Submitted URL: https://t.co/E1eMLbvd5z
Effective URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Submission: On November 18 via api from US

Summary

This website contacted 11 IPs in 5 countries across 10 domains to perform 78 HTTP transactions. The main IP is 66.96.144.191, located in Burlington, United States and belongs to BIZLAND-SD - The Endurance International Group, Inc., US. The main domain is www.xorlogics.com.
This is the only time www.xorlogics.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 104.244.42.133 13414 (TWITTER)
1 1 67.199.248.12 396982 (GOOGLE-PR...)
64 66.96.144.191 29873 (BIZLAND-SD)
1 2a00:1450:400... 15169 (GOOGLE)
1 51.140.39.77 8075 (MICROSOFT...)
1 52.217.32.62 16509 (AMAZON-02)
1 2 46.105.104.73 16276 (OVH)
1 198.12.152.30 26496 (AS-26496-...)
5 2a00:1450:400... 15169 (GOOGLE)
1 2 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
78 11
Domain Requested by
64 www.xorlogics.com t.co
www.xorlogics.com
5 fonts.gstatic.com www.xorlogics.com
2 www.google-analytics.com 1 redirects www.xorlogics.com
2 proslead.com 1 redirects www.xorlogics.com
1 stats.g.doubleclick.net www.xorlogics.com
1 campaign.xorlogics.com www.xorlogics.com
1 s3.amazonaws.com www.xorlogics.com
1 www.refl3alea.com www.xorlogics.com
1 fonts.googleapis.com www.xorlogics.com
1 buff.ly 1 redirects
1 t.co
78 11
Subject Issuer Validity Valid
t.co
DigiCert SHA2 High Assurance Server CA
2019-04-09 -
2020-04-01
a year crt.sh
proslead.com
Gandi Standard SSL CA 2
2019-06-13 -
2020-06-13
a year crt.sh
*.google-analytics.com
GTS CA 1O1
2019-11-05 -
2020-01-28
3 months crt.sh
*.g.doubleclick.net
GTS CA 1O1
2019-11-05 -
2020-01-28
3 months crt.sh

This page contains 1 frames:

Primary Page: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Frame ID: 9FA562A77320289B7A509E0D8A7C628A
Requests: 78 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://t.co/E1eMLbvd5z Page URL
  2. https://buff.ly/2HL8LMo HTTP 301
    http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • html /<link[^>]* href=[\'"][^']+revslider[\/\w-]+\.css\?ver=([0-9.]+)[\'"]/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • html /<link[^>]* href=[\'"][^']+revslider[\/\w-]+\.css\?ver=([0-9.]+)[\'"]/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • html /<link[^>]* href=[\'"][^']+revslider[\/\w-]+\.css\?ver=([0-9.]+)[\'"]/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i

Overall confidence: 100%
Detected patterns
  • html /<link [^>]+(?:\/([\d.]+)\/)?animate\.(?:min\.)?css/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i


Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[\'"][^']+revslider[\/\w-]+\.css\?ver=([0-9.]+)[\'"]/i

Overall confidence: 100%
Detected patterns
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
  • html /<link [^>]*href="[^"]+owl\.carousel(?:\.min)?\.css/i
  • script /jquery[.-]migrate(?:-([\d.]+))?(?:\.min)?\.js(?:\?ver=([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /jquery[.-]migrate(?:-([\d.]+))?(?:\.min)?\.js(?:\?ver=([\d.]+))?/i

Page Statistics

78
Requests

5 %
HTTPS

36 %
IPv6

10
Domains

11
Subdomains

11
IPs

5
Countries

2199 kB
Transfer

2232 kB
Size

3
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://t.co/E1eMLbvd5z Page URL
  2. https://buff.ly/2HL8LMo HTTP 301
    http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 59
  • http://proslead.com/tracker/7cf7303d7d3f534daf61943d4d9fbc3170e6d8b4 HTTP 302
  • https://proslead.com/tracker/7cf7303d7d3f534daf61943d4d9fbc3170e6d8b4
Request Chain 72
  • http://www.google-analytics.com/analytics.js HTTP 307
  • https://www.google-analytics.com/analytics.js
Request Chain 75
  • http://www.google-analytics.com/r/collect?v=1&_v=j79&a=1064228348&t=pageview&_s=1&dl=http%3A%2F%2Fwww.xorlogics.com%2F2018%2F04%2F23%2Fmost-common-hacking-techniques-used-by-cyber-criminals%2F&dr=https%3A%2F%2Ft.co%2FE1eMLbvd5z&ul=en-us&de=UTF-8&dt=Most%20Common%20Hacking%20Techniques%20Used%20by%20Cyber%20Criminals%20%E2%80%93%20Xorlogics&sd=24-bit&sr=1600x1200&vp=1588x1200&je=0&_u=IEBAAEAB~&jid=776532498&gjid=586576999&cid=1473413314.1574110139&tid=UA-25727296-1&_gid=383181485.1574110139&_r=1&z=961446939 HTTP 307
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&a=1064228348&t=pageview&_s=1&dl=http%3A%2F%2Fwww.xorlogics.com%2F2018%2F04%2F23%2Fmost-common-hacking-techniques-used-by-cyber-criminals%2F&dr=https%3A%2F%2Ft.co%2FE1eMLbvd5z&ul=en-us&de=UTF-8&dt=Most%20Common%20Hacking%20Techniques%20Used%20by%20Cyber%20Criminals%20%E2%80%93%20Xorlogics&sd=24-bit&sr=1600x1200&vp=1588x1200&je=0&_u=IEBAAEAB~&jid=776532498&gjid=586576999&cid=1473413314.1574110139&tid=UA-25727296-1&_gid=383181485.1574110139&_r=1&z=961446939 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-25727296-1&cid=1473413314.1574110139&jid=776532498&_gid=383181485.1574110139&gjid=586576999&_v=j79&z=961446939
Request Chain 76
  • http://proslead.com/tracker/?a=log HTTP 302
  • https://proslead.com/tracker/?a=log

78 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
E1eMLbvd5z
t.co/
224 B
469 B
Document
General
Full URL
https://t.co/E1eMLbvd5z
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.133 , United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_o /
Resource Hash
aed71f9ec5d15cd17ae38e56a5f61f05270ab4bb8771871e4765064f9b1758b7
Security Headers
Name Value
Strict-Transport-Security max-age=0
X-Xss-Protection 0

Request headers

:method
GET
:authority
t.co
:scheme
https
:path
/E1eMLbvd5z
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
sec-fetch-mode
navigate
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36
Sec-Fetch-User
?1

Response headers

status
200
cache-control
private,max-age=300
content-encoding
gzip
content-length
176
content-type
text/html; charset=utf-8
date
Mon, 18 Nov 2019 20:48:55 GMT
expires
Mon, 18 Nov 2019 20:53:55 GMT
server
tsa_o
set-cookie
muc=f359d127-e2be-4436-ac6e-2370bd99d886; Max-Age=63072000; Expires=Wed, 17 Nov 2021 20:48:55 GMT; Domain=t.co
strict-transport-security
max-age=0
vary
Origin
x-connection-hash
17482608f9809bcf600d1ef22ef96b27
x-response-time
122
x-xss-protection
0
Primary Request Cookie set /
www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Redirect Chain
  • https://buff.ly/2HL8LMo
  • http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
64 KB
65 KB
Document
General
Full URL
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Requested by
Host: t.co
URL: https://t.co/E1eMLbvd5z
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 / PHP/5.5.22
Resource Hash
e20670e52e74b2c469575022f6d171f23d971899f735572e80a7482fe8bed2c1

