URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Submission: On May 04 via api from US

Summary

This website contacted 90 IPs in 7 countries across 67 domains to perform 195 HTTP transactions. The main IP is 104.17.106.195, located in San Francisco, United States and belongs to CLOUDFLARENET - Cloudflare, Inc., US. The main domain is www.coindesk.com.
TLS certificate: Issued by COMODO ECC Domain Validation Secure S... on November 3rd 2017. Valid for: a year.
This is the only time www.coindesk.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
40 104.17.106.195 13335 (CLOUDFLAR...)
1 52.222.175.184 16509 (AMAZON-02)
1 2 199.96.57.6 13414 (TWITTER)
1 23.111.11.83 54104 (AS-STACKPATH)
1 104.244.43.112 13414 (TWITTER)
1 172.227.119.12 20940 (AKAMAI-ASN1)
1 52.222.170.116 16509 (AMAZON-02)
4 205.185.216.42 20446 (HIGHWINDS3)
1 108.161.189.78 54104 (AS-STACKPATH)
5 185.60.216.19 32934 (FACEBOOK)
1 104.244.42.133 13414 (TWITTER)
7 205.185.216.10 20446 (HIGHWINDS3)
4 151.101.14.2 54113 (FASTLY)
3 104.27.106.38 13335 (CLOUDFLAR...)
1 23.45.97.170 20940 (AKAMAI-ASN1)
1 192.0.73.2 2635 (AUTOMATTIC)
2 54.76.124.19 16509 (AMAZON-02)
5 50.17.52.222 14618 (AMAZON-AES)
1 5 172.227.124.249 20940 (AKAMAI-ASN1)
9 185.60.216.35 32934 (FACEBOOK)
1 178.63.12.208 24940 (HETZNER-AS)
1 178.250.0.74 44788 (ASN-CRITE...)
1 2 216.58.214.40 15169 (GOOGLE)
2 52.222.163.55 16509 (AMAZON-02)
1 104.27.165.180 13335 (CLOUDFLAR...)
2 185.60.216.15 32934 (FACEBOOK)
1 185.63.145.1 14413 (LINKEDIN)
1 151.101.13.140 54113 (FASTLY)
1 95.172.94.34 15570 (Internap ...)
3 23.111.9.30 54104 (AS-STACKPATH)
2 23.111.11.222 54104 (AS-STACKPATH)
1 151.101.12.134 54113 (FASTLY)
1 104.244.42.195 13414 (TWITTER)
1 1 64.233.166.156 15169 (GOOGLE)
1 1 216.58.207.68 15169 (GOOGLE)
1 216.58.207.67 15169 (GOOGLE)
3 104.16.78.166 13335 (CLOUDFLAR...)
1 151.101.192.134 54113 (FASTLY)
2 52.222.168.128 16509 (AMAZON-02)
5 104.155.128.21 15169 (GOOGLE)
2 52.222.163.221 16509 (AMAZON-02)
2 151.101.14.202 54113 (FASTLY)
1 172.217.22.34 15169 (GOOGLE)
2 35.226.96.66 15169 (GOOGLE)
2 178.250.2.89 44788 (ASN-CRITE...)
1 23.111.11.100 54104 (AS-STACKPATH)
1 52.4.118.65 14618 (AMAZON-AES)
3 35.156.182.21 16509 (AMAZON-02)
1 35.190.59.101 15169 (GOOGLE)
3 35.190.91.160 15169 (GOOGLE)
1 172.217.21.226 15169 (GOOGLE)
1 172.217.23.130 15169 (GOOGLE)
3 216.58.207.66 15169 (GOOGLE)
1 34.226.0.232 14618 (AMAZON-AES)
1 104.20.183.9 13335 (CLOUDFLAR...)
1 216.58.207.42 15169 (GOOGLE)
1 52.222.162.71 16509 (AMAZON-02)
1 3 173.241.240.220 36089 (OPENX-AS1)
1 204.2.250.100 26120 (RHYTHMONE)
2 63.215.202.75 25751 (VALUECLICK)
2 3 37.252.172.27 29990 (ASN-APPNEXUS)
3 37.252.172.42 29990 (ASN-APPNEXUS)
1 5.153.8.144 36351 (SOFTLAYER)
1 74.214.194.134 59940 (PULSEPOIN...)
4 62.67.193.96 26667 (RUBICONPR...)
1 1 192.132.33.27 18568 (BIDTELLECT)
3 46.51.193.174 16509 (AMAZON-02)
1 54.77.248.219 16509 (AMAZON-02)
2 2 104.20.90.61 13335 (CLOUDFLAR...)
2 2 104.109.82.245 20940 (AKAMAI-ASN1)
1 1 35.201.83.118 15169 (GOOGLE)
5 6 18.196.109.185 16509 (AMAZON-02)
2 2 35.190.24.107 15169 (GOOGLE)
2 2 52.18.169.38 16509 (AMAZON-02)
1 1 52.211.79.86 16509 (AMAZON-02)
1 216.58.207.74 15169 (GOOGLE)
1 172.217.23.142 15169 (GOOGLE)
1 107.22.194.189 14618 (AMAZON-AES)
1 52.94.218.7 16509 (AMAZON-02)
1 52.44.144.199 14618 (AMAZON-AES)
1 172.217.23.129 15169 (GOOGLE)
1 34.233.103.206 14618 (AMAZON-AES)
1 34.237.174.116 14618 (AMAZON-AES)
2 54.154.30.221 16509 (AMAZON-02)
1 172.217.16.194 15169 (GOOGLE)
1 54.245.238.60 16509 (AMAZON-02)
2 3 151.101.12.166 54113 (FASTLY)
2 2 35.205.46.65 15169 (GOOGLE)
2 2.18.233.40 16625 (AKAMAI-AS)
5 5 79.125.105.126 16509 (AMAZON-02)
1 2 52.58.8.97 16509 (AMAZON-02)
1 2 2.18.234.21 16625 (AKAMAI-AS)
1 62.67.193.75 26667 (RUBICONPR...)
9 10 54.247.77.12 16509 (AMAZON-02)
1 198.47.127.15 3257 (GTT-BACKB...)
1 2 52.58.8.245 16509 (AMAZON-02)
1 217.12.15.83 34010 (YAHOO-IRD)
1 2 35.187.123.169 15169 (GOOGLE)
1 52.54.147.76 14618 (AMAZON-AES)
1 173.241.240.143 36089 (OPENX-AS1)
1 1 216.58.214.66 15169 (GOOGLE)
195 90
Apex Domain
Subdomains
Transfer
40 coindesk.com
www.coindesk.com
media.coindesk.com
api.coindesk.com
769 KB
17 adroll.com
s.adroll.com
d.adroll.com
19 KB
15 revcontent.com
labs-cdn.revcontent.com
trends.revcontent.com
cdn.revcontent.com
cm.revcontent.com
img.revcontent.com
416 KB
11 facebook.com
www.facebook.com
graph.facebook.com
an.facebook.com
3 KB
10 pub.network
a.pub.network
c.pub.network
d.pub.network
155 KB
9 skimresources.com
s.skimresources.com
r.skimresources.com
p.skimresources.com
x.skimresources.com
t.skimresources.com
26 KB
6 bidswitch.net
x.bidswitch.net
3 KB
6 adnxs.com
ib.adnxs.com
5 KB
6 optmstr.com
api.optmstr.com
a.optmstr.com
59 KB
5 rubiconproject.com
fastlane.rubiconproject.com
pixel.rubiconproject.com
6 KB
5 doubleclick.net
stats.g.doubleclick.net
securepubads.g.doubleclick.net
cm.g.doubleclick.net
128 KB
5 scorecardresearch.com
sb.scorecardresearch.com
3 KB
5 facebook.net
connect.facebook.net
53 KB
4 contextweb.com
bid.contextweb.com
bh.contextweb.com
4 KB
4 openx.net
freestar-d.openx.net
us-u.openx.net
2 KB
4 pagefair.com
asset.pagefair.com
stats.pagefair.com
7 KB
4 quantserve.com
secure.quantserve.com
pixel.quantserve.com
6 KB
4 cloudfront.net
d1z2jf7jlzjs58.cloudfront.net
dc8xl0ndzn2cb.cloudfront.net
42 KB
3 parsely.com
srv-2018-05-04-20.config.parsely.com
srv-2018-05-04-20.pixel.parsely.com
api.parsely.com
2 KB
3 disquscdn.com
c.disquscdn.com
189 KB
3 google-analytics.com
ssl.google-analytics.com
www.google-analytics.com
31 KB
3 taboola.com
cdn.taboola.com
trc.taboola.com
120 KB
3 twitter.com
platform.twitter.com
analytics.twitter.com
36 KB
2 visx.net
t.visx.net
1 KB
2 3lift.com
eb2.3lift.com
960 B
2 casalemedia.com
dsum-sec.casalemedia.com
2 KB
2 advertising.com
pixel.advertising.com
601 B
2 programattik.com
ads.programattik.com
1 KB
2 googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
25 KB
2 crwdcntrl.net
sync.crwdcntrl.net
1 KB
2 company-target.com
a.company-target.com
790 B
2 bluekai.com
stags.bluekai.com
2 KB
2 zemanta.com
b1sync.zemanta.com
1013 B
2 dotomi.com
media.msg.dotomi.com
963 B
2 1rx.io
tag.1rx.io
hbevents.1rx.io
1 KB
2 amazon-adsystem.com
c.amazon-adsystem.com
aax.amazon-adsystem.com
13 KB
2 googleapis.com
ajax.googleapis.com
fonts.googleapis.com
7 KB
2 inspectlet.com
cdn.inspectlet.com
hn.inspectlet.com
67 KB
2 criteo.com
bidder.criteo.com
399 B
2 quantcount.com
rules.quantcount.com
676 B
2 google.nl
www.google.nl
adservice.google.nl
281 B
2 google.com
www.google.com
adservice.google.com
362 B
2 disqus.com
coindesk.disqus.com
disqus.com
24 KB
2 pagefair.net
asset.pagefair.net
1 KB
2 cxense.com
scdn.cxense.com
scomcluster.cxense.com
22 KB
2 hotjar.com
static.hotjar.com
script.hotjar.com
75 KB
1 rlcdn.com
idsync.rlcdn.com
545 B
1 yahoo.com
ads.yahoo.com
1 KB
1 pubmatic.com
simage2.pubmatic.com
916 B
1 outbrain.com
sync.outbrain.com
96 B
1 keywee.co
pixel.keywee.co
409 B
1 cwkuki.com
g.cwkuki.com
327 B
1 bttrack.com
bttrack.com
699 B
1 lijit.com
ap.lijit.com
629 B
1 googletagservices.com
www.googletagservices.com
6 KB
1 reddit.com
www.reddit.com
3 KB
1 linkedin.com
www.linkedin.com
1 KB
1 opensharecount.com
opensharecount.com
481 B
1 criteo.net
static.criteo.net
20 KB
1 gravatar.com
secure.gravatar.com
4 KB
1 t.co
t.co
170 B
1 servedby-buysellads.com
m.servedby-buysellads.com
12 KB
1 myfonts.net
hello.myfonts.net
480 B
1 optimizely.com
cdn.optimizely.com
68 KB
1 ads-twitter.com
static.ads-twitter.com
2 KB
1 optnmstr.com
a.optnmstr.com
5 KB
1 mailchimp.com
cdn-images.mailchimp.com
4 KB
195 67
Domain Requested by
33 www.coindesk.com www.coindesk.com
15 d.adroll.com 14 redirects
9 www.facebook.com www.coindesk.com
6 img.revcontent.com scdn.cxense.com
6 x.bidswitch.net 5 redirects www.coindesk.com
6 ib.adnxs.com 2 redirects a.pub.network
5 c.pub.network a.pub.network
5 sb.scorecardresearch.com 1 redirects cdn.taboola.com
www.coindesk.com
5 api.optmstr.com a.optnmstr.com
5 media.coindesk.com www.coindesk.com
5 connect.facebook.net www.coindesk.com
connect.facebook.net
4 cm.revcontent.com www.coindesk.com
4 fastlane.rubiconproject.com a.pub.network
3 bh.contextweb.com 2 redirects www.coindesk.com
3 freestar-d.openx.net 1 redirects www.coindesk.com
3 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
3 p.skimresources.com www.coindesk.com
3 pixel.quantserve.com www.coindesk.com
3 c.disquscdn.com coindesk.disqus.com
3 asset.pagefair.com www.coindesk.com
asset.pagefair.com
3 a.pub.network www.coindesk.com
a.pub.network
2 t.visx.net 1 redirects
2 eb2.3lift.com 1 redirects
2 dsum-sec.casalemedia.com 1 redirects
2 pixel.advertising.com 1 redirects
2 s.adroll.com www.coindesk.com
2 ads.programattik.com 2 redirects
2 t.skimresources.com s.skimresources.com
2 sync.crwdcntrl.net 2 redirects
2 a.company-target.com 2 redirects
2 stags.bluekai.com 2 redirects
2 b1sync.zemanta.com 2 redirects
2 cdn.revcontent.com www.coindesk.com
2 media.msg.dotomi.com a.pub.network
www.coindesk.com
2 bidder.criteo.com static.criteo.net
a.pub.network
2 d.pub.network a.pub.network
2 s.skimresources.com a.pub.network
s.skimresources.com
2 dc8xl0ndzn2cb.cloudfront.net a.pub.network
dc8xl0ndzn2cb.cloudfront.net
2 rules.quantcount.com secure.quantserve.com
2 asset.pagefair.net www.coindesk.com
2 api.coindesk.com www.coindesk.com
2 d1z2jf7jlzjs58.cloudfront.net www.coindesk.com
d1z2jf7jlzjs58.cloudfront.net
2 ssl.google-analytics.com 1 redirects www.coindesk.com
2 trends.revcontent.com www.coindesk.com
trends.revcontent.com
2 cdn.taboola.com www.coindesk.com
cdn.taboola.com
2 platform.twitter.com 1 redirects www.coindesk.com
1 cm.g.doubleclick.net 1 redirects
1 us-u.openx.net
1 idsync.rlcdn.com
1 ads.yahoo.com
1 trc.taboola.com
1 simage2.pubmatic.com
1 sync.outbrain.com
1 pixel.rubiconproject.com
1 hbevents.1rx.io www.coindesk.com
1 pagead2.googlesyndication.com securepubads.g.doubleclick.net
1 api.parsely.com www.coindesk.com
1 srv-2018-05-04-20.pixel.parsely.com www.coindesk.com
1 tpc.googlesyndication.com securepubads.g.doubleclick.net
1 hn.inspectlet.com cdn.inspectlet.com
1 aax.amazon-adsystem.com c.amazon-adsystem.com
1 pixel.keywee.co www.coindesk.com
1 www.google-analytics.com www.coindesk.com
1 fonts.googleapis.com ajax.googleapis.com
1 x.skimresources.com 1 redirects
1 g.cwkuki.com 1 redirects
1 bttrack.com 1 redirects
1 an.facebook.com a.pub.network
1 bid.contextweb.com a.pub.network
1 ap.lijit.com a.pub.network
1 tag.1rx.io a.pub.network
1 c.amazon-adsystem.com a.pub.network
1 ajax.googleapis.com a.optmstr.com
1 cdn.inspectlet.com a.pub.network
1 stats.pagefair.com www.coindesk.com
1 adservice.google.com www.googletagservices.com
1 adservice.google.nl www.googletagservices.com
1 r.skimresources.com s.skimresources.com
1 srv-2018-05-04-20.config.parsely.com d1z2jf7jlzjs58.cloudfront.net
1 a.optmstr.com a.optnmstr.com
1 www.googletagservices.com a.pub.network
1 disqus.com coindesk.disqus.com
1 www.google.nl www.coindesk.com
1 www.google.com 1 redirects
1 stats.g.doubleclick.net 1 redirects
1 analytics.twitter.com static.ads-twitter.com
1 coindesk.disqus.com www.coindesk.com
1 secure.quantserve.com www.coindesk.com
1 www.reddit.com www.coindesk.com
1 www.linkedin.com www.coindesk.com
1 graph.facebook.com www.coindesk.com
1 opensharecount.com www.coindesk.com
1 static.criteo.net trends.revcontent.com
1 scomcluster.cxense.com www.coindesk.com
1 script.hotjar.com static.hotjar.com
1 secure.gravatar.com www.coindesk.com
1 scdn.cxense.com www.coindesk.com
1 static.hotjar.com www.coindesk.com
1 t.co www.coindesk.com
1 m.servedby-buysellads.com www.coindesk.com
1 labs-cdn.revcontent.com www.coindesk.com
1 hello.myfonts.net www.coindesk.com
1 cdn.optimizely.com www.coindesk.com
1 static.ads-twitter.com www.coindesk.com
1 a.optnmstr.com www.coindesk.com
1 cdn-images.mailchimp.com www.coindesk.com
195 106
Subject Issuer Validity Valid
ssl819232.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2017-11-03 -
2018-10-24
a year crt.sh

