcBg8UA4xqUFp.gif
pixel.quantserve.com/pixel/
0
220 B
Image
General
Full URL
https://pixel.quantserve.com/pixel/p-NcBg8UA4xqUFp.gif?idmatch=0&gdpr=1&gdpr_consent=BObdEreObdEreAAABBENB64AAAAiyAAA
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.156.2.6 Frankfurt, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-156-2-6.eu-central-1.compute.amazonaws.com
Software
QS /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 04 Feb 2019 16:52:53 GMT
Cache-Control
private, no-cache, no-store, proxy-revalidate
Server
QS
Connection
keep-alive
Expires
Fri, 04 Aug 1978 12:00:00 GMT
match
openx2-match.dotomi.com/pulsepoint/
Redirect Chain
  • https://bh.contextweb.com/bh/rtset?pid=558299&ev=1&gdpr=1&gdpr_consent=BObdEreObdEreAAABBENB64AAAAiyAAA&rurl=https%3A%2F%2Fpixel.advertising.com%2Fups%2F55972%2Fsync%3Fuid%3D%25%25VGUID%25%25%26_or...
  • https://openx2-match.dotomi.com/pulsepoint/match
0
202 B
Image
General
Full URL
https://openx2-match.dotomi.com/pulsepoint/match
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:fa8:8806:13::1400 , Sweden, ASN25751 (VALUECLICK - Conversant, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 04 Feb 2019 16:52:53 GMT
Cache-Control
no-cache, private, max-age=0, no-store
Server
nginx
Connection
close
Content-Length
0
Expires
0

Redirect headers

Date
Mon, 04 Feb 2019 16:52:53 GMT
Via
1.1 varnish
X-Cache
MISS
P3p
policyref="/bh/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
Connection
keep-alive
Content-Length
0
X-Served-By
cache-hhn1542-HHN
Server
Jetty(9.4.7.v20170914)
Vary
Accept-Encoding
Content-Language
en
Location
https://openx2-match.dotomi.com/pulsepoint/match
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control
private, max-age=0, no-cache, no-store
Accept-Ranges
bytes
Content-Type
text/plain; charset=utf-8
Cw-Server
bh-deployment-df6978777-7sqqs
X-Cache-Hits
0
generic
match.adsrvr.org/track/cmf/
70 B
264 B
Image
General
Full URL
https://match.adsrvr.org/track/cmf/generic?ttd_pid=aoladtech&gdpr=1&gdpr_consent=BObdEreObdEreAAABBENB64AAAAiyAAA
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.18.226.220 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-18-226-220.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
8d70b3e6badb6973663b398d297bb32eaedd08826a1af98d0a1cfce5324ffce0

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 04 Feb 2019 16:52:53 GMT
x-aspnet-version
4.0.30319
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
status
200
cache-control
private,no-cache, must-revalidate
content-type
image/gif
content-length
70
current
aol-match.dotomi.com/match/bounce/
0
202 B
Image
General
Full URL
https://aol-match.dotomi.com/match/bounce/current?networkId=60&version=1&nuid=1A4fa1f680-289d-11e9-90f3-a0d3c101f21c&gdpr=1&gdpr_consent=BObdEreObdEreAAABBENB64AAAAiyAAA&rurl=http%3A%2F%2Fpixel.advertising.com%2Fups%2F55853%2Fsync%3Fuid%3D%24UID%26_origin%3D0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:fa8:8806:12::1370 , Sweden, ASN25751 (VALUECLICK - Conversant, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 04 Feb 2019 16:52:53 GMT
Cache-Control
no-cache, private, max-age=0, no-store
Server
nginx
Connection
close
Content-Length
0
Expires
0
sync
pixel.advertising.com/ups/56465/
0
92 B
Image
General
Full URL
https://pixel.advertising.com/ups/56465/sync?_origin=0&redir=true&gdpr=1&gdpr_consent=BObdEreObdEreAAABBENB64AAAAiyAAA
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.93.148.82 Frankfurt, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-93-148-82.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Mon, 04 Feb 2019 16:52:53 GMT
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
hba
s.pubmine.com/
0
429 B
XHR
General
Full URL
https://s.pubmine.com/hba?rid=126782346907
Requested by
Host: s.pubmine.com
URL: https://s.pubmine.com/head.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.212.214.82 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-212-214-82.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Origin
https://hackerpython.wordpress.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Pragma
no-cache
Date
Mon, 04 Feb 2019 16:52:53 GMT
Server
nginx
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Access-Control-Allow-Origin
https://hackerpython.wordpress.com
Cache-Control
no-cache, no-store, must-revalidate
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=UTF-8
Content-Length
0
Expires
0
adjr
s.pubmine.com/
9 KB
3 KB
XHR
General
Full URL
https://s.pubmine.com/adjr?rid=126782346907
Requested by
Host: s.pubmine.com
URL: https://s.pubmine.com/head.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.212.214.82 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-212-214-82.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
1b0c30d03dcbc2e0cb3d7db9d2f94b0f8b32cbd626bda0c27de2e27673311efe