Request headers

Host
www.xorlogics.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
https://t.co/E1eMLbvd5z
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:57 GMT
Content-Type
text/html; charset=UTF-8
Content-Length
65759
Connection
keep-alive
Keep-Alive
timeout=30
Server
Apache/2
X-Powered-By
PHP/5.5.22
Set-Cookie
PHPSESSID=550ea2787996bf619a728039dc75add5; path=/
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
Link
<http://www.xorlogics.com/wp-json/>; rel="https://api.w.org/" <http://www.xorlogics.com/?p=3932>; rel=shortlink
Accept-Ranges
bytes
Age
0

Redirect headers

Cache-Control
private, max-age=90
Content-Length
178
Content-Security-Policy
referrer always;
Content-Type
text/html; charset=utf-8
Date
Mon, 18 Nov 2019 20:48:56 GMT
Location
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Referrer-Policy
unsafe-url
Server
nginx
Set-Cookie
_bit=jaikMU-c58392806c0cbf2bed-00R; Domain=buff.ly; Expires=Sat, 16 May 2020 20:48:56 GMT
Connection
close
/
www.xorlogics.com/
829 B
1 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/?mcsf_action=main_css&ver=4.4.20
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 / PHP/5.5.22
Resource Hash
eca9b028b9b6ce4b393dfe24c54b2feb4e24e21ad28eaea36fd192cfd10f31a3

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 18 Nov 2019 20:48:58 GMT
Server
Apache/2
Age
0
X-Powered-By
PHP/5.5.22
Content-Type
text/css
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
829
Expires
Thu, 19 Nov 1981 08:52:00 GMT
king-hosting.css
www.xorlogics.com/wp-content/themes/arkahost/assets/css/
3 KB
3 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/king-hosting.css?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
f2f90fd8dc8456b9a2936c463e2f412be7d04456d635c2a9fbc18f4fe4708877

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:57 GMT
Last-Modified
Thu, 25 Feb 2016 08:16:57 GMT
Server
Apache/2
Age
0
ETag
"b04-52c93ce5501f4"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
2820
Expires
Tue, 19 Nov 2019 00:48:57 GMT
reset.css
www.xorlogics.com/wp-content/themes/arkahost/assets/css/
7 KB
7 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/reset.css?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
7ce657e7e3471bbcffa4816f1d1bbad0abcd71eb1346f3aa9d5464d54af57496

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:57 GMT
Last-Modified
Thu, 25 Feb 2016 08:17:03 GMT
Server
Apache/2
Age
0
ETag
"1a5d-52c93ceb47546"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
6749
Expires
Tue, 19 Nov 2019 00:48:57 GMT
bootstrap.min.css
www.xorlogics.com/wp-content/themes/arkahost/assets/css/main_menu/
64 KB
64 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/main_menu/bootstrap.min.css?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
1c1e1a24469791153d8e917116025bf1d9fa65dbd2d5297bf50a68c040b5d598

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:57 GMT
Last-Modified
Thu, 25 Feb 2016 08:39:17 GMT
Server
Apache/2
Age
0
ETag
"fe3b-52c941e3ffd30"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
65083
Expires
Tue, 19 Nov 2019 00:48:57 GMT
blog-reset.css
www.xorlogics.com/wp-content/themes/arkahost/assets/css/
26 KB
26 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/blog-reset.css?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
7a904a379f5ef247191334f7844c1b16cd88b7b6bb296910bd9e292b65389d05

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:57 GMT
Last-Modified
Wed, 02 Mar 2016 10:50:29 GMT
Server
Apache/2
Age
0
ETag
"6853-52d0ea681847c"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
26707
Expires
Tue, 19 Nov 2019 00:48:57 GMT
style.css
www.xorlogics.com/wp-content/themes/arkahost/
27 KB
28 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/style.css?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
a960026739f8b128a066d37d889956e6860d0d609c01cf01b8dd7ae2cf1b8d5c

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:57 GMT
Last-Modified
Thu, 25 Feb 2016 07:44:03 GMT
Server
Apache/2
Age
0
ETag
"6d7a-52c9358b8653a"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
28026
Expires
Tue, 19 Nov 2019 00:48:57 GMT
animate.css
www.xorlogics.com/wp-content/themes/arkahost/core/assets/css/
54 KB
54 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/core/assets/css/animate.css?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
6312fd002c9ef936b59b232d9cb94b2ec3821d2495aa6ada357291543725832d

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:57 GMT
Last-Modified
Thu, 13 Dec 2018 06:26:08 GMT
Server
Apache/2
Age
0
ETag
"d6b4-57ce163daca5f"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
54964
Expires
Tue, 19 Nov 2019 00:48:57 GMT
king.css
www.xorlogics.com/wp-content/themes/arkahost/assets/css/
48 KB
48 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/king.css?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
cee8d3ec74780ab6894573d60c418737c0c82db0a8122d3a29ee365e03f54757

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Fri, 04 Mar 2016 11:00:47 GMT
Server
Apache/2
Age
0
ETag
"c063-52d370705b30c"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
49251
Expires
Tue, 19 Nov 2019 00:48:58 GMT
arkahost.css
www.xorlogics.com/wp-content/themes/arkahost/assets/css/
139 KB
140 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/arkahost.css?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
c111de082b72b1d1e3c68f1ae01d6269e7ffdf6d2c18ad640483bedc0cd4f294

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:57 GMT
Last-Modified
Mon, 03 Oct 2016 15:05:09 GMT
Server
Apache/2
Age
0
ETag
"22df5-53df7451c50e1"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
142837
Expires
Tue, 19 Nov 2019 00:48:58 GMT
shortcodes.css
www.xorlogics.com/wp-content/themes/arkahost/assets/css/
81 KB
81 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/shortcodes.css?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
9849fda6ae82d7138155bd971df0ca8ec444f03ad7573468d5772d44a396f99a

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:57 GMT
Last-Modified
Thu, 25 Feb 2016 08:17:07 GMT
Server
Apache/2
Age
0
ETag
"14476-52c93cef720f2"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
83062
Expires
Tue, 19 Nov 2019 00:48:58 GMT
box-shortcodes.css
www.xorlogics.com/wp-content/themes/arkahost/assets/css/
19 KB
20 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/box-shortcodes.css?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
2783aea6fd27504ac8e1b52e0b90a925d0b0b571d27351a6a01122ee2b158033

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:57 GMT
Last-Modified
Thu, 25 Feb 2016 08:16:54 GMT
Server
Apache/2
Age
0
ETag
"4d60-52c93ce2b2e0f"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
19808
Expires
Tue, 19 Nov 2019 00:48:58 GMT
cubeportfolio.min.css
www.xorlogics.com/wp-content/themes/arkahost/assets/css/cube/
71 KB
71 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/cube/cubeportfolio.min.css?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
1f5181e7a6f915d67a9d50505e6c84ef411bbfbc8e795bc2ad65278228eab358