This page contains 2 frames:

Primary Page: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Frame ID: B06F7678DDAAB496D49F08BA0FC8AD38
Requests: 195 HTTP requests in this frame

Frame: https://p.skimresources.com/?provider_id=3a16b0cb121dd9d91b38bac5fe6081c3&skim_mapping=true
Frame ID: D7AC59AE45EF0D7399A1D513C19F16D0
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • env /^Highcharts$/i

Overall confidence: 100%
Detected patterns
  • env /pbjs/i

Overall confidence: 100%
Detected patterns
  • env /^adroll_/i

Overall confidence: 100%
Detected patterns
  • env /^_bsa/i

Overall confidence: 100%
Detected patterns
  • headers server /cloudflare/i

Overall confidence: 100%
Detected patterns
  • env /^criteo/i

Overall confidence: 100%
Detected patterns
  • env /^DISQUS/i

Overall confidence: 100%
Detected patterns
  • script /googletagservices\.com\/tag\/js\/gpt(?:_mobile)?\.js/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^\/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • script /googlesyndication\.com\//i
  • env /^__google_ad_/i
  • env /^Goog_AdSense_/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|(analytics))\.js/i
  • env /^gaGlobal$/i

Overall confidence: 100%
Detected patterns
  • env /^googletag$/i

Overall confidence: 100%
Detected patterns
  • env /^Hammer$/i

Overall confidence: 50%
Detected patterns
  • env /^head$/i

Overall confidence: 100%
Detected patterns
  • env /^moment$/i

Overall confidence: 100%
Detected patterns
  • env /^optimizely$/i

Overall confidence: 100%
Detected patterns
  • env /^PARSELY$/i

Overall confidence: 100%
Detected patterns
  • env /^quantserve$/i

Overall confidence: 100%
Detected patterns
  • env /^twemoji$/i

Overall confidence: 100%
Detected patterns
  • html /<iframe[^>]* (?:id="comscore"|scr=[^>]+comscore)|\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • script /\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • env /^_?COMSCORE$/i

Overall confidence: 100%
Detected patterns
  • env /^jQuery$/i

Page Statistics

195
Requests

21 %
HTTPS

0 %
IPv6

67
Domains

106
Subdomains

90
IPs

7
Countries

2438 kB
Transfer

7055 kB
Size

63
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 14
  • https://platform.twitter.com/oct.js HTTP 302
  • https://static.ads-twitter.com/oct.js
Request Chain 55
  • https://sb.scorecardresearch.com/b?c1=7&c2=13739933&c3=20121515121&ns__t=1525466555703&ns_c=UTF-8&cv=3.1e&c8=Monero%20Mining%20Malware%20Attack%20Linked%20to%20Egyptian%20Telecom%20Giant%20-%20CoinDesk&c7=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1525466555703&ns_c=UTF-8&cv=3.1e&c8=Monero%20Mining%20Malware%20Attack%20Linked%20to%20Egyptian%20Telecom%20Giant%20-%20CoinDesk&c7=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&c9=
Request Chain 75
  • https://ssl.google-analytics.com/r/__utm.gif?utmwv=5.7.2&utms=1&utmn=942204347&utmhn=www.coindesk.com&utmcs=UTF-8&utmsr=1600x1200&utmvp=1585x1200&utmsc=24-bit&utmul=en-us&utmje=0&utmfl=-&utmdt=Monero%20Mining%20Malware%20Attack%20Linked%20to%20Egyptian%20Telecom%20Giant%20-%20CoinDesk&utmhid=970681402&utmr=-&utmp=%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&utmht=1525466556038&utmac=UA-40183560-1&utmcc=__utma%3D204792322.2033778555.1525466556.1525466556.1525466556.1%3B%2B__utmz%3D204792322.1525466556.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)%3B&utmjid=371686947&utmredir=1&utmu=qAAAAAAAAAAAAAAAAAAAAAAE~ HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-40183560-1&cid=2033778555.1525466556&jid=371686947&_v=5.7.2&z=942204347 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-40183560-1&cid=2033778555.1525466556&jid=371686947&_v=5.7.2&z=942204347 HTTP 302
  • https://www.google.nl/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-40183560-1&cid=2033778555.1525466556&jid=371686947&_v=5.7.2&z=942204347&slf_rd=1&random=3060456127
Request Chain 114
  • https://freestar-d.openx.net/w/1.0/arj?ju=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&jr=&ch=UTF-8&res=1600x1200x24&ifr=false&tz=0&tws=1600x1200&be=1&dddid=5bd0c978-32ac-4a4e-962c-1856e665dd38%2C8b2e4d68-c09d-4580-871f-437f9c84bf5a%2C572555ec-7e62-47a5-b801-6f5ecfde6577%2C82d44017-29ac-4a8f-b3ca-d34b8f7aa08b&nocache=1525466556550&auid=538583837%2C538583837%2C538583837%2C538583837&aus=728x90%7C160x600%2C300x250%2C300x600%7C300x250%2C300x600%7C728x90&bc=hb_pb_2.0.2& HTTP 302
  • https://freestar-d.openx.net/w/1.0/arj?cc=1&ju=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&jr=&ch=UTF-8&res=1600x1200x24&ifr=false&tz=0&tws=1600x1200&be=1&dddid=5bd0c978-32ac-4a4e-962c-1856e665dd38%2C8b2e4d68-c09d-4580-871f-437f9c84bf5a%2C572555ec-7e62-47a5-b801-6f5ecfde6577%2C82d44017-29ac-4a8f-b3ca-d34b8f7aa08b&nocache=1525466556550&auid=538583837%2C538583837%2C538583837%2C538583837&aus=728x90%7C160x600%2C300x250%2C300x600%7C300x250%2C300x600%7C728x90&bc=hb_pb_2.0.2&
Request Chain 132
  • https://bttrack.com/pixel/cookiesync?source=0b0edea9-c9fe-4b9c-9bcd-a51022f2873f&publisherid=MGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM=&pushdata=109&secure=1 HTTP 302
  • https://cm.revcontent.com/pixel_sync?bidder=109&bidder_uid=9cbe7c35-61c7-4e1f-91ac-18763ecc2e9b&exchange_uid=MGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM=
Request Chain 133
  • http://ib.adnxs.com/getuid?https%3A%2F%2Fcm.revcontent.com%2Fpixel_sync%3Fbidder%3D115%26bidder_uid%3D%24UID%26exchange_uid%3DMGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM=&geo=35 HTTP 302
  • http://ib.adnxs.com/bounce?%2Fgetuid%3Fhttps%253A%252F%252Fcm.revcontent.com%252Fpixel_sync%253Fbidder%253D115%2526bidder_uid%253D%2524UID%2526exchange_uid%253DMGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM%3D%26geo%3D35 HTTP 302
  • https://cm.revcontent.com/pixel_sync?bidder=115&bidder_uid=4866744130209625172&exchange_uid=MGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM=&geo=35
Request Chain 134
  • https://b1sync.zemanta.com/usersync/revcontent/?puid=MGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM=&cb=https%3A%2F%2Fcm.revcontent.com%2Fpixel_sync%3Fexchange_uid%3DMGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM=%26bidder%3D3%26bidder_uid%3D__ZUID__ HTTP 302
  • https://stags.bluekai.com/site/23178?id=C2mS2cD_K02GLrkraTmt&redir=https%3A%2F%2Fb1sync.zemanta.com%2Fusersync%2Fbluekai%2Fcallback%2F%3Fd%3DNB2HI4DTHIXS6Y3NFZZGK5TDN5XHIZLOOQXGG33NF5YGS6DFNRPXG6LOMM7WE2LEMRSXEPJTEZRGSZDEMVZF65LJMQ6UGMTNKMZGGRC7JMYDER2MOJVXEYKUNV2CMZLYMNUGC3THMU6XEZLWMNXW45DFNZ2CMZLYMNUGC3THMVPXK2LEHVGUOVTLLF5E2M22NJFGYTKEMN5FU2SFGBNG2RJRJVKFKMCNGJMTGTKXJF3VSMSGNBHUITJFGNCA HTTP 302
  • https://stags.bluekai.com/site/23178?dt=0&r=1671903496&sig=3800964531&bkca=KJh5MqaryM9DHqIsMkUgTe9hxsvdhwjp/cS1TbDv/P/HCaRCemlUNb0Pf7ONM3frIqEm0sC/7ld/ByJ3rA05cKKUSEi5odU7wcd4aXkZxUM1X4lIzI+44TKhrXl5SdXNHFiTe21EwdlN1P0bzth25f6Krdf0lYUX+WC0FuParzh+DU3E+G7Z/RYAB+4DatPxPqUl9W7A+9VE8kpUmyIo3COUO6RDy2oT+CmVCHo10OZbyam3OmfEO+O3ixsQpkRYt8pPOYFCws+kGhlJ1vQV5xBjRQ+LDLIYm3etC0VBwIs45pLFTNdCGvZzPRoEHo9xnEi6PMnDke4WzBC3/nVGCjBzR3jOG9DgFKYJ1tC9qTrZ+csALX64mwagAx== HTTP 302
  • https://b1sync.zemanta.com/usersync/bluekai/callback/?d=NB2HI4DTHIXS6Y3NFZZGK5TDN5XHIZLOOQXGG33NF5YGS6DFNRPXG6LOMM7WE2LEMRSXEPJTEZRGSZDEMVZF65LJMQ6UGMTNKMZGGRC7JMYDER2MOJVXEYKUNV2CMZLYMNUGC3THMU6XEZLWMNXW45DFNZ2CMZLYMNUGC3THMVPXK2LEHVGUOVTLLF5E2M22NJFGYTKEMN5FU2SFGBNG2RJRJVKFKMCNGJMTGTKXJF3VSMSGNBHUITJFGNCA HTTP 302
  • https://cm.revcontent.com/pixel_sync?bidder=3&bidder_uid=C2mS2cD_K02GLrkraTmt&exchange_uid=MGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM%3D
Request Chain 135
  • https://g.cwkuki.com/cs/D8f2l?u=MGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM= HTTP 302
  • https://cm.revcontent.com/pixel_sync?exchange_uid=MGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM%3D&bidder=112&bidder_uid=adcdfbf0-4fdb-11e8-9e78-0242ac110003
Request Chain 136
  • https://x.bidswitch.net/sync?ssp=revcontent HTTP 302
  • https://x.bidswitch.net/ul_cb/sync?ssp=revcontent HTTP 302
  • https://a.company-target.com/bidswitch_match?bidswitch_ssp_id=revcontent&bsw_custom_parameter=86440d29-d871-4128-9c7d-13fd1a8a9125 HTTP 302
  • https://a.company-target.com/ul_cb/bidswitch_match?bidswitch_ssp_id=revcontent&bsw_custom_parameter=86440d29-d871-4128-9c7d-13fd1a8a9125 HTTP 302
  • https://x.bidswitch.net/sync?dsp_id=7&user_id=de609f41-c236-40f2-89bc-5abf047d97c7&user_group=3&ssp=revcontent&bsw_param=86440d29-d871-4128-9c7d-13fd1a8a9125
Request Chain 144
  • https://sync.crwdcntrl.net/map/c=7505/tp=SKIM/?https%3A%2F%2Fx.skimresources.com%2F%3Fprovider%3Dlotame%26skim_mapping%3Dtrue%26provider_id%3D%24%7Bprofile_id%7D HTTP 302
  • https://sync.crwdcntrl.net/map/ct=y/c=7505/tp=SKIM/?https%3A%2F%2Fx.skimresources.com%2F%3Fprovider%3Dlotame%26skim_mapping%3Dtrue%26provider_id%3D%24%7Bprofile_id%7D HTTP 302
  • https://x.skimresources.com/?provider=lotame&skim_mapping=true&provider_id=3a16b0cb121dd9d91b38bac5fe6081c3 HTTP 302
  • https://p.skimresources.com/?provider_id=3a16b0cb121dd9d91b38bac5fe6081c3&skim_mapping=true
Request Chain 171
  • https://bh.contextweb.com/visitormatch/prebid HTTP 302
  • https://x.bidswitch.net/sync?ssp=pulsepoint HTTP 302
  • https://ads.programattik.com/sync?ssp=bidswitch&bidswitch_ssp_id=pulsepoint HTTP 302
  • https://ads.programattik.com/ul_cb/sync?ssp=bidswitch&bidswitch_ssp_id=pulsepoint HTTP 302
  • https://x.bidswitch.net/sync?dsp_id=156&expires=14&user_id=0085eceb-1e9e-4ff1-98ba-60cc25b73722&ssp=pulsepoint HTTP 302
  • https://bh.contextweb.com/bh/rtset?do=add&pid=556010&ev=86440d29-d871-4128-9c7d-13fd1a8a9125 HTTP 302
  • https://bh.contextweb.com/visitormatch/prebid?s=1525466559964&r=1&v=556010
Request Chain 174
  • https://d.adroll.com/pixel/WA6JJB5VTNEZPKT5KCWPAP/K6WN3BMWOBHDNG6TEQF5J7?pv=79208505129.24046&cookie=&adroll_s_ref=&keyw=&arrfrr=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F HTTP 302
  • https://s.adroll.com/pixel/WA6JJB5VTNEZPKT5KCWPAP/K6WN3BMWOBHDNG6TEQF5J7/QICTVBHGAZFHLBW3CA2WBJ.js
Request Chain 180
  • https://d.adroll.com/cm/aol/out HTTP 302
  • https://pixel.advertising.com/ups/55980/sync?uid=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk&_origin=1 HTTP 302
  • https://pixel.advertising.com/ups/55980/sync?uid=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk&_origin=1&verify=true
Request Chain 181
  • https://d.adroll.com/cm/index/out HTTP 302
  • https://dsum-sec.casalemedia.com/rum?cm_dsp_id=105&external_user_id=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk&expiration=1557002560 HTTP 302
  • https://dsum-sec.casalemedia.com/rum?cm_dsp_id=105&external_user_id=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk&expiration=1557002560&C=1
Request Chain 182
  • https://d.adroll.com/cm/n/out HTTP 302
  • https://pixel.rubiconproject.com/tap.php?v=194538&nid=3644&put=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk&expires=365
Request Chain 183
  • https://d.adroll.com/cm/outbrain/out HTTP 302
  • https://sync.outbrain.com/adroll/pixel?user_id=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk
Request Chain 184
  • https://d.adroll.com/cm/pubmatic/out HTTP 302
  • https://simage2.pubmatic.com/AdServer/Pug?vcode=bz0yJnR5cGU9MSZqcz0xJmNvZGU9MzMwNiZ0bD01MjU2MDA&piggybackCookie=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk
Request Chain 185
  • https://d.adroll.com/cm/taboola/out HTTP 302
  • https://trc.taboola.com/sg/adroll-network/1/rtb-h/?taboola_hm=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk
Request Chain 186
  • https://d.adroll.com/cm/triplelift/out HTTP 302
  • https://eb2.3lift.com/xuid?mid=4714&xuid=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk&dongle=c85e HTTP 302
  • https://eb2.3lift.com/xuid?ld=1&mid=4714&xuid=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk&dongle=c85e
Request Chain 187
  • https://d.adroll.com/cm/r/out HTTP 302
  • https://ads.yahoo.com/pixel?id=2498203&t=2&piggyback=https%3A%2F%2Fads.yahoo.com%2Fcms%2Fv1%3Fesig%3D1~bf4e7dc4546a90c08591652d78a230d3f2ef5733%26nwid%3D10001032567%26sigv%3D1
Request Chain 188
  • https://d.adroll.com/cm/b/out HTTP 302
  • https://x.bidswitch.net/sync?dsp_id=44&user_id=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk HTTP 302
  • https://t.visx.net/sync?tp_id=1&tp_uid=86440d29-d871-4128-9c7d-13fd1a8a9125&ssp_custom_data= HTTP 302
  • https://t.visx.net/ul_cb/sync?tp_id=1&tp_uid=86440d29-d871-4128-9c7d-13fd1a8a9125&ssp_custom_data=
Request Chain 189
  • https://d.adroll.com/cm/x/out HTTP 302
  • https://ib.adnxs.com/pxj?bidder=172&seg=802787&action=setuid(%27Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk%27)
Request Chain 190
  • https://d.adroll.com/cm/l/out HTTP 302
  • https://idsync.rlcdn.com/377928.gif?partner_uid=cfc826d9ceef4fb8e85972610e75a3a9
Request Chain 191
  • https://d.adroll.com/cm/o/out HTTP 302
  • https://us-u.openx.net/w/1.0/sd?id=537103138&val=cfc826d9ceef4fb8e85972610e75a3a9
Request Chain 192
  • https://d.adroll.com/cm/g/out?google_nid=adroll5 HTTP 302
  • https://cm.g.doubleclick.net/pixel?google_sc&google_nid=artb&google_hm=z8gm2c7vT7joWXJhDnWjqQ&google_ula=1535926 HTTP 302
  • https://d.adroll.com/cm/g/in?google_ula=1535926,0