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Origin
https://hackerpython.wordpress.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Mon, 04 Feb 2019 16:52:53 GMT
Content-Encoding
gzip
Server
nginx
Transfer-Encoding
chunked
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Access-Control-Allow-Origin
https://hackerpython.wordpress.com
Cache-Control
no-cache, no-store, must-revalidate
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Expires
0
3-10-300x250.png
pubpress.net/houseads/2018/03/15/wordads/ Frame 1803
8 KB
8 KB
Image
General
Full URL
https://pubpress.net/houseads/2018/03/15/wordads/3-10-300x250.png
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.78.13 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
68bfa20aeea320930616263b286045c1c86e4bd1f5bf493d7d96aa9aeb796341

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 04 Feb 2019 16:52:53 GMT
x-ac
1.5am _dfw
last-modified
Mon, 19 Mar 2018 14:45:36 GMT
server
nginx
etag
"5aafcd10-20f5"
content-type
image/png
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
8437
expires
Tue, 04 Feb 2020 16:52:53 GMT
/
s.pubmine.com/wl_pixel/FL8Dl7SqjGSMRRiDr0Yvw7Ef_F5syMztNTOwVizfse82xc1bXrKSREOgyRg3coEO0hI4W5UkZkYPfJlsfousqugnIH9s_A02T3WF4w46GMXVwbm92v07uLmH_MMolMAbAd-3VUNzOxaQbTcEME7Vhr0NPyc2ZD67ckDH1rVkh_AF9h... Frame 1803
43 B
366 B
Image
General
Full URL
https://s.pubmine.com/wl_pixel/FL8Dl7SqjGSMRRiDr0Yvw7Ef_F5syMztNTOwVizfse82xc1bXrKSREOgyRg3coEO0hI4W5UkZkYPfJlsfousqugnIH9s_A02T3WF4w46GMXVwbm92v07uLmH_MMolMAbAd-3VUNzOxaQbTcEME7Vhr0NPyc2ZD67ckDH1rVkh_AF9h5wrRSxxkdoAPpvKfMOLVBnFgCdWhuKuWSs-sgAHXjvmVqCIAopX3Q9_K9Dsa2IlFSUJhT5nYaAuxS7f-9uuVqk7uDpndnE6K8R86Db2J5BWRDJha4aMDCq0ZV02cX09GO5H2VnLXajdLD5kcKY8CygTDJsGqxB103sLQKdbJXfJc_oO4Acd-P4aQQPqjL-AmR7R0f31OvwieAoDOZ_UPPUYmVTFrob3I9yYyyshNqxM54deCHRVmJqQJXG7gcEJRe0LB_EUMBNkC0ovl3uJLF_JJgwYFurVpvODhxymWtoTijPkXfNQggWWWYwAkXweaGDssXL5LG-kg/?tuuid=opt-out&rid=126782346907
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.212.214.82 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-212-214-82.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Mon, 04 Feb 2019 16:52:53 GMT
Content-Encoding
gzip
Server
nginx
Transfer-Encoding
chunked
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
300x250_mrec_hiring.png
pubpress.net/houseads/2017/11/22/hiring/house/en/ Frame B8FC
12 KB
12 KB
Image
General
Full URL
https://pubpress.net/houseads/2017/11/22/hiring/house/en/300x250_mrec_hiring.png
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.78.13 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
9ab6997e26e2d0c9835bd784e4a3f1b4da548395709d422ea23be235f056f22f