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:39:14 GMT
Server
Apache/2
Age
0
ETag
"11b42-52c941e1467f9"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
72514
Expires
Tue, 19 Nov 2019 00:48:58 GMT
owl.transitions.css
www.xorlogics.com/wp-content/themes/arkahost/assets/css/
4 KB
5 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/owl.transitions.css?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
711bc5b0b8c40e39b2560e65797d175e72a89b49ebbc266a7c7b581c4bec4b21

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:17:01 GMT
Server
Apache/2
Age
0
ETag
"117c-52c93ce986536"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
4476
Expires
Tue, 19 Nov 2019 00:48:58 GMT
owl.carousel.css
www.xorlogics.com/wp-content/themes/arkahost/assets/css/
11 KB
11 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/owl.carousel.css?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
97f15b092d706ae04d2e9a22e1d48249ef74a09c30861a2764449240556d7ff0

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:17:01 GMT
Server
Apache/2
Age
0
ETag
"2c6a-52c93ce96d6aa"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
11370
Expires
Tue, 19 Nov 2019 00:48:58 GMT
loopslider.css
www.xorlogics.com/wp-content/themes/arkahost/assets/css/
2 KB
3 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/loopslider.css?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
f47e8f734045023a50dbfa50d7615e1ac4d6b037c68d48b74bd7c668158ab6b5

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:16:59 GMT
Server
Apache/2
Age
0
ETag
"9bd-52c93ce75119a"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
2493
Expires
Tue, 19 Nov 2019 00:48:58 GMT
tabacc.css
www.xorlogics.com/wp-content/themes/arkahost/assets/css/
1 KB
2 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/tabacc.css?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
ddae54426d201a5bdec7c3344dc32ab06b60847f245a58f4971528ff9868701f

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:17:07 GMT
Server
Apache/2
Age
0
ETag
"569-52c93ceed29dc"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
1385
Expires
Tue, 19 Nov 2019 00:48:58 GMT
detached.css
www.xorlogics.com/wp-content/themes/arkahost/assets/css/
4 KB
4 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/detached.css?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
b70753aa989e55442d25cea411af7f7e4e34883fb9614cc38a6464522ac1ba05

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:16:55 GMT
Server
Apache/2
Age
0
ETag
"f80-52c93ce43810e"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
3968
Expires
Tue, 19 Nov 2019 00:48:58 GMT
reslider.css
www.xorlogics.com/wp-content/themes/arkahost/assets/css/
5 KB
5 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/reslider.css?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
34778471681b6808f2e39e757364a2d67fa2e39a1f71fd6159db16ab7724bcb4

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 13:21:48 GMT
Server
Apache/2
Age
0
ETag
"1392-52c981093c1f2"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
5010
Expires
Tue, 19 Nov 2019 00:48:58 GMT
css
fonts.googleapis.com/
35 KB
2 KB
Stylesheet
General
Full URL
http://fonts.googleapis.com/css?family=Open%2BSans%3A300%2C300italic%2C400%2C400italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%7CRaleway%3A400%2C100%2C200%2C300%2C500%2C600%2C700%2C800%2C900%7CRoboto%3A400%2C100%2C100italic%2C300%2C300italic%2C400italic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic%7CDancing%2BScript%3A400%2C700&ver=4.4.20
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
2a00:1450:4001:820::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
44230b6d72655b5431f163d0216c922d11202053b1b2297a9961a7b39201bfb8
Security Headers
Name Value
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:57 GMT
Content-Encoding
gzip
Last-Modified
Mon, 18 Nov 2019 20:48:57 GMT
Server
ESF
X-Frame-Options
SAMEORIGIN
Content-Type
text/css; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
private, max-age=86400, stale-while-revalidate=604800
Transfer-Encoding
chunked
Timing-Allow-Origin
*
Link
<http://fonts.gstatic.com>; rel=preconnect; crossorigin
X-XSS-Protection
0
Expires
Mon, 18 Nov 2019 20:48:57 GMT
menu.css
www.xorlogics.com/wp-content/themes/arkahost/assets/css/main_menu/
20 KB
20 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/main_menu/menu.css?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
a709b5e7b1748f56ff2936e138436e745b705d922cb4ebd6a34bfe9bae2477ec

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:39:20 GMT
Server
Apache/2
Age
0
ETag
"4e9f-52c941e6aafd3"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
20127
Expires
Tue, 19 Nov 2019 00:48:58 GMT
styles.css
www.xorlogics.com/wp-content/plugins/contact-form-7/includes/css/
0
0
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/plugins/contact-form-7/includes/css/styles.css?ver=4.3
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Server
Apache/2
Age
0
Content-Type
text/html; charset=iso-8859-1
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
83
settings.css
www.xorlogics.com/wp-content/plugins/revslider/public/assets/css/
32 KB
32 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/plugins/revslider/public/assets/css/settings.css?ver=5.0.8.5
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
dc67b2d608f23aaadf4b390930278e951d4124b5d1ebeedb0271e1b63485c83e

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:32:46 GMT
Server
Apache/2
Age
0
ETag
"7ed8-52c9406edf685"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
32472
Expires
Tue, 19 Nov 2019 00:48:58 GMT
page-list.css
www.xorlogics.com/wp-content/plugins/sitemap/css/
702 B
1 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/plugins/sitemap/css/page-list.css?ver=4.3
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
59ebc47331c997b569e83c98089d44b1f3797e2bec0e6cf979f8c7e43643f452

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 07:54:39 GMT
Server
Apache/2
Age
0
ETag
"2be-52c937e9fa82a"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
702
Expires
Tue, 19 Nov 2019 00:48:58 GMT
responsive.css
www.xorlogics.com/wp-content/themes/arkahost/assets/css/
37 KB
37 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/responsive.css?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
12df142ba618ae0e7d74b29ede30beb9f7e2169b76e25aa729efa7a42bdb13e8

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:17:06 GMT
Server
Apache/2
Age
0
ETag
"92a8-52c93cee00a56"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
37544
Expires
Tue, 19 Nov 2019 00:48:58 GMT
responsive-tabs.css
www.xorlogics.com/wp-content/themes/arkahost/assets/css/
8 KB
8 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/responsive-tabs.css?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
2fdeb6aab56983a526ae702d72dd5f8b52375e5b2ab872a115854e502cef85cb

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Fri, 04 Mar 2016 09:39:32 GMT
Server
Apache/2
Age
0
ETag
"1e88-52d35e46701a6"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
7816
Expires
Tue, 19 Nov 2019 00:48:58 GMT
responsive-portfolio.css
www.xorlogics.com/wp-content/themes/arkahost/assets/css/
3 KB
3 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/responsive-portfolio.css?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
875f848dc1a3afb1879c0fde219689cfdc653a0deba4e4e9b45ad5e6870f2435

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:17:04 GMT
Server
Apache/2
Age
0
ETag
"acf-52c93cec2b5e1"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
2767
Expires
Tue, 19 Nov 2019 00:48:58 GMT
jquery.js
www.xorlogics.com/wp-includes/js/jquery/
94 KB
94 KB
Script
General
Full URL
http://www.xorlogics.com/wp-includes/js/jquery/jquery.js?ver=1.11.3
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
ca32702f36da9bdbaa5463f8e3db9b18d82f3ce8a630d18e8bde6b30a2582d20