195 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
153 KB
28 KB
Document
General
Full URL
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / PHP/5.6.35
Resource Hash
c2741490bccc1e79eee5fbc5b14cdf4a45ace915a8700a620d883f5270b67541

Request headers

:path
/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
pragma
no-cache
accept-encoding
gzip, deflate
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
cache-control
no-cache
:authority
www.coindesk.com
:scheme
https
:method
GET
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
cf-cache-status
EXPIRED
x-powered-by
PHP/5.6.35
status
200
x-rocket-nginx-bypass
No
x-cf-powered-by
WP Rocket 2.10.3
last-modified
Fri, 04 May 2018 20:42:35 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
cache-control
public, max-age=30
set-cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553; expires=Sat, 04-May-19 20:42:33 GMT; path=/; domain=.coindesk.com; HttpOnly
cf-ray
415dcb663c282762-FRA
link
<https://www.coindesk.com/wp-json/>; rel="https://api.w.org/" <https://www.coindesk.com/?p=318426>; rel=shortlink
expires
Fri, 04 May 2018 20:43:05 GMT
classic-081711.css
cdn-images.mailchimp.com/embedcode/
3 KB
4 KB
Stylesheet
General
Full URL
https://cdn-images.mailchimp.com/embedcode/classic-081711.css
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
52.222.175.184 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-175-184.fra54.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
b6f4e220da1d394544fa342b883483af7f0294f92a7c988f6606ae78775d6aba

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Thu, 22 Sep 2016 17:58:04 GMT
Via
1.1 e3666efb6956ba7f03c75c3401b8c79e.cloudfront.net (CloudFront)
Last-Modified
Thu, 18 Aug 2011 14:29:34 GMT
Server
AmazonS3
Age
59298
ETag
"d813facc50cef75301d8b012379bb198"
X-Cache
Hit from cloudfront
Content-Type
text/css
x-amz-meta-s3fox-filesize
3553
x-amz-meta-s3fox-modifiedtime
1313677757000
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
3553
X-Amz-Cf-Id
VW-OJY64AUXXBUcMRnJfAFEvDxY9QxVejrmA7wKxcMADjPp0JW7aDg==
styles.min.css
www.coindesk.com/wp-content/themes/coindesk2/css/build/
664 KB
68 KB
Stylesheet
General
Full URL
https://www.coindesk.com/wp-content/themes/coindesk2/css/build/styles.min.css?ver=1502020291
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
062d0cc14de38f6a9aac063cac2304b7ce3d4191aaaea5facd900f1f8070ac16

Request headers

:path
/wp-content/themes/coindesk2/css/build/styles.min.css?ver=1502020291
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Fri, 04 May 2018 19:52:34 GMT
server
cloudflare
etag
W/"5aecba02-a6158"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=30
x-rocket-nginx-bypass
No
cf-ray
415dcb720d172762-FRA
expires
Fri, 04 May 2018 20:43:05 GMT
jquery-ui.min.css
www.coindesk.com/wp-content/themes/coindesk2/css/src/
38 KB
4 KB
Stylesheet
General
Full URL
https://www.coindesk.com/wp-content/themes/coindesk2/css/src/jquery-ui.min.css?ver=4.8.1
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
af45c57ad4a5cc0355c689f1a825bc83deca8eb02a48991a4f4b2d771b342cc3

Request headers

:path
/wp-content/themes/coindesk2/css/src/jquery-ui.min.css?ver=4.8.1
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Fri, 04 May 2018 19:44:00 GMT
server
cloudflare
etag
W/"5aecb800-962b"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=30
x-rocket-nginx-bypass
No
cf-ray
415dcb720d182762-FRA
expires
Fri, 04 May 2018 20:43:05 GMT
wp-parsely.css
www.coindesk.com/wp-content/plugins/wp-parsely/
854 B
456 B
Stylesheet
General
Full URL
https://www.coindesk.com/wp-content/plugins/wp-parsely/wp-parsely.css?ver=1525463052
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
392f7556a145cb18c349dd59df21597ecf11b3f3d8fd537e28626446fd0c83b2

Request headers

:path
/wp-content/plugins/wp-parsely/wp-parsely.css?ver=1525463052
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
last-modified
Fri, 04 May 2018 19:44:03 GMT
cf-cache-status
HIT
cf-polished
origSize=1160
status
200
x-rocket-nginx-bypass
No
cf-bgj
minify
server
cloudflare
etag
W/"5aecb803-488"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
cache-control
public, max-age=30
cf-ray
415dcb720d192762-FRA
expires
Fri, 04 May 2018 20:43:05 GMT
polls-css.css
www.coindesk.com/wp-content/plugins/wp-polls/
2 KB
583 B
Stylesheet
General
Full URL
https://www.coindesk.com/wp-content/plugins/wp-polls/polls-css.css?ver=2.73.7
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
31b11a2e634abd7166080ec689881f1152413a31284ab5fdff37ffd2cfac3212

Request headers

:path
/wp-content/plugins/wp-polls/polls-css.css?ver=2.73.7
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
last-modified
Wed, 02 May 2018 19:09:16 GMT
cf-cache-status
HIT
cf-polished
origSize=2708
status
200
x-rocket-nginx-bypass
No
cf-bgj
minify
server
cloudflare
etag
W/"5aea0cdc-a94"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
cache-control
public, max-age=30
cf-ray
415dcb720d1a2762-FRA
expires
Fri, 04 May 2018 20:43:05 GMT
styles.css
www.coindesk.com/wp-content/themes/coindesk2/css/custom/
17 KB
3 KB
Stylesheet
General
Full URL
https://www.coindesk.com/wp-content/themes/coindesk2/css/custom/styles.css?ver=1502020291
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
242b4ad5c8f9fb273fa260b0511b6ec6914be4ea8d29b876fad0b5e74bcb11ed

Request headers

:path
/wp-content/themes/coindesk2/css/custom/styles.css?ver=1502020291
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
last-modified
Fri, 04 May 2018 19:48:17 GMT
cf-cache-status
HIT
cf-polished
origSize=21650
status
200
x-rocket-nginx-bypass
No
cf-bgj
minify
server
cloudflare
etag
W/"5aecb901-5492"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
cache-control
public, max-age=30
cf-ray
415dcb720d1b2762-FRA
expires
Fri, 04 May 2018 20:43:05 GMT
ubermenu.min.css
www.coindesk.com/wp-content/plugins/ubermenu/pro/assets/css/
43 KB
6 KB
Stylesheet
General
Full URL
https://www.coindesk.com/wp-content/plugins/ubermenu/pro/assets/css/ubermenu.min.css?ver=3.2.5
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
bdd6cb53d0e92a1b9e16db20817a66d95359510301ec3c39b76feaadebf2f0c9

Request headers

:path
/wp-content/plugins/ubermenu/pro/assets/css/ubermenu.min.css?ver=3.2.5
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Fri, 04 May 2018 19:50:29 GMT
server
cloudflare
etag
W/"5aecb985-aa4f"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=30
x-rocket-nginx-bypass
No
cf-ray
415dcb720d1d2762-FRA
expires
Fri, 04 May 2018 20:43:05 GMT
custom.css
www.coindesk.com/wp-content/plugins/ubermenu/custom/
2 KB
656 B
Stylesheet
General
Full URL
https://www.coindesk.com/wp-content/plugins/ubermenu/custom/custom.css?ver=3.2.5
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
117cd47c6352281ca39d8c5ad3409a2704fa2cac86e0d606e8439ed5d9c66d9c

Request headers

:path
/wp-content/plugins/ubermenu/custom/custom.css?ver=3.2.5
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
last-modified
Fri, 04 May 2018 19:44:02 GMT
cf-cache-status
HIT
cf-polished
origSize=3462
status
200
x-rocket-nginx-bypass
No
cf-bgj
minify
server
cloudflare
etag
W/"5aecb802-d86"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
cache-control
public, max-age=30
cf-ray
415dcb720d1e2762-FRA
expires
Fri, 04 May 2018 20:43:05 GMT
html5shiv.js
www.coindesk.com/wp-content/themes/coindesk2/js/src/components/
2 KB
1 KB
Script
General
Full URL
https://www.coindesk.com/wp-content/themes/coindesk2/js/src/components/html5shiv.js
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e1ea9034c47d74d94762ab174d337130d444e3141d8b32a4e76c5b3e4de18013

Request headers

:path
/wp-content/themes/coindesk2/js/src/components/html5shiv.js
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
last-modified
Wed, 02 May 2018 19:17:58 GMT
cf-cache-status
HIT
cf-polished
origSize=2380
status
200
x-rocket-nginx-bypass
No
cf-bgj
minify
server
cloudflare
etag
W/"5aea0ee6-94c"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
cache-control
public, max-age=2678400
cf-ray
415dcb720d212762-FRA
expires
Mon, 04 Jun 2018 20:42:35 GMT
font.js
www.coindesk.com/wp-content/themes/coindesk2/js/src/components/
4 KB
1 KB
Script
General
Full URL
https://www.coindesk.com/wp-content/themes/coindesk2/js/src/components/font.js
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
6b830cd3f34f9dc697f5d4533740b2f107fc8a60fda1ca5ce7b984d0b7744153