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 04 Feb 2019 16:52:53 GMT
x-ac
1.5am _dfw
last-modified
Wed, 22 Nov 2017 15:13:51 GMT
server
nginx
etag
"5a15942f-3114"
content-type
image/png
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
12564
expires
Tue, 04 Feb 2020 16:52:53 GMT
/
s.pubmine.com/wl_pixel/MiX2KrMTndHvgKmYpNVDGwvKJZd1dZgijKDoMgMcBwCr2vTvzPfGPd4rZzPZbB_Mi8DrFn9DBac5VwqevlpaPDPJusUq4YLehIJ-4CHJ2jr95dtj4XO0sub3v6XP7icU6rpWwslXtC9Pk5Oe5jwRiz9t7lDEmr8ifqEVYRvYk3l2DS... Frame B8FC
43 B
366 B
Image
General
Full URL
https://s.pubmine.com/wl_pixel/MiX2KrMTndHvgKmYpNVDGwvKJZd1dZgijKDoMgMcBwCr2vTvzPfGPd4rZzPZbB_Mi8DrFn9DBac5VwqevlpaPDPJusUq4YLehIJ-4CHJ2jr95dtj4XO0sub3v6XP7icU6rpWwslXtC9Pk5Oe5jwRiz9t7lDEmr8ifqEVYRvYk3l2DSHXCmz3a6r6PEG3MszhQRIHOBu0i7ABn0TWHZMJBdWKQDx4DAPomy8mETSc54_QbzG1TnQ9AQkS69VEfNlxEsdvQ7kQSZIQsXxE94QNVCnDrl4ncMAYt25gr6VrOOjB4ZdDdc12hlfdixb9hDyluYmnzlCqSbR_EgfBrdpmIoVY649PRyoGcB5pGyel4fvwIXEGF-o4XtqMJ62zxHJzwpRSQaAtXkH5cjK1P7PvtxHkJkOtBNuJbIy1ENfQsO9fuXdzryBVWUqehyn8Rr3AZh6sbP0j_upznOA2KdRXq0vl3SA7Ttfoh53YH0MHZa7QCX1A3hWJ-7oXfw/?tuuid=opt-out&rid=126782346907
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.212.214.82 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-212-214-82.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Mon, 04 Feb 2019 16:52:53 GMT
Content-Encoding
gzip
Server
nginx
Transfer-Encoding
chunked
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
3-1B-160x600.png
pubpress.net/houseads/2018/03/15/wordads/ Frame 1366
4 KB
4 KB
Image
General
Full URL
https://pubpress.net/houseads/2018/03/15/wordads/3-1B-160x600.png
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.78.13 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
0ae589563dd5cbe27b2c51fbf8f167d31bee5af2f1cd8985c11d46234ad83c42

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 04 Feb 2019 16:52:53 GMT
x-ac
1.5am _dfw
last-modified
Mon, 19 Mar 2018 14:45:36 GMT
server
nginx
etag
"5aafcd10-11aa"
content-type
image/png
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
4522
expires
Tue, 04 Feb 2020 16:52:53 GMT
/
s.pubmine.com/wl_pixel/ErRVSOMyiguyZDQCG9ThUgp40xgnX1ZUgxZYQsIAUj3Bb5yWk3U4DjOahQ1sRNBOsgk0W0EkTnqZsnAez7qMftkO_MzjIzx7lNG1LgUA_wbsEDEcw3G_KTOf5TCROB9bZzz7jL813pfE1McLfr8OnVZJS5eP40A-3M0YZHABDOIhic... Frame 1366
43 B
366 B
Image
General
Full URL
https://s.pubmine.com/wl_pixel/ErRVSOMyiguyZDQCG9ThUgp40xgnX1ZUgxZYQsIAUj3Bb5yWk3U4DjOahQ1sRNBOsgk0W0EkTnqZsnAez7qMftkO_MzjIzx7lNG1LgUA_wbsEDEcw3G_KTOf5TCROB9bZzz7jL813pfE1McLfr8OnVZJS5eP40A-3M0YZHABDOIhicUuJIUzIfWH-bEHstqnr-ITqM-wbq9v4SSXKr-j--lIbxMLxqN8zzGYqGoB8CoYuUVBUrYKZj-Y0WEPsVWhxomBuFQC7eTZLOJ2CfiObVkkNZloNBVORKzxf3_lPpA6vFtkmH0l16F2Jj3UWY1clGGYCCznxGkv_Uj-Sv8elZ3Ast430831Oli7Ai9oqH6woDsvpJ-d4xbtr4wnSHaVkAIP0wkRVlS1R1QNxZk8RVGK5rwiif5a-yC7bkCzQX_5MH2-JUSYYVoI_K3fRpouDcbY65bjBTPliOKZcMKTEefCcmrZohz14Db0eCiq_bFVGt5MoWFqZACrKA/?tuuid=opt-out&rid=126782346907
Requested by
Host: hackerpython.wordpress.com
URL: https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.212.214.82 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-212-214-82.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87

Request headers

Referer
https://hackerpython.wordpress.com/2015/10/05/how-to-pass-on-ntlm-authentication-tokens-using-python/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Mon, 04 Feb 2019 16:52:53 GMT
Content-Encoding
gzip
Server
nginx
Transfer-Encoding
chunked
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif