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 09:14:10 GMT
Server
Apache/2
Age
0
ETag
"176e9-52c949afeecda"
Content-Type
application/x-javascript
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
95977
Expires
Tue, 19 Nov 2019 00:48:58 GMT
jquery-migrate.min.js
www.xorlogics.com/wp-includes/js/jquery/
7 KB
7 KB
Script
General
Full URL
http://www.xorlogics.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
1e67d8dbcca1f6fd94e077c85c2fb40fa1c2756c99238daa8da882144260a68d

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 09:14:05 GMT
Server
Apache/2
Age
0
ETag
"1c1f-52c949aad6036"
Content-Type
application/x-javascript
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
7199
Expires
Tue, 19 Nov 2019 00:48:58 GMT
scrollTo.js
www.xorlogics.com/wp-content/plugins/mailchimp/js/
2 KB
3 KB
Script
General
Full URL
http://www.xorlogics.com/wp-content/plugins/mailchimp/js/scrollTo.js?ver=1.4.2
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
344e27f97a78300afa0be93fd75a36ccb6d69f1098480ee233a5009188e17d38

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 07:50:23 GMT
Server
Apache/2
Age
0
ETag
"8cc-52c936f60659a"
Content-Type
application/x-javascript
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
2252
Expires
Tue, 19 Nov 2019 00:48:58 GMT
jquery.form.min.js
www.xorlogics.com/wp-content/plugins/contact-form-7/includes/js/
0
0
Script
General
Full URL
http://www.xorlogics.com/wp-content/plugins/contact-form-7/includes/js/jquery.form.min.js?ver=3.51.0-2014.06.20
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Server
Apache/2
Age
0
Content-Type
text/html; charset=iso-8859-1
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
83
mailchimp.js
www.xorlogics.com/wp-content/plugins/mailchimp/js/
994 B
1 KB
Script
General
Full URL
http://www.xorlogics.com/wp-content/plugins/mailchimp/js/mailchimp.js?ver=1.4.2
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
416358cc719086960eb9c406d4763029ff01fe0baa459edff3987754945832bd

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 07:50:23 GMT
Server
Apache/2
Age
0
ETag
"3e2-52c936f5aa889"
Content-Type
application/x-javascript
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
994
Expires
Tue, 19 Nov 2019 00:48:58 GMT
king.user.js
www.xorlogics.com/wp-content/themes/arkahost/assets/js/
1 KB
2 KB
Script
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/js/king.user.js?ver=4.4.20
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
ed7f01db7285e5fa43949528be06993e2de3d44189c57d7d697babaad514cb21

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:18:32 GMT
Server
Apache/2
Age
0
ETag
"5c2-52c93d406531f"
Content-Type
application/x-javascript
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
1474
Expires
Tue, 19 Nov 2019 00:48:58 GMT
jquery.themepunch.tools.min.js
www.xorlogics.com/wp-content/plugins/revslider/public/assets/js/
99 KB
100 KB
Script
General
Full URL
http://www.xorlogics.com/wp-content/plugins/revslider/public/assets/js/jquery.themepunch.tools.min.js?ver=5.0.8.5
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
90229912b665c5fa494d149f52f8cd9a55d5e3b50f9c6aeb8c695a527da50daa

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:32:52 GMT
Server
Apache/2
Age
0
ETag
"18d68-52c9407456ac0"
Content-Type
application/x-javascript
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
101736
Expires
Tue, 19 Nov 2019 00:48:58 GMT
jquery.themepunch.revolution.min.js
www.xorlogics.com/wp-content/plugins/revslider/public/assets/js/
44 KB
45 KB
Script
General
Full URL
http://www.xorlogics.com/wp-content/plugins/revslider/public/assets/js/jquery.themepunch.revolution.min.js?ver=5.0.8.5
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
0a6fd2c2a0188b5300ecdd0a8f03ecae12e08ee9549f4b5def88e8d424541d89

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:32:52 GMT
Server
Apache/2
Age
0
ETag
"b1a5-52c940740a410"
Content-Type
application/x-javascript
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes, bytes
Keep-Alive
timeout=30
Content-Length
45477
Expires
Tue, 19 Nov 2019 00:48:58 GMT
149786.js
www.refl3alea.com/js/
16 B
403 B
Script
General
Full URL
http://www.refl3alea.com/js/149786.js
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
51.140.39.77 London, United Kingdom, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
Kestrel /
Resource Hash
98e41b1c6fc12c2a5963b65cd820c6a07a3b285dcbc415db4fa493035dbfeffa

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 18 Nov 2019 20:48:57 GMT
Content-Encoding
gzip
Server
Kestrel
Vary
Accept-Encoding
Content-Type
text/javascript
Cache-Control
no-store, must-revalidate
Transfer-Encoding
chunked
Expires
0
wp-emoji-release.min.js
www.xorlogics.com/wp-includes/js/
33 KB
33 KB
Script
General
Full URL
http://www.xorlogics.com/wp-includes/js/wp-emoji-release.min.js?ver=4.4.20
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
40f0f2b6fb558157e1f065445b213802aae1d65e46cf436098844f0347cafb46

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Fri, 06 May 2016 21:10:38 GMT
Server
Apache/2
Age
0
ETag
"848c-53232e3fc9339"
Content-Type
application/x-javascript
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
33932
Expires
Tue, 19 Nov 2019 00:48:58 GMT
site-icon3.png
www.xorlogics.com/wp-content/themes/arkahost/assets/images/
1 KB
2 KB
Image
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/images/site-icon3.png
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
43df73f0c724ae3a06312a25f15a9df5a6fe247265b1be8f5572f9da98258132

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:17:44 GMT
Server
Apache/2
Age
0
ETag
"58c-52c93d12430b8"
Content-Type
image/png
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
1420
Expires
Tue, 19 Nov 2019 00:48:58 GMT
xor-logo-3.png
www.xorlogics.com/wp-content/uploads/2016/02/
12 KB
12 KB
Image
General
Full URL
http://www.xorlogics.com/wp-content/uploads/2016/02/xor-logo-3.png
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
48c44248a62920e8123664a561654314362bed4806226bb80fead3926e4833e2

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:08:55 GMT
Server
Apache/2
Age
0
ETag
"302e-52c93b19cf0e3"
Content-Type
image/png
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
12334
Expires
Tue, 19 Nov 2019 00:48:59 GMT
Cyberattack.png
www.xorlogics.com/wp-content/uploads/2018/04/
132 KB
132 KB
Image
General
Full URL
http://www.xorlogics.com/wp-content/uploads/2018/04/Cyberattack.png
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
36ad4e23f4f044458e460779cec8862f9b07249e0307247e8e1cb1b9f5d33f99

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:59 GMT
Last-Modified
Sat, 14 Apr 2018 08:36:11 GMT
Server
Apache/2
Age
0
ETag
"21078-569cae18ac8c5"
Content-Type
image/png
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
135288
Expires
Tue, 19 Nov 2019 00:48:59 GMT
WEB-APPLICATION-FIREWALL.png
www.xorlogics.com/wp-content/uploads/2018/04/
220 KB
220 KB
Image
General
Full URL
http://www.xorlogics.com/wp-content/uploads/2018/04/WEB-APPLICATION-FIREWALL.png
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
560209bace934e9a6495b729fbc23107802ce41d6697c3714d60b684d540603e