Request headers

:path
/wp-content/themes/coindesk2/js/src/components/font.js
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Wed, 02 May 2018 19:11:23 GMT
server
cloudflare
etag
W/"5aea0d5b-f10"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=2678400
x-rocket-nginx-bypass
No
cf-bgj
minify
cf-ray
415dcb720d222762-FRA
expires
Mon, 04 Jun 2018 20:42:35 GMT
widgets.js
platform.twitter.com/
123 KB
36 KB
Script
General
Full URL
https://platform.twitter.com/widgets.js
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
SPDY
Server
199.96.57.6 San Francisco, United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
/
Resource Hash
7e1549d8014a30c3c17fdca43be710f1c4acbe33706b008f7ef45b99f6b2bbe5

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
age
810
x-cache
HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
36295
x-served-by
cache-tw-fra1-cr1-15-TWFRA1
last-modified
Thu, 26 Apr 2018 22:37:34 GMT
x-timer
S1525466555.263724,VS0,VE0
etag
"734cb84ab666fc8eeea3489e24aa3b7d+gzip"
vary
Accept-Encoding,Host
content-type
application/javascript; charset=utf-8
via
1.1 varnish
cache-control
public, max-age=1800
accept-ranges
bytes
jquery.js
www.coindesk.com/wp-includes/js/jquery/
95 KB
33 KB
Script
General
Full URL
https://www.coindesk.com/wp-includes/js/jquery/jquery.js?ver=1.12.4
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
15234fdb80caeec93a23b701fb5db31833f3258010fc13d8babd3654f3c68dea

Request headers

:path
/wp-includes/js/jquery/jquery.js?ver=1.12.4
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
last-modified
Wed, 02 May 2018 19:09:11 GMT
cf-cache-status
HIT
cf-polished
origSize=97206
status
200
x-rocket-nginx-bypass
No
cf-bgj
minify
server
cloudflare
etag
W/"5aea0cd7-17bb6"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
cache-control
public, max-age=30
cf-ray
415dcb720d1f2762-FRA
expires
Fri, 04 May 2018 20:43:05 GMT
jquery.cookie.js
www.coindesk.com/wp-content/plugins/mts-wp-notification-bar/public/js/
1 KB
884 B
Script
General
Full URL
https://www.coindesk.com/wp-content/plugins/mts-wp-notification-bar/public/js/jquery.cookie.js?ver=1.1.5
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
8d512c53919b59bee23761193cae4c827ab7d47b5620c498e6f03a81a9c6b170

Request headers

:path
/wp-content/plugins/mts-wp-notification-bar/public/js/jquery.cookie.js?ver=1.1.5
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
last-modified
Fri, 04 May 2018 19:48:18 GMT
cf-cache-status
HIT
cf-polished
origSize=1421
status
200
x-rocket-nginx-bypass
No
cf-bgj
minify
server
cloudflare
etag
W/"5aecb902-58d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
cache-control
public, max-age=30
cf-ray
415dcb720d202762-FRA
expires
Fri, 04 May 2018 20:43:05 GMT
api.min.js
a.optnmstr.com/app/js/
12 KB
5 KB
Script
General
Full URL
https://a.optnmstr.com/app/js/api.min.js?ver=1.2.2
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
SPDY
Server
23.111.11.83 Phoenix, United States, ASN54104 (AS-STACKPATH - netDNA, US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
df8baa11fb632476e5f387beb7be36a0557406a08d335fc46f61bd80595980c2

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
last-modified
Fri, 04 May 2018 19:57:54 GMT
server
NetDNA-cache/2.2
x-amz-request-id
B21AF0F488031FCF
etag
W/"d9236180cdf2ad770a6bc3f0dad184c4"
x-cache
HIT
content-type
application/javascript
status
200
cache-control
2592000
access-control-allow-origin
*
x-amz-id-2
M/ckkPHEg0pf+1+oc5vjTcnBDwv+mqrnMGeQI44CwosHi09uyl/GPgw160kJTTQADN3xwygAU6Q=
expires
Sat May 04 2019 19:57:53 GMT+0000 (UTC)
oct.js
static.ads-twitter.com/
Redirect Chain
  • https://platform.twitter.com/oct.js
  • https://static.ads-twitter.com/oct.js
5 KB
2 KB
Script
General
Full URL
https://static.ads-twitter.com/oct.js
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
SPDY
Server
104.244.43.112 San Francisco, United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
/
Resource Hash
319949c8c08b86e9c35ea542c0dc0c30cedaa9b8d3d3c3327a36c91aefbd8af5

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
age
74651
x-cache
HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
1954
x-served-by
cache-tw-fra1-cr1-18-TWFRA1
last-modified
Tue, 23 Jan 2018 19:05:33 GMT
x-timer
S1525466555.212557,VS0,VE0
etag
"b7b33882a4f3ffd5cbf07434f3137166+gzip"
vary
Accept-Encoding,Host
content-type
application/javascript; charset=utf-8
via
1.1 varnish
cache-control
no-cache
accept-ranges
bytes

Redirect headers

date
Fri, 04 May 2018 20:42:35 GMT
via
1.1 varnish
status
302
vary
x-cache
HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
location
https://static.ads-twitter.com/oct.js
accept-ranges
bytes
content-length
0
retry-after
0
x-served-by
cache-tw-fra1-cr1-15-TWFRA1
6915794098.js
cdn.optimizely.com/js/
251 KB
68 KB
Script
General
Full URL
https://cdn.optimizely.com/js/6915794098.js
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
172.227.119.12 Cambridge, United States, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a172-227-119-12.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
c99501e80ba756eca19f2ed1c69424ea0297651af6f877d3588fdc901000030b
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

x-amz-version-id
iX4C5iOo0eRdamc.mi0FIUUn3PRsMALy
Content-Encoding
gzip
ETag
"e463e50a65c457edb9276fc50dfdd86a"
x-amz-request-id
198EA7F87036C42C
x-amz-meta-revision
225
Access-Control-Allow-Methods
GET, HEAD
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
68569
x-amz-id-2
VVnvf+ttT06W3HoOvWXdZrICCSix3UpUubEk0GoapOtTCrKm/hIpb6CFObl+n9SchhPVacwe+m0=
Last-Modified
Tue, 25 Apr 2017 19:24:51 GMT
Server
AmazonS3
Date
Fri, 04 May 2018 20:42:35 GMT
Access-Control-Max-Age
86400
Strict-Transport-Security
max-age=86400
Content-Type
text/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
x-amz-meta-revision
Cache-Control
max-age=120
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
*
header-logo-new.png
www.coindesk.com/wp-content/themes/coindesk2/images/
8 KB
9 KB
Image
General
Full URL
https://www.coindesk.com/wp-content/themes/coindesk2/images/header-logo-new.png
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
184099c2b2f3ee66b22e553020b344cdcb6807a41d48e45d78684904a219c75d

Request headers

:path
/wp-content/themes/coindesk2/images/header-logo-new.png
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
cf-cache-status
HIT
cf-polished
origFmt=png, origSize=11022
status
200
x-rocket-nginx-bypass
No
content-disposition
inline; filename="header-logo-new.webp"
content-length
8616
last-modified
Wed, 02 May 2018 19:09:12 GMT
server
cloudflare
etag
"5aea0cd8-2b0e"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept
content-type
image/webp
expires
Mon, 01 May 2028 20:42:35 GMT
cache-control
public, max-age=315360000
accept-ranges
bytes
cf-ray
415dcb720d232762-FRA
cf-bgj
imgq:85
wp-emoji-release.min.js
www.coindesk.com/wp-includes/js/
12 KB
4 KB
Script
General
Full URL
https://www.coindesk.com/wp-includes/js/wp-emoji-release.min.js?ver=4.8.1
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
bcb42c4f5eb5b4c7ee08632af417513c6f6002fdf7d4b8d2dea6376f0cadd563

Request headers

:path
/wp-includes/js/wp-emoji-release.min.js?ver=4.8.1
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Fri, 04 May 2018 19:52:33 GMT
server
cloudflare
etag
W/"5aecba01-2e45"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=30
x-rocket-nginx-bypass
No
cf-ray
415dcb725d6d2762-FRA
expires
Fri, 04 May 2018 20:43:05 GMT
2b441c
hello.myfonts.net/count/
2 B
480 B
Script
General
Full URL
https://hello.myfonts.net/count/2b441c
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/wp-content/themes/coindesk2/js/src/components/font.js
Protocol
HTTP/1.1
Server
52.222.170.116 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-170-116.fra54.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
7eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Sun, 19 Nov 2017 05:00:42 GMT
Via
1.1 edee3ff8f335740e0ea86cf9f62b5ae9.cloudfront.net (CloudFront)
Last-Modified
Mon, 31 Mar 2014 08:42:41 GMT
Server
AmazonS3
Age
12993
ETag
"81051bcc2cf1bedf378224b0a93e2877"
X-Cache
Error from cloudfront
Content-Type
text/css
Cache-Control
max-age=0,s-maxage=21600
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2
X-Amz-Cf-Id
AK5eCqmoQJeSi9dk4Hw-80PLOEdZtY0XJmbXbH_QWV2dq3SrBRITyQ==
revmore-standard.min.js
labs-cdn.revcontent.com/build/
56 KB
57 KB
Script
General
Full URL
https://labs-cdn.revcontent.com/build/revmore-standard.min.js
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
205.185.216.42 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
8ba23367360e1dc7db6d67d2248ed7d2b35e022b8d3a24342d1e3d599111736d

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:35 GMT
Last-Modified
Thu, 26 Apr 2018 19:09:56 GMT
ETag
"1524769796"
X-HW
1525466555.dop007.fr8.t,1525466555.cds041.fr8.shn,1525466555.dop007.fr8.t,1525466555.cds006.fr8.c
Content-Type
application/x-javascript
Cache-Control
must-revalidate, max-age=600
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
57855
footer-logo-square.png
www.coindesk.com/wp-content/themes/coindesk2/images/
2 KB
2 KB
Image
General
Full URL
https://www.coindesk.com/wp-content/themes/coindesk2/images/footer-logo-square.png
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
50f99d7e6158483a3946ae5fa13a86d99d1273f0205683a89aa8b2557368dca7

Request headers

:path
/wp-content/themes/coindesk2/images/footer-logo-square.png
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
cf-cache-status
HIT
cf-polished
origFmt=png, origSize=2756
status
200
x-rocket-nginx-bypass
No
content-disposition
inline; filename="footer-logo-square.webp"
content-length
2334
last-modified
Wed, 02 May 2018 19:17:58 GMT
server
cloudflare
etag
"5aea0ee6-ac4"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept
content-type
image/webp
expires
Mon, 01 May 2028 20:42:35 GMT
cache-control
public, max-age=315360000
accept-ranges
bytes
cf-ray
415dcb732ddd2762-FRA
cf-bgj
imgq:85
logo-coindesk-square-x2.png
www.coindesk.com/wp-content/themes/coindesk2/images/
5 KB
5 KB
Image
General
Full URL
https://www.coindesk.com/wp-content/themes/coindesk2/images/logo-coindesk-square-x2.png
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
bd3a0f6c652259b9540da7472458721ab071208507d8b8d4e13073d1825d53f2

Request headers

:path
/wp-content/themes/coindesk2/images/logo-coindesk-square-x2.png
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
cf-cache-status
HIT
cf-polished
origFmt=png, origSize=5487
status
200
x-rocket-nginx-bypass
No
content-disposition
inline; filename="logo-coindesk-square-x2.webp"
content-length
4648
last-modified
Wed, 02 May 2018 19:17:58 GMT
server
cloudflare
etag
"5aea0ee6-156f"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept
content-type
image/webp
expires
Mon, 01 May 2028 20:42:35 GMT
cache-control
public, max-age=315360000
accept-ranges
bytes
cf-ray
415dcb732de02762-FRA
cf-bgj
imgq:85
libraries.min.js
www.coindesk.com/wp-content/themes/coindesk2/js/build/
627 KB
192 KB
Script
General
Full URL
https://www.coindesk.com/wp-content/themes/coindesk2/js/build/libraries.min.js?ver=1502020291
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2333dffb3643b9b820c480421c7f1de4c5c220412f5e5ecbba2575561da1a9a6

Request headers

:path
/wp-content/themes/coindesk2/js/build/libraries.min.js?ver=1502020291
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Wed, 02 May 2018 19:11:23 GMT
server
cloudflare
etag
W/"5aea0d5b-9cafc"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=30
x-rocket-nginx-bypass
No
cf-ray
415dcb732de22762-FRA
expires
Fri, 04 May 2018 20:43:05 GMT
custom.min.js
www.coindesk.com/wp-content/themes/coindesk2/js/build/
63 KB
20 KB
Script
General
Full URL
https://www.coindesk.com/wp-content/themes/coindesk2/js/build/custom.min.js?ver=1502020291
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
19d70d08d160e0a131ca749fd996562b623bac54d873197e45fa1459d90f1358

Request headers

:path
/wp-content/themes/coindesk2/js/build/custom.min.js?ver=1502020291
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Fri, 04 May 2018 19:48:18 GMT
server
cloudflare
etag
W/"5aecb902-fb7d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=30
x-rocket-nginx-bypass
No
cf-ray
415dcb732de32762-FRA
expires
Fri, 04 May 2018 20:43:05 GMT
comment-reply.min.js
www.coindesk.com/wp-includes/js/
1 KB
686 B
Script
General
Full URL
https://www.coindesk.com/wp-includes/js/comment-reply.min.js?ver=4.8.1
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
1b1ca0f15010e0124bd4ca481404643c88f7eda1b276e9554d0ed83fb45b7e30

Request headers

:path
/wp-includes/js/comment-reply.min.js?ver=4.8.1
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Wed, 02 May 2018 19:13:44 GMT
server
cloudflare
etag
W/"5aea0de8-436"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=30
x-rocket-nginx-bypass
No
cf-ray
415dcb732de42762-FRA
expires
Fri, 04 May 2018 20:43:05 GMT
coindesk-sharing.min.js
www.coindesk.com/wp-content/plugins/coindesk-sharing/js/
1 KB
781 B
Script
General
Full URL
https://www.coindesk.com/wp-content/plugins/coindesk-sharing/js/coindesk-sharing.min.js
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
964738c3afbcecd1121c1945cde3878f581f2b3d5348d4a2802400869a993243