Verdicts & Comments Add Verdict or Comment

94 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask function| addLoadEvent object| _wpemojiSettings object| twemoji object| wp object| NO_JQUERY object| wpcom_mobile_user_agent_info undefined| $ function| jQuery function| pm object| jQuery112402698100693071064 object| Jetpack function| __ATA_CC object| __ATA_PP object| __ATA string| google_analytics_uacct object| _gaq function| highlander_expando_javascript function| hex_md5 function| b64_md5 function| str_md5 function| hex_hmac_md5 function| b64_hmac_md5 function| str_hmac_md5 function| md5_vm_test function| core_md5 function| md5_cmn function| md5_ff function| md5_gg function| md5_hh function| md5_ii function| core_hmac_md5 function| safe_add function| bit_rol function| str2binl function| binl2str function| binl2hex function| binl2b64 object| Gravatar object| GProfile number| hexcase string| b64pad number| chrsz object| WPGroHo object| HighlanderComments object| WPCOM_sharing_counts object| comment_like_text object| actionbardata object| sharing_js_options object| _gat object| gaGlobal object| wpcom_img_zoomer object| jetpackLikesWidgetQueue object| jetpackLikesWidgetBatch boolean| jetpackLikesMasterReady function| JetpackLikespostMessage function| JetpackLikesBatchHandler function| JetpackLikesMessageListener function| JetpackLikesWidgetQueueHandler function| Swipe object| addComment object| wpcom object| ak_js object| commentForm undefined| replyRowContainer undefined| children object| WPCOMSharing object| detectZoom undefined| windowOpen object| _tkq object| _stq string| mobileStatsQueryString string| new_css boolean| comment_likes_loaded function| st_go function| ex_go function| re_go function| linktracker_init object| __core-js_shared__ object| PBJS object| core function| JSEncrypt object| __ATA_HB function| callback__jrqkq3w8_1 function| vglnk object| teadsAnalyticsCache function| vl_cB function| vl_disable function| vglnk_15492991722576 undefined| vglnk_15492991727597 undefined| vglnk_15492991728109 undefined| vglnk_154929917286610

5 Cookies

Domain/Path Name / Value
.wordpress.com/ Name: __utmb
Value: 11735858.1.10.1549299172
.wordpress.com/ Name: __utmt
Value: 1
.wordpress.com/ Name: __utmc
Value: 11735858
.wordpress.com/ Name: __utmz
Value: 11735858.1549299172.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)
.wordpress.com/ Name: __utma
Value: 11735858.2089165530.1549299172.1549299172.1549299172.1

1 Console Messages

Source Level URL
Text
console-api log URL: https://s1.wp.com/_static/??-eJyFztEKwjAMBdAfsquTiXsRv6XWOFKXtDbphn69HeiDMBQC9+EeuLFzMsh+LBcQG+rdC+THO5ogG/sLGMIhO4WGkD/YR1ZgXWyKogQiboCVluIZRzBFIFfAWmeuccV9v4Q8Icx/WQBNzt9MBsHnsn6iY9v1h13f7rtteAE4/VvS(Line 9)
Message:
JQMIGRATE: Migrate is installed, version 1.4.1

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=15552000

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

0.gravatar.com
1.gravatar.com
a.teads.tv
acdn.adnxs.com
adserver-us.adtech.advertising.com
aol-match.dotomi.com
api.viglink.com
bh.contextweb.com
cdn.viglink.com
fonts.googleapis.com
fonts.gstatic.com
graph.facebook.com
hackerpython.wordpress.com
hb-api.omnitagjs.com
hb.nexage.com
ib.adnxs.com
match.adsrvr.org
openx2-match.dotomi.com
pixel.advertising.com
pixel.quantserve.com
pixel.wp.com
public-api.wordpress.com
pubpress.net
s.pubmine.com
s0.wp.com
s1.wp.com
s2.wp.com
ssl.google-analytics.com
stats.wp.com
sync.teads.tv
widgets.wp.com
151.101.0.166
152.195.15.114
185.33.223.215
192.0.76.3
192.0.77.32
192.0.78.12
192.0.78.13
192.0.78.22
2.18.232.130
2.18.232.7
2606:4700::6810:a00d
2a00:1450:4001:808::200a
2a00:1450:4001:818::2003
2a00:1450:4001:81d::2008
2a02:fa8:8806:12::1370
2a02:fa8:8806:13::1400
2a03:2880:f029:11:face:b00c:0:2
2a04:fa87:fffe::c000:4902
34.255.224.65
35.156.2.6
52.18.226.220
52.212.214.82
54.241.163.74
54.37.115.97
54.93.148.82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