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:59 GMT
Last-Modified
Sat, 14 Apr 2018 08:30:19 GMT
Server
Apache/2
Age
0
ETag
"37041-569cacc87135e"
Content-Type
image/png
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
225345
Expires
Tue, 19 Nov 2019 00:48:59 GMT
classic-10_7.css
www.xorlogics.com/wp-content/themes/arkahost/assets/css/
4 KB
4 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/classic-10_7.css
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
1a47dd1e25448768627c1608090fe9bc382797757c694f1a9928748a18b851b0

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:16:53 GMT
Server
Apache/2
Age
0
ETag
"ea0-52c93ce1803b2"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
3744
Expires
Tue, 19 Nov 2019 00:48:58 GMT
mc-validate.js
s3.amazonaws.com/downloads.mailchimp.com/js/
140 KB
140 KB
Script
General
Full URL
http://s3.amazonaws.com/downloads.mailchimp.com/js/mc-validate.js
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
52.217.32.62 Ashburn, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
s3-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
b15aceb04dbf5604df5617cfe984f48479cb131c1df02825d1c24e9f35d01857

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:59 GMT
Last-Modified
Mon, 20 Aug 2018 17:42:38 GMT
Server
AmazonS3
x-amz-request-id
7139EF2C2023AEF1
ETag
"6465dd4a8331265e6629cd069e03504c"
Content-Type
application/javascript
Cache-Control
public,max-age=2592000
Accept-Ranges
bytes
Content-Length
143249
x-amz-id-2
z8V61n32Ff91UxKFswbPzZtz9j5zILOF3GJC+stOq3h/6ODkMCwuYcTpskMvM7SAH+7yCNH1OD0=
font-awesome.min.css
www.xorlogics.com/wp-content/themes/arkahost/core/assets/css/
29 KB
30 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/core/assets/css/font-awesome.min.css
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
60834a95f60b50244859026397300c779182f57a6c728b0f3262b687dbd1318f

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:40:23 GMT
Server
Apache/2
Age
0
ETag
"7539-52c94222fb447"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
30009
Expires
Tue, 19 Nov 2019 00:48:58 GMT
simple-line-icons.css
www.xorlogics.com/wp-content/themes/arkahost/core/assets/css/
9 KB
9 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/core/assets/css/simple-line-icons.css
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
03c00ed0b041d686accc6c9293fdd85089e09a9e293a70b6a2aa1231bb5cdd9a

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:40:25 GMT
Server
Apache/2
Age
0
ETag
"2486-52c94224dd3bc"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
9350
Expires
Tue, 19 Nov 2019 00:48:58 GMT
etlinefont.css
www.xorlogics.com/wp-content/themes/arkahost/core/assets/css/
5 KB
6 KB
Stylesheet
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/core/assets/css/etlinefont.css
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
71f5de7547c33478b4ce9ea33d407b43e16f206c3f5978f8331c41a5f311b802

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:40:23 GMT
Server
Apache/2
Age
0
ETag
"1552-52c9422274c3a"
Content-Type
text/css
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
5458
Expires
Tue, 19 Nov 2019 00:48:58 GMT
king.hosting.js
www.xorlogics.com/wp-content/themes/arkahost/assets/js/
2 KB
3 KB
Script
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/js/king.hosting.js?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
2d49a5ad898f1f6068d5efbabcbe0d95130ffc7ac02c63de99bb87b125a3f54a

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:18:31 GMT
Server
Apache/2
Age
0
ETag
"8c7-52c93d3fb17e3"
Content-Type
application/x-javascript
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
2247
Expires
Tue, 19 Nov 2019 00:48:58 GMT
owl.carousel.js
www.xorlogics.com/wp-content/themes/arkahost/assets/js/
52 KB
52 KB
Script
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/js/owl.carousel.js?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
a8bcca093d8b370d7b2aa88b01dc6ab82620e39d7480272d5280af6eb53cecf2

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:18:33 GMT
Server
Apache/2
Age
0
ETag
"ce3d-52c93d41bb024"
Content-Type
application/x-javascript
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
52797
Expires
Tue, 19 Nov 2019 00:48:58 GMT
custom.js
www.xorlogics.com/wp-content/themes/arkahost/assets/js/
7 KB
7 KB
Script
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/js/custom.js?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
931c9cf46c6711a0807b59d6f558fe2ef221c79ad41f9df130f53291cd633319

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:18:30 GMT
Server
Apache/2
Age
0
ETag
"1c5a-52c93d3e618ae"
Content-Type
application/x-javascript
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
7258
Expires
Tue, 19 Nov 2019 00:48:58 GMT
king.user.js
www.xorlogics.com/wp-content/themes/arkahost/assets/js/
1 KB
2 KB
Script
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/js/king.user.js?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
ed7f01db7285e5fa43949528be06993e2de3d44189c57d7d697babaad514cb21

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:18:32 GMT
Server
Apache/2
Age
0
ETag
"5c2-52c93d406531f"
Content-Type
application/x-javascript
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
1474
Expires
Tue, 19 Nov 2019 00:48:58 GMT
smoothscroll.js
www.xorlogics.com/wp-content/themes/arkahost/assets/js/
14 KB
14 KB
Script
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/js/smoothscroll.js?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
965abc349a61e17f48fc70b232e890a1226180490c2863a740df0da267dbb996

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:18:34 GMT
Server
Apache/2
Age
0
ETag
"367e-52c93d41c6fd6"
Content-Type
application/x-javascript
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
13950
Expires
Tue, 19 Nov 2019 00:48:58 GMT
viewportchecker.js
www.xorlogics.com/wp-content/themes/arkahost/assets/js/
6 KB
6 KB
Script
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/js/viewportchecker.js?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
3bcba1254f0b4a7c531965477e28b05d1828cacb0ef11837ba14ef1070745732

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:18:35 GMT
Server
Apache/2
Age
0
ETag
"1818-52c93d42d63c5"
Content-Type
application/x-javascript
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
6168
Expires
Tue, 19 Nov 2019 00:48:58 GMT
jquery.cubeportfolio.min.js
www.xorlogics.com/wp-content/themes/arkahost/assets/js/cube/
54 KB
55 KB
Script
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/js/cube/jquery.cubeportfolio.min.js?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
2678c5b1db7ebf650a7fe41dd20a8bcd2898101eeb2f36bd800bd54773e50b47

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:39:56 GMT
Server
Apache/2
Age
0
ETag
"d94c-52c94208b6ab1"
Content-Type
application/x-javascript
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
55628
Expires
Tue, 19 Nov 2019 00:48:58 GMT
main.js
www.xorlogics.com/wp-content/themes/arkahost/assets/js/cube/
2 KB
2 KB
Script
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/js/cube/main.js?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
fb62b411f882ea098fa2be6b6ab0891bd5af38f34328fdb741ed3d7d6177d318