Request headers

:path
/wp-content/plugins/coindesk-sharing/js/coindesk-sharing.min.js
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Wed, 02 May 2018 19:18:01 GMT
server
cloudflare
etag
W/"5aea0ee9-5e3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=2678400
x-rocket-nginx-bypass
No
cf-ray
415dcb732de52762-FRA
expires
Mon, 04 Jun 2018 20:42:35 GMT
polls-js.js
www.coindesk.com/wp-content/plugins/wp-polls/
3 KB
818 B
Script
General
Full URL
https://www.coindesk.com/wp-content/plugins/wp-polls/polls-js.js?ver=2.73.7
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
50c5b93d629c63a69824c74e28c8298c286770c6e0eaba130619220cc299b279

Request headers

:path
/wp-content/plugins/wp-polls/polls-js.js?ver=2.73.7
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
last-modified
Fri, 04 May 2018 19:48:21 GMT
cf-cache-status
HIT
cf-polished
origSize=2994
status
200
x-rocket-nginx-bypass
No
cf-bgj
minify
server
cloudflare
etag
W/"5aecb905-bb2"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
cache-control
public, max-age=30
cf-ray
415dcb732de62762-FRA
expires
Fri, 04 May 2018 20:43:05 GMT
ubermenu.min.js
www.coindesk.com/wp-content/plugins/ubermenu/assets/js/
27 KB
7 KB
Script
General
Full URL
https://www.coindesk.com/wp-content/plugins/ubermenu/assets/js/ubermenu.min.js?ver=3.2.5
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e7bd547390930f655c0f6835f07011567bdcc502ab6723900e6ad70ea997406a

Request headers

:path
/wp-content/plugins/ubermenu/assets/js/ubermenu.min.js?ver=3.2.5
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Wed, 02 May 2018 19:13:46 GMT
server
cloudflare
etag
W/"5aea0dea-6d62"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=30
x-rocket-nginx-bypass
No
cf-ray
415dcb732de72762-FRA
expires
Fri, 04 May 2018 20:43:05 GMT
wp-embed.min.js
www.coindesk.com/wp-includes/js/
1 KB
851 B
Script
General
Full URL
https://www.coindesk.com/wp-includes/js/wp-embed.min.js?ver=4.8.1
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
dcb5e540e62fc85857254a1066afb6a7e8999279c6d4c583eef855d39f9289c0

Request headers

:path
/wp-includes/js/wp-embed.min.js?ver=4.8.1
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Wed, 02 May 2018 19:15:49 GMT
server
cloudflare
etag
W/"5aea0e65-576"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=30
x-rocket-nginx-bypass
No
cf-ray
415dcb732de82762-FRA
expires
Fri, 04 May 2018 20:43:05 GMT
forms-api.min.js
www.coindesk.com/wp-content/plugins/mailchimp-for-wp/assets/js/
12 KB
4 KB
Script
General
Full URL
https://www.coindesk.com/wp-content/plugins/mailchimp-for-wp/assets/js/forms-api.min.js?ver=4.1.6
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
11c461f533a7fcd0c5955d1adae6a88caf4426e1933dcacf7670646ac96d589b

Request headers

:path
/wp-content/plugins/mailchimp-for-wp/assets/js/forms-api.min.js?ver=4.1.6
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Wed, 02 May 2018 19:18:01 GMT
server
cloudflare
etag
W/"5aea0ee9-2e99"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=30
x-rocket-nginx-bypass
No
cf-ray
415dcb732de92762-FRA
expires
Fri, 04 May 2018 20:43:05 GMT
ajax-forms.min.js
www.coindesk.com/wp-content/plugins/mc4wp-premium/ajax-forms/assets/js/
3 KB
1 KB
Script
General
Full URL
https://www.coindesk.com/wp-content/plugins/mc4wp-premium/ajax-forms/assets/js/ajax-forms.min.js?ver=3.2.2
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
51f25991e05e3c80775885a43c8dcd1fb6b94f63b2f24f3b9bb9ff95d676c37a

Request headers

:path
/wp-content/plugins/mc4wp-premium/ajax-forms/assets/js/ajax-forms.min.js?ver=3.2.2
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Fri, 04 May 2018 19:46:10 GMT
server
cloudflare
etag
W/"5aecb882-b63"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=30
x-rocket-nginx-bypass
No
cf-ray
415dcb732dea2762-FRA
expires
Fri, 04 May 2018 20:43:05 GMT
jquery.modal.min.js
www.coindesk.com/wp-content/themes/coindesk2/js/src/components/
4 KB
2 KB
Script
General
Full URL
https://www.coindesk.com/wp-content/themes/coindesk2/js/src/components/jquery.modal.min.js
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
97a8a1411f12a3fef701586492decbae741e2e03928c077706b8bff13b335c4d

Request headers

:path
/wp-content/themes/coindesk2/js/src/components/jquery.modal.min.js
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Wed, 02 May 2018 19:11:23 GMT
server
cloudflare
etag
W/"5aea0d5b-10b9"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=2678400
x-rocket-nginx-bypass
No
cf-ray
415dcb732deb2762-FRA
expires
Mon, 04 Jun 2018 20:42:35 GMT
monetization.js
m.servedby-buysellads.com/
39 KB
12 KB
Script
General
Full URL
https://m.servedby-buysellads.com/monetization.js
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
108.161.189.78 Los Angeles, United States, ASN54104 (AS-STACKPATH - netDNA, US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
252f3d59911087e892d517db204a59a285b03f4f99f773924190db0d1e735c7e

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:35 GMT
Content-Encoding
gzip
Last-Modified
Fri, 13 Apr 2018 13:54:56 GMT
Server
NetDNA-cache/2.2
x-amz-request-id
2D636121DD6A89B6
ETag
W/"242a38c20a5a1a8b34635b53b704a81d"
Transfer-Encoding
chunked
X-Cache
HIT
Content-Type
application/javascript
Cache-Control
max-age=86400
Connection
keep-alive
x-amz-id-2
NtigyZTAOv/fHd5BtSM1VHzvig3mWlA77YQ0OYBYYPzLQrqtymglbsECum8uf1GewBCOisGfMqs=
Expires
Sat, 05 May 2018 20:42:35 GMT
fbevents.js
connect.facebook.net/en_US/
39 KB
12 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
SPDY
Server
185.60.216.19 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
112560223d7dcf6f78bd1f4f1271590233b6cd02adf7a10f896b0f628c2c4d24
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' fbstatic-a.akamaihd.net fbcdn-static-b-a.akamaihd.net *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* *.akamaihd.net wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' fbstatic-a.akamaihd.net fbcdn-static-b-a.akamaihd.net *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* *.akamaihd.net wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
12398
x-xss-protection
0
pragma
public
x-fb-debug
GaWND+BGzCluUZvxW0isOUxfeuTw3HDZDUPY/KwHZX1gvHMXV+Pzi92e49WTaHIWd0G1mrSI00glK8/8e0pg3Q==
x-frame-options
DENY
date
Fri, 04 May 2018 20:42:35 GMT
strict-transport-security
max-age=31536000; preload; includeSubDomains
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
expires
Sat, 01 Jan 2000 00:00:00 GMT
adsct
t.co/i/
43 B
170 B
Image
General
Full URL
https://t.co/i/adsct?p_id=Twitter&p_user_id=0&txn_id=l4l2u&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
SPDY
Server
104.244.42.133 San Francisco, United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=0
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block; report=https://twitter.com/i/xss_report

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
content-length
65
x-xss-protection
1; mode=block; report=https://twitter.com/i/xss_report
x-response-time
105
pragma
no-cache
last-modified
Fri, 04 May 2018 20:42:35 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=0
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
27b3a269a0ab31321420a3222ff7dcb8
x-transaction
00ad30410054cee2
expires
Tue, 31 Mar 1981 05:00:00 GMT
hotjar-257048.js
static.hotjar.com/c/
2 KB
1 KB
Script
General
Full URL
https://static.hotjar.com/c/hotjar-257048.js?sv=5
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
d25f74b604606ad02e1283cbe41950406101ea6684cb1fd4ffb0e62e9133dbfc

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:35 GMT
Content-Encoding
gzip
Last-Modified
Fri, 04 May 2018 20:42:14 GMT
ETag
"1525466534"
X-HW
1525466555.dop007.fr8.shc,1525466555.dop007.fr8.t,1525466555.cds020.fr8.c
Content-Type
application/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=60
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
894
loader.js
cdn.taboola.com/libtrc/coindesk1/
76 KB
15 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/coindesk1/loader.js
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
SPDY
Server
151.101.14.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
397ee35e420daa88b819e66ed7610c5435b237aad8b6a44b5593d67b82d99bef

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

x-amz-version-id
fro6_0nredDXH1G0jzXd1hy8DMMn.aSY
content-encoding
gzip
etag
"c0f37ad1eabdc4261d983bfa3787440d"
age
9
x-cache
HIT
status
200
x-amz-replication-status
COMPLETED
content-length
15069
x-amz-id-2
MUawEsr/x/ZWANb5VQUmotBvOeBSujAhb/nzoiKnaU5myFJ83ucsB7nzhkv77E9r/ghlh31osOg=
x-served-by
cache-fra19136-FRA
last-modified
Wed, 28 Feb 2018 19:25:28 GMT
server
AmazonS3
x-timer
S1525466555.469831,VS0,VE0
date
Fri, 04 May 2018 20:42:35 GMT
vary
Accept-Encoding
x-amz-request-id
C6A3F399890F025E
via
1.1 varnish
cache-control
private,max-age=14401
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
x-cache-hits
1
pubfig.min.js
a.pub.network/coindesk/
428 KB
99 KB
Script
General
Full URL
https://a.pub.network/coindesk/pubfig.min.js
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
SPDY
Server
104.27.106.38 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
a3bfec4b20f2998ad63f51fff503f4fa819fada2b6dc779319e15b34cdd08de1

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
cf-cache-status
HIT
x-guploader-uploadid
AEnB2UrZ_XEf99JOHO84cXAa5TZRlh2Y-joVi5RxNnAf7cLnGC_8uVRI1UhNe5Lo3bp1yTcq7xs5NQvCvrtOX2_iX2nxPKvgYQ
x-goog-storage-class
MULTI_REGIONAL
status
200
x-goog-metageneration
1
x-goog-stored-content-encoding
identity
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
last-modified
Wed, 02 May 2018 22:37:52 GMT
server
cloudflare
etag
W/"24ee3e68048ab2bddf3aae9fef6d1136"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=3pz3rA==, md5=JO4+aASKsr3fOq6f720RNg==
x-goog-generation
1525300672893359
content-type
application/javascript
cache-control
public, max-age=14400
x-goog-stored-content-length
437913
cf-ray
415dcb73eee564c3-FRA
expires
Sat, 05 May 2018 00:42:35 GMT
cx.js
scdn.cxense.com/
89 KB
22 KB
Script
General
Full URL
https://scdn.cxense.com/cx.js
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
23.45.97.170 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-97-170.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
6544118464d2655bd9a3345e619da3fad53260eebdd7888935224724168e8fd5

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:35 GMT
Content-Encoding
gzip
Last-Modified
Mon, 19 Mar 2018 13:08:28 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=3600
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
21995
Expires
Fri, 04 May 2018 21:42:35 GMT
shutterstock_776510485-860x430.jpg
media.coindesk.com/uploads/2018/03/
50 KB
50 KB
Image
General
Full URL
https://media.coindesk.com/uploads/2018/03/shutterstock_776510485-860x430.jpg
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
038dc048d0811728bc00febf3174c99e185e30c59f4ddf3a1b29a109253f23b7

Request headers

:path
/uploads/2018/03/shutterstock_776510485-860x430.jpg
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
media.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
cf-cache-status
REVALIDATED
x-amz-request-id
E5B9FC8A193CE83B
cf-polished
qual=85, origFmt=jpeg, origSize=61501
cf-ray
415dcb73be3c2762-FRA
status
200
content-disposition
inline; filename="shutterstock_776510485-860x430.webp"
content-length
50854
x-amz-id-2
ddTwt6+qmVOd5FP4ien5nG3vKyUOktaZ1AGDdoc4IzPGLEvuaHxn0ImSVnnVxp49K8rGjoNPjgc=
last-modified
Fri, 09 Mar 2018 16:54:48 GMT
server
cloudflare
etag
"912c7ca9c9fd7381aa810f8b51d4a42e"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept
x-amz-version-id
xXX23dvHF3YNS7rCR0LCCeBYhdtp.s9D
expires
Mon, 04 Jun 2018 20:42:35 GMT
cache-control
public, max-age=2678400
content-type
image/webp
cf-bgj
imgq:85
2B441C_2_0.woff
www.coindesk.com/wp-content/themes/coindesk2/fonts/proxima-nova/
68 KB
66 KB
Font
General
Full URL
https://www.coindesk.com/wp-content/themes/coindesk2/fonts/proxima-nova/2B441C_2_0.woff
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
633eab73be1bf88c4331e08a1658bbfc3d1f5a0643d4ca979f059d3f6a920261

Request headers

:path
/wp-content/themes/coindesk2/fonts/proxima-nova/2B441C_2_0.woff
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
origin
https://www.coindesk.com
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Fri, 23 Mar 2018 21:24:52 GMT
server
cloudflare
etag
W/"5ab570a4-10e6f"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/font-woff
status
200
cache-control
public, max-age=315360000
x-rocket-nginx-bypass
No
cf-ray
415dcb73ce422762-FRA
expires
Mon, 01 May 2028 20:42:35 GMT
entypo.woff
www.coindesk.com/wp-content/themes/coindesk2/fonts/entypo/
21 KB
22 KB
Font
General
Full URL
https://www.coindesk.com/wp-content/themes/coindesk2/fonts/entypo/entypo.woff
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
1c6f56ccfc44a5fad84f569f162ee2eb6139eeaeceee0f606e397e5fd091429b

Request headers

:path
/wp-content/themes/coindesk2/fonts/entypo/entypo.woff
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
origin
https://www.coindesk.com
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/wp-content/themes/coindesk2/css/build/styles.min.css?ver=1502020291
:scheme
https
:method
GET
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Referer
https://www.coindesk.com/wp-content/themes/coindesk2/css/build/styles.min.css?ver=1502020291
Origin
https://www.coindesk.com

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Fri, 23 Mar 2018 21:20:30 GMT
server
cloudflare
etag
W/"5ab56f9e-559c"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/font-woff
status
200
cache-control
public, max-age=315360000
x-rocket-nginx-bypass
No
cf-ray
415dcb73ce432762-FRA
expires
Mon, 01 May 2028 20:42:35 GMT
2B441C_3_0.woff
www.coindesk.com/wp-content/themes/coindesk2/fonts/proxima-nova/
60 KB
60 KB
Font
General
Full URL
https://www.coindesk.com/wp-content/themes/coindesk2/fonts/proxima-nova/2B441C_3_0.woff
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
fff8d96a275ff7d69717f67a670c473ff8fa0991b8227990c5ee67c4e5510c0b

Request headers

:path
/wp-content/themes/coindesk2/fonts/proxima-nova/2B441C_3_0.woff
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553
origin
https://www.coindesk.com
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Fri, 23 Mar 2018 21:20:30 GMT
server
cloudflare
etag
W/"5ab56f9e-f081"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/font-woff
status
200
cache-control
public, max-age=315360000
x-rocket-nginx-bypass
No
cf-ray
415dcb73ce442762-FRA
expires
Mon, 01 May 2028 20:42:35 GMT
truncated
/
35 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a3479b45d477eb8429f4be8a396050d90f894559a72068ec3593ec43f586d138

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/gif
abaf5ef641174a6bb2720e5b6d42f19e
secure.gravatar.com/avatar/
4 KB
4 KB
Image
General
Full URL
https://secure.gravatar.com/avatar/abaf5ef641174a6bb2720e5b6d42f19e?s=96&d=mm&r=g
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
SPDY
Server
192.0.73.2 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
6a714d54bbc2a9e34624be26cc768f7c86c12cca682ec2b00cb0979b620dde7a

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

x-nc
HIT fra 1
date
Fri, 04 May 2018 20:42:35 GMT
last-modified
Mon, 12 Mar 2018 20:21:40 GMT
server
nginx
source-age
1231
status
200
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=300
content-disposition
inline; filename="abaf5ef641174a6bb2720e5b6d42f19e.jpeg"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/abaf5ef641174a6bb2720e5b6d42f19e?s=96&d=mm&r=g>; rel="canonical"
content-length
3911
expires
Fri, 04 May 2018 20:47:35 GMT
2B441C_0_0.woff
www.coindesk.com/wp-content/themes/coindesk2/fonts/proxima-nova/
66 KB
65 KB
Font
General
Full URL
https://www.coindesk.com/wp-content/themes/coindesk2/fonts/proxima-nova/2B441C_0_0.woff
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c025417cf8a13a15ecc0a0249b4401cd8927d38b7f9c13171fe4b28e0a296780

Request headers

:path
/wp-content/themes/coindesk2/fonts/proxima-nova/2B441C_0_0.woff
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553; optimizelyEndUserId=oeu1525466555543r0.6808766353952749; optimizelySegments=%7B%7D; optimizelyBuckets=%7B%7D; optimizelyPendingLogEvents=%5B%5D
origin
https://www.coindesk.com
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Fri, 23 Mar 2018 21:29:11 GMT
server
cloudflare
etag
W/"5ab571a7-10954"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/font-woff
status
200
cache-control
public, max-age=315360000
x-rocket-nginx-bypass
No
cf-ray
415dcb744e862762-FRA
expires
Mon, 01 May 2028 20:42:35 GMT
fontawesome-webfont.woff2
www.coindesk.com/wp-content/themes/coindesk2/fonts/font-awesome/
55 KB
56 KB
Font
General
Full URL
https://www.coindesk.com/wp-content/themes/coindesk2/fonts/font-awesome/fontawesome-webfont.woff2?v=4.3.0
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
aadc3580d2b64ff5a7e6f1425587db4e8b033efcbf8f5c332ca52a5ed580c87c

Request headers

:path
/wp-content/themes/coindesk2/fonts/font-awesome/fontawesome-webfont.woff2?v=4.3.0
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553; optimizelyEndUserId=oeu1525466555543r0.6808766353952749; optimizelySegments=%7B%7D; optimizelyBuckets=%7B%7D; optimizelyPendingLogEvents=%5B%5D
origin
https://www.coindesk.com
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/wp-content/themes/coindesk2/css/build/styles.min.css?ver=1502020291
:scheme
https
:method
GET
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Referer
https://www.coindesk.com/wp-content/themes/coindesk2/css/build/styles.min.css?ver=1502020291
Origin
https://www.coindesk.com

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
cf-cache-status
HIT
last-modified
Fri, 23 Mar 2018 21:20:30 GMT
server
cloudflare
etag
"5ab56f9e-ddcc"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/octet-stream
status
200
cache-control
public, max-age=315360000
x-rocket-nginx-bypass
No
accept-ranges
bytes
cf-ray
415dcb744e872762-FRA
content-length
56780
expires
Mon, 01 May 2028 20:42:35 GMT
472218139648482
connect.facebook.net/signals/config/
55 KB
13 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/472218139648482?v=2.8.14&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
SPDY
Server
185.60.216.19 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
1f4494fe559d2f35fb305f0252e86f18135a335d527c01690e1056599633469b
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' fbstatic-a.akamaihd.net fbcdn-static-b-a.akamaihd.net *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* *.akamaihd.net wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' fbstatic-a.akamaihd.net fbcdn-static-b-a.akamaihd.net *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* *.akamaihd.net wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
13393
x-xss-protection
0
pragma
public
x-fb-debug
5Rs1Dt4lzdIBGiL0fhZpHjz2vtryjZjyawT90oKcRRnILMAM2JaPj8knoXegnh3/FAtAbUaVLRqVtRg4mt/QKA==
x-frame-options
DENY
date
Fri, 04 May 2018 20:42:35 GMT
strict-transport-security
max-age=31536000; preload; includeSubDomains
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
expires
Sat, 01 Jan 2000 00:00:00 GMT
modules-71c04ef46db1016ebed876c73b1e9723.js
script.hotjar.com/
373 KB
74 KB
Script
General
Full URL
https://script.hotjar.com/modules-71c04ef46db1016ebed876c73b1e9723.js
Requested by
Host: static.hotjar.com
URL: https://static.hotjar.com/c/hotjar-257048.js?sv=5
Protocol
HTTP/1.1
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
f347cf6dd4394aebcd556ffc0605e24bcff49a9f44c0de1f98b9868bde88d8da

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:35 GMT
Content-Encoding
gzip
Last-Modified
Thu, 03 May 2018 12:25:38 GMT
ETag
"1525350338"
X-HW
1525466555.dop009.fr8.shc,1525466555.dop009.fr8.t,1525466555.cds007.fr8.c
Content-Type
application/javascript
Cache-Control
max-age=31419812
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
75129
serve.js.php
trends.revcontent.com/
3 KB
2 KB
Script
General
Full URL
https://trends.revcontent.com/serve.js.php?w=81252&t=rc_95&c=1525466555604&width=1600&referer=
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
SPDY
Server
54.76.124.19 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-76-124-19.eu-west-1.compute.amazonaws.com
Software
Apache/2.4.18 (Ubuntu) /
Resource Hash
bbde6dff070d6ae924a045fad9636d06cdc44390a3026f05e228fe7e0244a535

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
content-encoding
gzip
server
Apache/2.4.18 (Ubuntu)
status
200
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
access-control-allow-origin
https://www.coindesk.com
access-control-allow-credentials
true
content-length
1343
522647
api.optmstr.com/v1/optin/22940/
22 KB
5 KB
XHR
General
Full URL
https://api.optmstr.com/v1/optin/22940/522647
Requested by
Host: a.optnmstr.com
URL: https://a.optnmstr.com/app/js/api.min.js?ver=1.2.2
Protocol
SPDY
Server
50.17.52.222 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-50-17-52-222.compute-1.amazonaws.com
Software
Pagely Gateway/1.5.1 /
Resource Hash
928451d5327241b93ca177e87c79e6692d957febec02cdb9b571e0d947a22592

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com

Response headers

x-optinmonster-campaign
riuyojisrlntqyiu
x-user-agent
standard
content-encoding
gzip
x-cache-config
0 0
server
Pagely Gateway/1.5.1
status
200
date
Fri, 04 May 2018 20:42:35 GMT
x-cache-status
HIT
vary
Accept-Encoding, User-Agent
content-type
application/json;charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-OptinMonster-Campaign
access-control-allow-headers
X-CSRF-Token
impl.296-127-RELEASE.js
cdn.taboola.com/libtrc/
375 KB
104 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/impl.296-127-RELEASE.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/coindesk1/loader.js
Protocol
SPDY
Server
151.101.14.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
b0a843088106b223ee7b8d4b4c30eb206597c213b975d29e346da146f4738b5f

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

x-amz-version-id
kl38_Au0O1EExdBYWHvSWUeUfOOTxjv8
content-encoding
gzip
etag
"0e426f797b8f198416df04795d3ab36b"
age
4
x-cache
HIT
status
200
x-amz-replication-status
COMPLETED
content-length
106569
x-amz-id-2
Jr0JT/EmSEEz7wVyg9Lfr/rPCOxYfR8jn8s4OpUUUIMy/xyunL55KSflESVtd15s6uM9re88vJY=
x-served-by
cache-fra19136-FRA
last-modified
Thu, 01 Mar 2018 17:56:15 GMT
server
AmazonS3
x-timer
S1525466556.651287,VS0,VE1
date
Fri, 04 May 2018 20:42:35 GMT
vary
Accept-Encoding
x-amz-request-id
FF6DD84D4B5ACEE1
via
1.1 varnish
cache-control
private,max-age=31536000
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
x-cache-hits
1
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/coindesk1/loader.js
Protocol
HTTP/1.1
Server
172.227.124.249 Cambridge, United States, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a172-227-124-249.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
76c393f564f53c19e795307e622edc8657a603f7a816c2646385697286d11313

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:35 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
902
Expires
Sat, 05 May 2018 20:42:35 GMT
spinner.gif
www.coindesk.com/wp-content/themes/coindesk2/images/icons/placeholders/
25 KB
25 KB
Image
General
Full URL
https://www.coindesk.com/wp-content/themes/coindesk2/images/icons/placeholders/spinner.gif
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
abc2326d728383f2a790381c04bbabefb31dc437586c5131f3105c5f1a18d1d2

Request headers

:path
/wp-content/themes/coindesk2/images/icons/placeholders/spinner.gif
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553; optimizelyEndUserId=oeu1525466555543r0.6808766353952749; optimizelySegments=%7B%7D; optimizelyBuckets=%7B%7D; optimizelyPendingLogEvents=%5B%5D
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/wp-content/themes/coindesk2/css/build/styles.min.css?ver=1502020291
:scheme
https
:method
GET
Referer
https://www.coindesk.com/wp-content/themes/coindesk2/css/build/styles.min.css?ver=1502020291
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
cf-cache-status
HIT
cf-polished
origFmt=gif, origSize=67674
status
200
x-rocket-nginx-bypass
No
content-disposition
inline; filename="spinner.webp"
cf-cached-on
Thu, 12 Apr 2018 06:45:05 GMT
content-length
25160
cf-bgj
imgq:85
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept, Accept-Encoding
content-type
image/webp
cache-control
public, max-age=315360000
accept-ranges
bytes
cf-ray
415dcb74ff0b2762-FRA
expires
Mon, 01 May 2028 20:42:35 GMT
/
www.facebook.com/tr/
44 B
252 B
Image
General
Full URL
https://www.facebook.com/tr/?id=472218139648482&ev=PageView&dl=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&rl=&if=false&ts=1525466555700&sw=1600&sh=1200&v=2.8.14&r=stable&ec=0&o=28&it=1525466555588
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
SPDY
Server
185.60.216.35 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:35 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Fri, 04 May 2018 20:42:35 GMT
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=7&c2=13739933&c3=20121515121&ns__t=1525466555703&ns_c=UTF-8&cv=3.1e&c8=Monero%20Mining%20Malware%20Attack%20Linked%20to%20Egyptian%20Telecom%20Giant%20-%20Coin...
  • https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1525466555703&ns_c=UTF-8&cv=3.1e&c8=Monero%20Mining%20Malware%20Attack%20Linked%20to%20Egyptian%20Telecom%20Giant%20-%20Coi...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1525466555703&ns_c=UTF-8&cv=3.1e&c8=Monero%20Mining%20Malware%20Attack%20Linked%20to%20Egyptian%20Telecom%20Giant%20-%20CoinDesk&c7=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&c9=
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
172.227.124.249 Cambridge, United States, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a172-227-124-249.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:35 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1525466555703&ns_c=UTF-8&cv=3.1e&c8=Monero%20Mining%20Malware%20Attack%20Linked%20to%20Egyptian%20Telecom%20Giant%20-%20CoinDesk&c7=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&c9=
Pragma
no-cache
Date
Fri, 04 May 2018 20:42:35 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
rep.gif
scomcluster.cxense.com/Repo/
43 B
459 B
Image
General
Full URL
https://scomcluster.cxense.com/Repo/rep.gif?ver=1&typ=pgv&rnd=jgsfeficm5ifv4es&acc=0&sid=1133981485060456098&loc=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&ref=&gol=&pgn=&ltm=1525466555652&new=1&arf=0&tzo=0&res=1600x1200&dpr=1&col=24&jav=0&bln=en-US&cks=jgsfefkc4wbn4s1g&ckp=jgsfefkess30x55f&glb=&chs=UTF-8&wsz=1600x1200&amo=1520812800&fls=0&flv=
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
178.63.12.208 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
de716.cxense.com
Software
Jetty(9.2.z-SNAPSHOT) /
Resource Hash
4e0705327480ad2323cb03d9c450ffcae4a98bf3a5382fa0c7882145ed620e49

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:35 GMT
P3P
policyref="http://www.cxense.com/w3c/p3p.xml", CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Server
Jetty(9.2.z-SNAPSHOT)
Content-Type
image/gif
Content-Length
43
Expires
Thu, 01 Jan 1970 00:00:00 GMT
publishertag.js
static.criteo.net/js/ld/
70 KB
20 KB
Script
General
Full URL
https://static.criteo.net/js/ld/publishertag.js
Requested by
Host: trends.revcontent.com
URL: https://trends.revcontent.com/serve.js.php?w=81252&t=rc_95&c=1525466555604&width=1600&referer=
Protocol
HTTP/1.1
Server
178.250.0.74 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
static.criteo.net
Software
nginx /
Resource Hash
6f6b695c5d0f84b35c8b950bf2f34a78278515f529411bf2c892cf21bc274035