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:39:55 GMT
Server
Apache/2
Age
0
ETag
"668-52c94207bab5a"
Content-Type
application/x-javascript
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
1640
Expires
Tue, 19 Nov 2019 00:48:59 GMT
custom.js
www.xorlogics.com/wp-content/themes/arkahost/assets/js/universal/
8 KB
9 KB
Script
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/js/universal/custom.js?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
93a7f978b52718418b8b38239470fb6776e9b2b8d2d008098e8a26bed1a21c3e

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:59 GMT
Last-Modified
Thu, 25 Feb 2016 08:39:59 GMT
Server
Apache/2
Age
0
ETag
"21b4-52c9420bce003"
Content-Type
application/x-javascript
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
8628
Expires
Tue, 19 Nov 2019 00:48:59 GMT
comment-reply.min.js
www.xorlogics.com/wp-includes/js/
1 KB
1 KB
Script
General
Full URL
http://www.xorlogics.com/wp-includes/js/comment-reply.min.js?ver=4.4.20
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
1b1ca0f15010e0124bd4ca481404643c88f7eda1b276e9554d0ed83fb45b7e30

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:59 GMT
Last-Modified
Thu, 25 Feb 2016 09:11:32 GMT
Server
Apache/2
Age
0
ETag
"436-52c94918965b7"
Content-Type
application/x-javascript
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
1078
Expires
Tue, 19 Nov 2019 00:48:59 GMT
scripts.js
www.xorlogics.com/wp-content/plugins/contact-form-7/includes/js/
0
0
Script
General
Full URL
http://www.xorlogics.com/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=4.3
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:59 GMT
Server
Apache/2
Age
0
Content-Type
text/html; charset=iso-8859-1
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
83
wp-embed.min.js
www.xorlogics.com/wp-includes/js/
1 KB
2 KB
Script
General
Full URL
http://www.xorlogics.com/wp-includes/js/wp-embed.min.js?ver=4.4.20
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
892ecb8e84801900fbec1f9f340f9dd7d53a6444079d82dda76d41581c501891

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:59 GMT
Last-Modified
Fri, 06 May 2016 21:10:38 GMT
Server
Apache/2
Age
0
ETag
"57b-53232e3fc9b1b"
Content-Type
application/x-javascript
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
1403
Expires
Tue, 19 Nov 2019 00:48:59 GMT
shortcode.js
www.xorlogics.com/wp-content/themes/arkahost/core/shortcodes/assets/js/
2 KB
2 KB
Script
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/core/shortcodes/assets/js/shortcode.js?ver=5.0.6
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
3d0336062c213d0f7f07d9451c08a238ed96dfe55c650a210ccf6a15bcc0ce19

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:59 GMT
Last-Modified
Thu, 25 Feb 2016 08:55:47 GMT
Server
Apache/2
Age
0
ETag
"777-52c9459405bee"
Content-Type
application/x-javascript
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
1911
Expires
Tue, 19 Nov 2019 00:48:59 GMT
7cf7303d7d3f534daf61943d4d9fbc3170e6d8b4
proslead.com/tracker/
Redirect Chain
  • http://proslead.com/tracker/7cf7303d7d3f534daf61943d4d9fbc3170e6d8b4
  • https://proslead.com/tracker/7cf7303d7d3f534daf61943d4d9fbc3170e6d8b4
26 KB
27 KB
Script
General
Full URL
https://proslead.com/tracker/7cf7303d7d3f534daf61943d4d9fbc3170e6d8b4
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
46.105.104.73 , France, ASN16276 (OVH, FR),
Reverse DNS
pros.lu
Software
Apache/2.2.22 (Debian) / PHP/5.4.36-0+deb7u3
Resource Hash
ca4b7ed077f88ffb91ba62e398c80a652d2dbb1f8e89fdaf8b9c564898281ee7

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:49:00 GMT
Server
Apache/2.2.22 (Debian)
X-Powered-By
PHP/5.4.36-0+deb7u3
Transfer-Encoding
chunked
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
no-cache, must-revalidate
Connection
Keep-Alive
Access-Control-Allow-Headers
X-Requested-With, Content-Type
Keep-Alive
timeout=5, max=100
Expires
Sat, 26 Jul 1997 01:00:00 GMT

Redirect headers

Date
Mon, 18 Nov 2019 20:49:00 GMT
Content-Encoding
gzip
Server
Apache/2.2.22 (Debian)
Vary
Accept-Encoding
Content-Type
text/html; charset=iso-8859-1
Location
https://proslead.com/tracker/7cf7303d7d3f534daf61943d4d9fbc3170e6d8b4
Cache-Control
max-age=315360000
Connection
Keep-Alive
Keep-Alive
timeout=5, max=100
Content-Length
271
Expires
Thu, 15 Nov 2029 20:49:00 GMT
tracking.js
campaign.xorlogics.com/js/
0
0
Script
General
Full URL
http://campaign.xorlogics.com/js/tracking.js
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
198.12.152.30 Scottsdale, United States, ASN26496 (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com, LLC, US),
Reverse DNS
ip-198.12-152-30.ip.secureserver.net
Software
/
Resource Hash

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

jquery.form.min.js
www.xorlogics.com/wp-content/plugins/contact-form-7/includes/js/
0
0
Script
General
Full URL
http://www.xorlogics.com/wp-content/plugins/contact-form-7/includes/js/jquery.form.min.js?ver=3.51.0-2014.06.20
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Server
Apache/2
Age
0
Content-Type
text/html; charset=iso-8859-1
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
83
site-img37.jpg
www.xorlogics.com/wp-content/themes/arkahost/assets/images/
103 KB
103 KB
Image
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/images/site-img37.jpg
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
9a93dbd4022f439e55376ccc2707a822155d5ba6ff09c9279c25609985865408

Request headers

Referer
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/arkahost.css?ver=5.0.6
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:18:16 GMT
Server
Apache/2
Age
0
ETag
"19ba0-52c93d317e792"
Content-Type
image/jpeg
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
105376
Expires
Tue, 19 Nov 2019 00:48:59 GMT
shadow2.png
www.xorlogics.com/wp-content/themes/arkahost/assets/images/
2 KB
3 KB
Image
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/images/shadow2.png
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
29622f975b30beb27af0ef079a4423359607b8cab72314916ba7d3b883a2bed3

Request headers

Referer
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/shortcodes.css?ver=5.0.6
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:59 GMT
Last-Modified
Thu, 25 Feb 2016 08:17:41 GMT
Server
Apache/2
Age
0
ETag
"9d5-52c93d1010415"
Content-Type
image/png
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
2517
Expires
Tue, 19 Nov 2019 00:48:59 GMT
footer-img1.png
www.xorlogics.com/wp-content/themes/arkahost/assets/images/
10 KB
11 KB
Image
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/images/footer-img1.png
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
5bf633f25a902c56eb06caf61aa2b6070e3ef929172ee02d4f41dfc52aa0d401

Request headers

Referer
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/arkahost.css?ver=5.0.6
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:59 GMT
Last-Modified
Thu, 25 Feb 2016 08:17:21 GMT
Server
Apache/2
Age
0
ETag
"2952-52c93cfc751a9"
Content-Type
image/png
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
10578
Expires
Tue, 19 Nov 2019 00:48:59 GMT
fontawesome-webfont.woff2
www.xorlogics.com/wp-content/themes/arkahost/core/assets/fonts/
63 KB
63 KB
Font
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/core/assets/fonts/fontawesome-webfont.woff2?v=4.4.0
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
3c4a1bb7ce3234407184f0d80cc4dec075e4ad616b44dcc5778e1cfb1bc24019