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:35 GMT
Content-Encoding
gzip
Last-Modified
Wed, 19 Sep 2007 08:50:25 GMT
Server
nginx
ETag
W/"5abcfe2e-116c4"
Transfer-Encoding
chunked
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=86400, public
Connection
keep-alive
Timing-Allow-Origin
*
Expires
Sat, 05 May 2018 20:42:35 GMT
ga.js
ssl.google-analytics.com/
45 KB
17 KB
Script
General
Full URL
https://ssl.google-analytics.com/ga.js
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
SPDY
Server
216.58.214.40 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s09-in-f40.1e100.net
Software
Golfe2 /
Resource Hash
1259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 12 Apr 2018 18:13:11 GMT
server
Golfe2
age
1913
date
Fri, 04 May 2018 20:10:42 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
timing-allow-origin
*
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
17168
expires
Fri, 04 May 2018 22:10:42 GMT
p.js
d1z2jf7jlzjs58.cloudfront.net/
6 KB
3 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/p.js
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
52.222.163.55 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-163-55.fra54.r.cloudfront.net
Software
nginx /
Resource Hash
725913eab3460e2955a8ac4ec176f902c7d8d2db60757248b735cbf8698b0749

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Pragma
public
Date
Wed, 17 Jan 2018 23:34:48 GMT
Content-Encoding
gzip
Last-Modified
Fri, 07 Mar 2014 00:45:07 GMT
Server
nginx
Age
75551
ETag
W/"53191693-19c1"
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
application/x-javascript
Via
1.1 1eb4c4d1a01293f27e472fcc60f7102d.cloudfront.net (CloudFront)
Cache-Control
max-age=86400, public
Connection
keep-alive
X-Amz-Cf-Id
FdBH4nmpOhBFAogctMsav0Z0Ej1qOSs-H-Sqz6mfB4z6PQTB9UNpQw==
Expires
Thu, 18 Jan 2018 23:34:48 GMT
count.json
opensharecount.com/
113 B
481 B
XHR
General
Full URL
https://opensharecount.com/count.json?url=https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/wp-includes/js/jquery/jquery.js?ver=1.12.4
Protocol
SPDY
Server
104.27.165.180 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
b06b611d9fcb452442a10ea29eb1118da5789bfaa867077b8b00eda0a2afd4fd

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:37 GMT
content-encoding
gzip
cf-cache-status
MISS
server
cloudflare
status
200
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json; charset=ISO-8859-1
access-control-allow-origin
*
cache-control
public, max-age=3600
cf-ray
415dcb767ef164cf-FRA
expires
Fri, 04 May 2018 21:42:37 GMT
/
graph.facebook.com/
501 B
690 B
XHR
General
Full URL
https://graph.facebook.com/?id=https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/wp-includes/js/jquery/jquery.js?ver=1.12.4
Protocol
SPDY
Server
185.60.216.15 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
743f061af62d097f04c015520b516368c92c092bc6a436f60874016dc6cabded
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

strict-transport-security
max-age=15552000; preload
content-encoding
gzip
etag
"825671ff4e8e482c1b36969d226099edd8af0cbf"
status
200
x-fb-rev
3879056
content-length
328
pragma
no-cache
x-fb-debug
6s99jSLo9OcfEm49GtVwuULw9ud84o55j36PEEJGVr4v/lZNTH6/xorTlyXpfjsHGdsESv4lNHzjkLmvLbRzFw==
x-fb-trace-id
D8Xw/T36I98
date
Fri, 04 May 2018 20:42:35 GMT
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, no-cache, no-store, must-revalidate
facebook-api-version
v2.6
expires
Sat, 01 Jan 2000 00:00:00 GMT
share
www.linkedin.com/countserv/count/
184 B
1 KB
Script
General
Full URL
https://www.linkedin.com/countserv/count/share?callback=jQuery112405456171450758265_1525466555460&url=https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/&_=1525466555461
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/wp-includes/js/jquery/jquery.js?ver=1.12.4
Protocol
SPDY
Server
185.63.145.1 , United States, ASN14413 (LINKEDIN - LinkedIn Corporation, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
585387fc51b2db517e4956ba44d089d5b88606b520fdf7dc5f7e5211fe40e293
Security Headers
Name Value
Content-Security-Policy default-src *; connect-src 'self' static.licdn.com media.licdn.com static-exp1.licdn.com static-exp2.licdn.com media-exp1.licdn.com media-exp2.licdn.com https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' platform.linkedin.com spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'
Strict-Transport-Security max-age=2592000
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Accept-Encoding
x-li-uuid
5Ic5JL2LKxVALenSECsAAA==
server
Apache-Coyote/1.1
pragma
no-cache
x-li-pop
prod-efr5
x-frame-options
sameorigin
strict-transport-security
max-age=2592000
content-type
text/javascript;charset=UTF-8
x-xss-protection
1; mode=block
cache-control
no-cache, no-store
content-security-policy
default-src *; connect-src 'self' static.licdn.com media.licdn.com static-exp1.licdn.com static-exp2.licdn.com media-exp1.licdn.com media-exp2.licdn.com https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' platform.linkedin.com spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'
x-li-proto
http/2
x-li-fabric
prod-lva1
expires
Thu, 01 Jan 1970 00:00:00 GMT
google-plus
api.coindesk.com/social-data/
14 B
536 B
XHR
General
Full URL
https://api.coindesk.com/social-data/google-plus?url=https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/wp-includes/js/jquery/jquery.js?ver=1.12.4
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Fat-Free Framework
Resource Hash
4a601843d77421c9df16a0727474ce32c74ecf5d16f7617b754fe6cf99197ce7

Request headers

:path
/social-data/google-plus?url=https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
pragma
no-cache
origin
https://www.coindesk.com
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
application/json, text/javascript, */*; q=0.01
cache-control
no-cache
:authority
api.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:36 GMT
via
1.1 df874ca0e51df630ccc49eab9f1f7fb3.cloudfront.net (CloudFront)
cf-cache-status
MISS
x-powered-by
Fat-Free Framework
x-cache
Miss from cloudfront
status
200
content-encoding
gzip
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
*
cache-control
public, max-age=600
set-cookie
__cfduid=d1933f493789a8c3c46f7d5c5257eba431525466555; expires=Sat, 04-May-19 20:42:35 GMT; path=/; domain=.coindesk.com; HttpOnly
cf-ray
415dcb766d5026ea-FRA
x-amz-cf-id
YmmVYVWN0aqVEnhQLGONIhEd0nX_BNwEkvxB8I8xLMgr0kUjuFXSFQ==
expires
Fri, 04 May 2018 20:52:36 GMT
info.json
www.reddit.com/api/
10 KB
3 KB
XHR
General
Full URL
https://www.reddit.com/api/info.json?url=https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/wp-includes/js/jquery/jquery.js?ver=1.12.4
Protocol
SPDY
Server
151.101.13.140 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
snooserv /
Resource Hash
7ce50807dddb2d71d2518332aead6a3e6dec99eacd6d021aee1b243db5ab62b7
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
access-control-allow-origin
*
x-cache
MISS
status
200
vary
accept-encoding
content-length
1693
x-xss-protection
1; mode=block
x-ua-compatible
IE=edge
x-moose
majestic
expires
-1
server
snooserv
x-timer
S1525466556.902108,VS0,VE163
x-frame-options
SAMEORIGIN
x-served-by
cache-fra19139-FRA
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
application/json; charset=UTF-8
via
1.1 varnish
access-control-expose-headers
X-Moose
cache-control
private, s-maxage=0, max-age=0, must-revalidate, max-age=0, must-revalidate
accept-ranges
bytes
x-cache-hits
0
quant.js
secure.quantserve.com/
11 KB
5 KB
Script
General
Full URL
https://secure.quantserve.com/quant.js
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
95.172.94.34 , United Kingdom, ASN15570 (Internap European Autonomous System, GB),
Reverse DNS
pixel.quantserve.com
Software
QS /
Resource Hash
23a1a8123c5cfb9df1063c6cfbab2b7bb80fe645d6e7158baacbea022a81e2a0

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:35 GMT
Content-Encoding
gzip
Last-Modified
Fri, 04-May-2018 20:42:35 GMT
Server
QS
ETag
M0-8af1d7b9
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=604800
Connection
close
Content-Length
4786
Expires
Fri, 11 May 2018 20:42:35 GMT
measure.min.js
asset.pagefair.com/
11 KB
5 KB
Script
General
Full URL
https://asset.pagefair.com/measure.min.js
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
23.111.9.30 Phoenix, United States, ASN54104 (AS-STACKPATH - netDNA, US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
100770ceb57c9e10d5283206c1ae0b2b9653a0433021f48e9808751d3900c384

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:35 GMT
Content-Encoding
gzip
Last-Modified
Fri, 09 Mar 2018 17:19:01 GMT
Server
NetDNA-cache/2.2
x-amz-request-id
14A0608C3C409EAA
ETag
"0ebc88ed6f84ce3a1c2f7c4acedf2e13"
X-Cache
HIT
Content-Type
application/x-javascript
Cache-Control
max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
4825
x-amz-id-2
eJ+dIxuFeP9ZNKZOB91Ki4PsRS5URrtyQbo+O5F2c8iUVvjC0CXCxJya1rGEUrc/cMbnOPiYsGY=
Expires
Sat, 05 May 2018 20:42:35 GMT
ads.min.js
asset.pagefair.net/
0
500 B
Script
General
Full URL
https://asset.pagefair.net/ads.min.js
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
23.111.11.222 Phoenix, United States, ASN54104 (AS-STACKPATH - netDNA, US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:35 GMT
Content-Encoding
gzip
Last-Modified
Fri, 09 Mar 2018 17:19:02 GMT
Server
NetDNA-cache/2.2
x-amz-request-id
DCC9402D6D34FF41
ETag
"263dfc0b0e2e32b880781aa6f238a031"
X-Cache
HIT
Content-Type
application/x-javascript
Cache-Control
max-age=7200
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
31
x-amz-id-2
NADXK8da9fTw8dPk4wR+kYAtya15w28j+M0w3BWYb90sdXdf97Qj39QvWHNP8KovXx3MKZjlxBQ=
chartandheaderdata
api.coindesk.com/site/
2 KB
1011 B
XHR
General
Full URL
https://api.coindesk.com/site/chartandheaderdata?currency=BTC,ETH,BCH,LTC,XRP
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/wp-includes/js/jquery/jquery.js?ver=1.12.4
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Fat-Free Framework
Resource Hash
ac9a556fb4e342c9b123b4697b8db693cc6a2fa862bfd79a01ca65ae5f00292d

Request headers

:path
/site/chartandheaderdata?currency=BTC,ETH,BCH,LTC,XRP
pragma
no-cache
origin
https://www.coindesk.com
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
application/json, text/javascript, */*; q=0.01
cache-control
no-cache
:authority
api.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

cf-ray
415dcb768d7326ea-FRA
date
Fri, 04 May 2018 20:42:36 GMT
via
1.1 5d4ff22febf83d261f03aa068f5bdc04.cloudfront.net (CloudFront)
server
cloudflare
x-powered-by
Fat-Free Framework
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
status
200
x-cache
Miss from cloudfront
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=15
set-cookie
__cfduid=d1933f493789a8c3c46f7d5c5257eba431525466555; expires=Sat, 04-May-19 20:42:35 GMT; path=/; domain=.coindesk.com; HttpOnly
content-encoding
gzip
x-amz-cf-id
hBFWyA_Ha4Smad5NV1AuPzAdVlCfaOD3py7WPwox6B1PUXXf8pBpDQ==
expires
Fri, 04 May 2018 20:43:07 UTC
embed.js
coindesk.disqus.com/
63 KB
21 KB
Script
General
Full URL
https://coindesk.disqus.com/embed.js
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/wp-includes/js/jquery/jquery.js?ver=1.12.4
Protocol
HTTP/1.1
Server
151.101.12.134 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
openresty /
Resource Hash
be5c936a65e3f4495720472806fc600e342b31dc0bac2d71c58dc77f96f7f633
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:35 GMT
Content-Encoding
gzip
Server
openresty
Age
0
Vary
Accept-Encoding
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Cache-Control
private, max-age=60
X-Service
router
Strict-Transport-Security
max-age=300; includeSubdomains
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
Content-Length
21303
adsct
analytics.twitter.com/i/
31 B
250 B
Script
General
Full URL
https://analytics.twitter.com/i/adsct?p_id=Twitter&p_user_id=0&txn_id=l4l2u&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0&tpx_cb=twttr.conversion.loadPixels&tw_document_href=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F
Requested by
Host: static.ads-twitter.com
URL: https://static.ads-twitter.com/oct.js
Protocol
SPDY
Server
104.244.42.195 San Francisco, United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_o /
Resource Hash
df3e003cc30e9bdd0313100e8ee5d468070b4b34d11ad355f276a356d4b9c7bf
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block; report=https://twitter.com/i/xss_report

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=631138519
content-length
57
x-xss-protection
1; mode=block; report=https://twitter.com/i/xss_report
x-response-time
110
pragma
no-cache
last-modified
Fri, 04 May 2018 20:42:35 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
content-type
application/javascript;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
a2450c97bf56f1571a2bfcdcaa5e52c8
x-transaction
00bdfc51002823d7
expires
Tue, 31 Mar 1981 05:00:00 GMT
502478
api.optmstr.com/v1/optin/22940/
23 KB
5 KB
XHR
General
Full URL
https://api.optmstr.com/v1/optin/22940/502478
Requested by
Host: a.optnmstr.com
URL: https://a.optnmstr.com/app/js/api.min.js?ver=1.2.2
Protocol
SPDY
Server
50.17.52.222 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-50-17-52-222.compute-1.amazonaws.com
Software
Pagely Gateway/1.5.1 /
Resource Hash
918f5aa123be5debb0dd68180558234562bdf35ff0c5d00af1ee1c69f5d32554