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36
Referer
http://www.xorlogics.com/wp-content/themes/arkahost/core/assets/css/font-awesome.min.css
Origin
http://www.xorlogics.com

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:40:38 GMT
Server
Apache/2
Age
0
ETag
"fbd0-52c94230734ba"
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
64464
Expires
Tue, 19 Nov 2019 00:48:59 GMT
KFOlCnqEu92Fr1MmEU9fBBc4AMP6lQ.woff2
fonts.gstatic.com/s/roboto/v20/
11 KB
11 KB
Font
General
Full URL
http://fonts.gstatic.com/s/roboto/v20/KFOlCnqEu92Fr1MmEU9fBBc4AMP6lQ.woff2
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
2a00:1450:4001:81f::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
ce897833ac6e362df7c91ac8223fe511c6defcf33964928a81004600a2dd4c2e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36
Referer
http://fonts.googleapis.com/css?family=Open%2BSans%3A300%2C300italic%2C400%2C400italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%7CRaleway%3A400%2C100%2C200%2C300%2C500%2C600%2C700%2C800%2C900%7CRoboto%3A400%2C100%2C100italic%2C300%2C300italic%2C400italic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic%7CDancing%2BScript%3A400%2C700&ver=4.4.20
Origin
http://www.xorlogics.com

Response headers

Date
Tue, 12 Nov 2019 15:23:46 GMT
X-Content-Type-Options
nosniff
Last-Modified
Wed, 24 Jul 2019 01:18:48 GMT
Server
sffe
Age
537912
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
11056
X-XSS-Protection
0
Expires
Wed, 11 Nov 2020 15:23:46 GMT
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v20/
11 KB
11 KB
Font
General
Full URL
http://fonts.gstatic.com/s/roboto/v20/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
2a00:1450:4001:81f::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
5d1bc9b443f3f81fa4b4ad4634c1bb9702194c1898e3a9de0ab5e2cdc0e9f479
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36
Referer
http://fonts.googleapis.com/css?family=Open%2BSans%3A300%2C300italic%2C400%2C400italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%7CRaleway%3A400%2C100%2C200%2C300%2C500%2C600%2C700%2C800%2C900%7CRoboto%3A400%2C100%2C100italic%2C300%2C300italic%2C400italic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic%7CDancing%2BScript%3A400%2C700&ver=4.4.20
Origin
http://www.xorlogics.com

Response headers

Date
Thu, 31 Oct 2019 14:02:09 GMT
X-Content-Type-Options
nosniff
Last-Modified
Wed, 24 Jul 2019 01:18:50 GMT
Server
sffe
Age
1579609
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
11016
X-XSS-Protection
0
Expires
Fri, 30 Oct 2020 14:02:09 GMT
Simple-Line-Icons.woff
www.xorlogics.com/wp-content/themes/arkahost/core/assets/fonts/
58 KB
58 KB
Font
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/core/assets/fonts/Simple-Line-Icons.woff
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
357af00e9f4081d40ba58b92be04ca240a1ce6dee7f8b83461f0922a56e8c4b7

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36
Referer
http://www.xorlogics.com/wp-content/themes/arkahost/core/assets/css/simple-line-icons.css
Origin
http://www.xorlogics.com

Response headers

Date
Mon, 18 Nov 2019 20:48:58 GMT
Last-Modified
Thu, 25 Feb 2016 08:40:48 GMT
Server
Apache/2
Age
0
ETag
"e7bc-52c9423a35fff"
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
59324
Expires
Tue, 19 Nov 2019 00:48:59 GMT
KFOlCnqEu92Fr1MmWUlfBBc4AMP6lQ.woff2
fonts.gstatic.com/s/roboto/v20/
11 KB
11 KB
Font
General
Full URL
http://fonts.gstatic.com/s/roboto/v20/KFOlCnqEu92Fr1MmWUlfBBc4AMP6lQ.woff2
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
2a00:1450:4001:81f::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
0d9fd7ccabde9b202de45ee6b65878ce9594975d8e8810b0878d3f3fa3637d0e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36
Referer
http://fonts.googleapis.com/css?family=Open%2BSans%3A300%2C300italic%2C400%2C400italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%7CRaleway%3A400%2C100%2C200%2C300%2C500%2C600%2C700%2C800%2C900%7CRoboto%3A400%2C100%2C100italic%2C300%2C300italic%2C400italic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic%7CDancing%2BScript%3A400%2C700&ver=4.4.20
Origin
http://www.xorlogics.com

Response headers

Date
Fri, 01 Nov 2019 19:14:49 GMT
X-Content-Type-Options
nosniff
Last-Modified
Wed, 24 Jul 2019 01:18:58 GMT
Server
sffe
Age
1474449
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
11020
X-XSS-Protection
0
Expires
Sat, 31 Oct 2020 19:14:49 GMT
KFOlCnqEu92Fr1MmSU5fBBc4AMP6lQ.woff2
fonts.gstatic.com/s/roboto/v20/
11 KB
11 KB
Font
General
Full URL
http://fonts.gstatic.com/s/roboto/v20/KFOlCnqEu92Fr1MmSU5fBBc4AMP6lQ.woff2
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
2a00:1450:4001:81f::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
92606bd38901e67d069f2ef883715b6e5ae07d72ae3bead3ad92346528374afc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36
Referer
http://fonts.googleapis.com/css?family=Open%2BSans%3A300%2C300italic%2C400%2C400italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%7CRaleway%3A400%2C100%2C200%2C300%2C500%2C600%2C700%2C800%2C900%7CRoboto%3A400%2C100%2C100italic%2C300%2C300italic%2C400italic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic%7CDancing%2BScript%3A400%2C700&ver=4.4.20
Origin
http://www.xorlogics.com

Response headers

Date
Fri, 01 Nov 2019 19:10:45 GMT
X-Content-Type-Options
nosniff
Last-Modified
Wed, 24 Jul 2019 01:18:52 GMT
Server
sffe
Age
1474693
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
11180
X-XSS-Protection
0
Expires
Sat, 31 Oct 2020 19:10:45 GMT
KFOlCnqEu92Fr1MmYUtfBBc4AMP6lQ.woff2
fonts.gstatic.com/s/roboto/v20/
11 KB
11 KB
Font
General
Full URL
http://fonts.gstatic.com/s/roboto/v20/KFOlCnqEu92Fr1MmYUtfBBc4AMP6lQ.woff2
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
2a00:1450:4001:81f::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
1b6863771c330f7b6a857dbfee3959d8e8c61c0e34f1e9ba5f6f38268d05573d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36
Referer
http://fonts.googleapis.com/css?family=Open%2BSans%3A300%2C300italic%2C400%2C400italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%7CRaleway%3A400%2C100%2C200%2C300%2C500%2C600%2C700%2C800%2C900%7CRoboto%3A400%2C100%2C100italic%2C300%2C300italic%2C400italic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic%7CDancing%2BScript%3A400%2C700&ver=4.4.20
Origin
http://www.xorlogics.com

Response headers

Date
Wed, 30 Oct 2019 11:05:41 GMT
X-Content-Type-Options
nosniff
Last-Modified
Wed, 24 Jul 2019 01:19:08 GMT
Server
sffe
Age
1676597
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
11012
X-XSS-Protection
0
Expires
Thu, 29 Oct 2020 11:05:41 GMT
analytics.js
www.google-analytics.com/
Redirect Chain
  • http://www.google-analytics.com/analytics.js
  • https://www.google-analytics.com/analytics.js
43 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
dbb67c620eaabf6679a314db18d3ae43037aef71ab27422e6feec08ee987cc0a
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 19 Aug 2019 17:22:41 GMT
server
Golfe2
age
922
date
Mon, 18 Nov 2019 20:33:37 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
17803
expires
Mon, 18 Nov 2019 22:33:37 GMT

Redirect headers

Location
https://www.google-analytics.com/analytics.js
Non-Authoritative-Reason
HSTS
footer-bg-graph.png
www.xorlogics.com/wp-content/themes/arkahost/assets/images/
119 KB
119 KB
Image
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/images/footer-bg-graph.png
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
2d87aa32d5be13a4a3d9a80c64b1181099955cee08a0a0c3a9add018b0f0ab28

Request headers

Referer
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/arkahost.css?ver=5.0.6
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:59 GMT
Last-Modified
Thu, 25 Feb 2016 08:17:21 GMT
Server
Apache/2
Age
0
ETag
"1db27-52c93cfceb04a"
Content-Type
image/png
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
121639
Expires
Tue, 19 Nov 2019 00:48:59 GMT
scroll-top-arrow.png
www.xorlogics.com/wp-content/themes/arkahost/assets/images/
1 KB
2 KB
Image
General
Full URL
http://www.xorlogics.com/wp-content/themes/arkahost/assets/images/scroll-top-arrow.png
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
HTTP/1.1
Server
66.96.144.191 Burlington, United States, ASN29873 (BIZLAND-SD - The Endurance International Group, Inc., US),
Reverse DNS
191.144.96.66.static.eigbox.net
Software
Apache/2 /
Resource Hash
6483206729ac11369fe2eccec0186f363867fe8d1d512368bc3e325b28327583

Request headers

Referer
http://www.xorlogics.com/wp-content/themes/arkahost/assets/css/arkahost.css?ver=5.0.6
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

Date
Mon, 18 Nov 2019 20:48:59 GMT
Last-Modified
Thu, 25 Feb 2016 08:17:40 GMT
Server
Apache/2
Age
0
ETag
"5aa-52c93d0efe8c5"
Content-Type
image/png
Cache-Control
max-age=14400
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=30
Content-Length
1450
Expires
Tue, 19 Nov 2019 00:48:59 GMT
collect
stats.g.doubleclick.net/r/
Redirect Chain
  • http://www.google-analytics.com/r/collect?v=1&_v=j79&a=1064228348&t=pageview&_s=1&dl=http%3A%2F%2Fwww.xorlogics.com%2F2018%2F04%2F23%2Fmost-common-hacking-techniques-used-by-cyber-criminals%2F&dr=h...
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&a=1064228348&t=pageview&_s=1&dl=http%3A%2F%2Fwww.xorlogics.com%2F2018%2F04%2F23%2Fmost-common-hacking-techniques-used-by-cyber-criminals%2F&dr=...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-25727296-1&cid=1473413314.1574110139&jid=776532498&_gid=383181485.1574110139&gjid=586576999&_v=j79&z=961446939
35 B
407 B
Image
General
Full URL
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-25727296-1&cid=1473413314.1574110139&jid=776532498&_gid=383181485.1574110139&gjid=586576999&_v=j79&z=961446939
Requested by
Host: www.xorlogics.com
URL: http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:400c:c00::9d Brussels, Belgium, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
http://www.xorlogics.com/2018/04/23/most-common-hacking-techniques-used-by-cyber-criminals/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36

Response headers

pragma
no-cache
strict-transport-security
max-age=10886400; includeSubDomains; preload
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
*
date
Mon, 18 Nov 2019 20:48:59 GMT
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Mon, 18 Nov 2019 20:48:59 GMT
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
*
location
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-25727296-1&cid=1473413314.1574110139&jid=776532498&_gid=383181485.1574110139&gjid=586576999&_v=j79&z=961446939
content-type
text/html; charset=UTF-8
status
302
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
416
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
proslead.com/tracker/
Redirect Chain
  • http://proslead.com/tracker/?a=log
  • https://proslead.com/tracker/?a=log
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
proslead.com
URL
https://proslead.com/tracker/?a=log

Verdicts & Comments Add Verdict or Comment

64 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| _wpemojiSettings object| twemoji object| wp function| $ function| jQuery object| mailchimpSF object| ajax_user_object undefined| oldgs object| punchgs object| _gsScope undefined| oldgs_queue undefined| GreenSockGlobals undefined| _gsQueue object| king_hosting_params string| site_uri string| SITE_URI string| theme_uri object| mc function| $mcj object| fnames object| ftypes string| GoogleAnalyticsObject function| ga function| timelineLoadmore function| videos_gallery function| king_modal_ready object| addComment object| _wpcf7 object| google_tag_data object| gaplugins object| gaGlobal object| gaData function| king_shortcode_setIcon function| king_shortcode_hideIcon function| king_shortcode_showIcon function| king_filter_terms function| king_terms_select function| king_terms_unselected function| king_shortcode_radioChoose string| prosLead_jQueryExists undefined| prosLead_jQueryEmbed undefined| prosLead_s function| prosLeadInitTracker function| prosLeadVisitDurationV2 object| formsStructureDatas object| formsDatas string| saveAllFormsMethod boolean| firstFormsFieldBlured function| prosLeadInitSniffer function| prosLeadInitRetargeting function| handleDisplayRetargetingData function| insertFancyBoxCssStyles function| doShowRetargetingPopup function| getFormFields function| saveAllForms function| plHiddenFieldIsNotToBeCollected function| plTrim function| pl_disableRetargetingForCurrentUser boolean| globalVar_retargetingData string| pageTitle string| pathName object| jQuery1113047703149137914513

3 Cookies

Domain/Path Name / Value
.xorlogics.com/ Name: _gat
Value: 1
.xorlogics.com/ Name: _gid
Value: GA1.2.383181485.1574110139
.xorlogics.com/ Name: _ga
Value: GA1.2.1473413314.1574110139

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=0
X-Xss-Protection 0

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

buff.ly
campaign.xorlogics.com
fonts.googleapis.com
fonts.gstatic.com
proslead.com
s3.amazonaws.com
stats.g.doubleclick.net
t.co
www.google-analytics.com
www.refl3alea.com
www.xorlogics.com
proslead.com
104.244.42.133
198.12.152.30
2a00:1450:4001:81b::200e
2a00:1450:4001:81f::2003
2a00:1450:4001:820::200a
2a00:1450:400c:c00::9d
46.105.104.73
51.140.39.77
52.217.32.62
66.96.144.191
67.199.248.12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