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com

Response headers

x-optinmonster-campaign
pxgz0fukuxnyx4so
x-user-agent
standard
content-encoding
gzip
x-cache-config
0 0
server
Pagely Gateway/1.5.1
status
200
date
Fri, 04 May 2018 20:42:36 GMT
x-cache-status
HIT
vary
Accept-Encoding, User-Agent
content-type
application/json;charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-OptinMonster-Campaign
access-control-allow-headers
X-CSRF-Token
452771
api.optmstr.com/v1/optin/22940/
22 KB
5 KB
XHR
General
Full URL
https://api.optmstr.com/v1/optin/22940/452771
Requested by
Host: a.optnmstr.com
URL: https://a.optnmstr.com/app/js/api.min.js?ver=1.2.2
Protocol
SPDY
Server
50.17.52.222 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-50-17-52-222.compute-1.amazonaws.com
Software
Pagely Gateway/1.5.1 /
Resource Hash
374591f7fdc639cc33e6f6a262849cd7b2390e2a4d1a6ff7e834ee99e057e949

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com

Response headers

x-optinmonster-campaign
hzqnyrqde3q081ar
x-user-agent
standard
content-encoding
gzip
x-cache-config
0 0
server
Pagely Gateway/1.5.1
status
200
date
Fri, 04 May 2018 20:42:36 GMT
x-cache-status
HIT
vary
Accept-Encoding, User-Agent
content-type
application/json;charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-OptinMonster-Campaign
access-control-allow-headers
X-CSRF-Token
447784
api.optmstr.com/v1/optin/22940/
25 KB
6 KB
XHR
General
Full URL
https://api.optmstr.com/v1/optin/22940/447784
Requested by
Host: a.optnmstr.com
URL: https://a.optnmstr.com/app/js/api.min.js?ver=1.2.2
Protocol
SPDY
Server
50.17.52.222 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-50-17-52-222.compute-1.amazonaws.com
Software
Pagely Gateway/1.5.1 /
Resource Hash
0b84af68898b8c6f549054ddeb591c91d3dcb06d4c28c43b73284cf5d5cf239e

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com

Response headers

x-optinmonster-campaign
bkwa88yd18ys7pr4
x-user-agent
standard
content-encoding
gzip
x-cache-config
0 0
server
Pagely Gateway/1.5.1
status
200
date
Fri, 04 May 2018 20:42:36 GMT
x-cache-status
HIT
vary
Accept-Encoding, User-Agent
content-type
application/json;charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-OptinMonster-Campaign
access-control-allow-headers
X-CSRF-Token
449398
api.optmstr.com/v1/optin/22940/
24 KB
5 KB
XHR
General
Full URL
https://api.optmstr.com/v1/optin/22940/449398
Requested by
Host: a.optnmstr.com
URL: https://a.optnmstr.com/app/js/api.min.js?ver=1.2.2
Protocol
SPDY
Server
50.17.52.222 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-50-17-52-222.compute-1.amazonaws.com
Software
Pagely Gateway/1.5.1 /
Resource Hash
0083be40323a0364ed0fe2b9d67599056bd39cfcff43e84a1d11ded4c481e786

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com

Response headers

x-optinmonster-campaign
mrt6mt0mlp9ntn6y
x-user-agent
standard
content-encoding
gzip
x-cache-config
0 0
server
Pagely Gateway/1.5.1
status
200
date
Fri, 04 May 2018 20:42:36 GMT
x-cache-status
HIT
vary
Accept-Encoding, User-Agent
content-type
application/json;charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-OptinMonster-Campaign
access-control-allow-headers
X-CSRF-Token
ga-audiences
www.google.nl/ads/
Redirect Chain
  • https://ssl.google-analytics.com/r/__utm.gif?utmwv=5.7.2&utms=1&utmn=942204347&utmhn=www.coindesk.com&utmcs=UTF-8&utmsr=1600x1200&utmvp=1585x1200&utmsc=24-bit&utmul=en-us&utmje=0&utmfl=-&utmdt=Mone...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-40183560-1&cid=2033778555.1525466556&jid=371686947&_v=5.7.2&z=942204347
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-40183560-1&cid=2033778555.1525466556&jid=371686947&_v=5.7.2&z=942204347
  • https://www.google.nl/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-40183560-1&cid=2033778555.1525466556&jid=371686947&_v=5.7.2&z=942204347&slf_rd=1&random=3060456127
42 B
109 B
Image
General
Full URL
https://www.google.nl/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-40183560-1&cid=2033778555.1525466556&jid=371686947&_v=5.7.2&z=942204347&slf_rd=1&random=3060456127
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
SPDY
Server
216.58.207.67 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f3.1e100.net
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 04 May 2018 20:42:36 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Fri, 04 May 2018 20:42:36 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.nl/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-40183560-1&cid=2033778555.1525466556&jid=371686947&_v=5.7.2&z=942204347&slf_rd=1&random=3060456127
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
0
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
adsense.js
asset.pagefair.com/adimages/
0
541 B
Script
General
Full URL
https://asset.pagefair.com/adimages/adsense.js
Requested by
Host: asset.pagefair.com
URL: https://asset.pagefair.com/measure.min.js
Protocol
HTTP/1.1
Server
23.111.9.30 Phoenix, United States, ASN54104 (AS-STACKPATH - netDNA, US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:36 GMT
Content-Encoding
gzip
Last-Modified
Fri, 09 Mar 2018 17:19:01 GMT
Server
NetDNA-cache/2.2
x-amz-request-id
C1962990DC5A38F3
ETag
"8193452d6ae440ec23eff2e1559d5461"
X-Cache
HIT
Content-Type
application/x-javascript
Cache-Control
max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
31
x-amz-id-2
myCyKfnrMd9ED0NftgV7W0ylYNA+j8xoP8UTYfQhN7s0bHgw/AGjFVLGFNm/Gt85a70WveJ6eao=
Expires
Sat, 05 May 2018 20:42:36 GMT
textlink-ads.jpg
asset.pagefair.net/adimages/
518 B
688 B
Image
General
Full URL
https://asset.pagefair.net/adimages/textlink-ads.jpg
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
23.111.11.222 Phoenix, United States, ASN54104 (AS-STACKPATH - netDNA, US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
87bc265dda5e31597442c420def76eeadb5c516d016213a47f570c65d5558b72

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:36 GMT
Content-Encoding
gzip
Last-Modified
Fri, 09 Mar 2018 17:19:02 GMT
Server
NetDNA-cache/2.2
x-amz-request-id
FB60B130051AA0DF
ETag
"262857636d8f02be18171bed8e10c82b"
X-Cache
HIT
Content-Type
image/jpeg
Cache-Control
max-age=2592000
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
229
x-amz-id-2
loytceVjsoaB9vjXNA4OJRqqe4hDZ+ZBQPq0O6ok0g6VBGtoPjUku8EU/RbjYpCGPDXcC1aNWGQ=
textlink-ads.jpg
asset.pagefair.com/adimages/
518 B
726 B
Image
General
Full URL
https://asset.pagefair.com/adimages/textlink-ads.jpg
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
23.111.9.30 Phoenix, United States, ASN54104 (AS-STACKPATH - netDNA, US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
87bc265dda5e31597442c420def76eeadb5c516d016213a47f570c65d5558b72

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:36 GMT
Content-Encoding
gzip
Last-Modified
Fri, 09 Mar 2018 17:19:02 GMT
Server
NetDNA-cache/2.2
x-amz-request-id
4EDB647D6ADC7A08
ETag
"262857636d8f02be18171bed8e10c82b"
X-Cache
HIT
Content-Type
image/jpeg
Cache-Control
max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
229
x-amz-id-2
3sRD/xO0KD2E52X4oFTlJeUN437z5iqMo+Q5jqGq5nKRbWoBR0cbTLcKinU1O9NDAFwJTQVo6us=
Expires
Sat, 05 May 2018 20:42:36 GMT
lounge.188f59a1df04c219bf32da7f76545092.css
c.disquscdn.com/next/embed/styles/
94 KB
18 KB
Stylesheet
General
Full URL
https://c.disquscdn.com/next/embed/styles/lounge.188f59a1df04c219bf32da7f76545092.css
Requested by
Host: coindesk.disqus.com
URL: https://coindesk.disqus.com/embed.js
Protocol
SPDY
Server
104.16.78.166 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c5406bc2310423c35690e198c186dabb77b89d2efb03a35331ca3cc065d32900
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
18251
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Thu, 03 May 2018 17:40:39 GMT
server
cloudflare
fastly-debug-digest
c8ae1f2ae2d9f37e5a1cb0e448d6ccefaac80345f60c8ef7af530772696432e8
etag
"5aeb4997-474b"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
cf-ray
415dcb777c7e96d0-FRA
expires
Fri, 03 May 2019 22:42:04 GMT
common.bundle.037f55c32651d22255e90738c195e946.js
c.disquscdn.com/next/embed/
242 KB
81 KB
Script
General
Full URL
https://c.disquscdn.com/next/embed/common.bundle.037f55c32651d22255e90738c195e946.js
Requested by
Host: coindesk.disqus.com
URL: https://coindesk.disqus.com/embed.js
Protocol
SPDY
Server
104.16.78.166 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
472078fcb01f0a5909e5475c1f15983bafc83d355df273a51cc164923eda72e0
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
82696
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Tue, 10 Apr 2018 22:56:11 GMT
server
cloudflare
fastly-debug-digest
f43477c8668050c1411fc6814f7193bb1ed36e84a078ede3b371962739022b2e
etag
"5acd410b-14308"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
cf-ray
415dcb777c8096d0-FRA
expires
Thu, 11 Apr 2019 19:12:55 GMT
lounge.bundle.2fd6d206c06cd51584499fe8219aa635.js
c.disquscdn.com/next/embed/
344 KB
90 KB
Script
General
Full URL
https://c.disquscdn.com/next/embed/lounge.bundle.2fd6d206c06cd51584499fe8219aa635.js
Requested by
Host: coindesk.disqus.com
URL: https://coindesk.disqus.com/embed.js
Protocol
SPDY
Server
104.16.78.166 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
8bc059cac37e4143127a334098e50fbc0a7a9fa254d1a4fee60e4c754947bdd0
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
92310
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Thu, 03 May 2018 17:40:39 GMT
server
cloudflare
fastly-debug-digest
212aea95785313b1bd3f7418fa7e262e6d6179185da80ec421b2e03da6b0c7ab
etag
"5aeb4997-16896"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
cf-ray
415dcb777c8196d0-FRA
expires
Fri, 03 May 2019 22:42:04 GMT
config.js
disqus.com/next/
5 KB
3 KB
Script
General
Full URL
https://disqus.com/next/config.js
Requested by
Host: coindesk.disqus.com
URL: https://coindesk.disqus.com/embed.js
Protocol
HTTP/1.1
Server
151.101.192.134 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
733c7e2f4280b408efef7fe4506b713561325878598bdda243b93b123482a1a0
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:36 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Age
27
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
2114
X-XSS-Protection
1; mode=block
Server
nginx
X-Frame-Options
SAMEORIGIN
Strict-Transport-Security
max-age=300; includeSubdomains
Content-Type
application/javascript; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
public, stale-while-revalidate=300, s-stalewhilerevalidate=3600, max-age=60
Timing-Allow-Origin
*
rules-p-K_XxnWXzqCqGb.js
rules.quantcount.com/
3 B
338 B
Script
General
Full URL
https://rules.quantcount.com/rules-p-K_XxnWXzqCqGb.js
Requested by
Host: secure.quantserve.com
URL: https://secure.quantserve.com/quant.js
Protocol
SPDY
Server
52.222.168.128 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-128.fra54.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Wed, 21 Jun 2017 13:26:49 GMT
via
1.1 bd3e2233bf25337a89461c638cad13b9.cloudfront.net (CloudFront)
last-modified
Fri, 03 Mar 2017 23:52:35 GMT
server
AmazonS3
age
44
etag
"8a80554c91d9fca8acb82f023de02f11"
x-cache
Error from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=300
accept-ranges
bytes
content-length
3
x-amz-cf-id
uECUSwtW-kEZgid_3D8xE8_qFRWn1ZB7cc1LIGwSKb6f8F7CqxR1ZA==
cookie
c.pub.network/
36 B
440 B
XHR
General
Full URL
https://c.pub.network/cookie
Requested by
Host: a.pub.network
URL: https://a.pub.network/coindesk/pubfig.min.js
Protocol
HTTP/1.1
Server
104.155.128.21 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
21.128.155.104.bc.googleusercontent.com
Software
/
Resource Hash
7dcebe29911c91e38cd616db5b97132dbbec6e7c3c33c69847a06a8063fc714d

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com

Response headers

Access-Control-Allow-Origin
https://www.coindesk.com
Date
Fri, 04 May 2018 20:42:36 GMT
Access-Control-Allow-Credentials
true
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Content-Length
36
Vary
Origin
Content-Type
text/plain;charset=utf-8
inspectlet.js
a.pub.network/coindesk/
606 B
770 B
Script
General
Full URL
https://a.pub.network/coindesk/inspectlet.js
Requested by
Host: a.pub.network
URL: https://a.pub.network/coindesk/pubfig.min.js
Protocol
SPDY
Server
104.27.106.38 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
dadefe61782144d6938b24475f6d1cc1b5527816d9ca79d14682120d62c23b95

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:36 GMT
content-encoding
gzip
cf-cache-status
HIT
x-guploader-uploadid
AEnB2UqjYCfZR4nJZvQvPvSydWc_E1pl3r1fdDND6VbEM5syoAkrLshRRR-gLShfO2tCZDSue0_QGRLFSDoZJv_8pnWf1WfEWA
x-goog-storage-class
MULTI_REGIONAL
status
200
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
alt-svc
hq=":443"; ma=2592000; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="42,41,39,35"
last-modified
Mon, 23 Oct 2017 21:41:29 GMT
server
cloudflare
etag
W/"e96df2aec238835316bdf55779bef62b"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=ew69Yw==, md5=6W3yrsI4g1MWvfVXeb72Kw==
x-goog-generation
1508794890113923
content-type
application/javascript
cache-control
public, max-age=14400
x-goog-stored-content-length
606
cf-ray
415dcb77d99864c3-FRA
expires
Sat, 05 May 2018 00:42:36 GMT
keywee.min.js
dc8xl0ndzn2cb.cloudfront.net/js/coindeskcom/v0/
1 KB
1 KB
Script
General
Full URL
https://dc8xl0ndzn2cb.cloudfront.net/js/coindeskcom/v0/keywee.min.js
Requested by
Host: a.pub.network
URL: https://a.pub.network/coindesk/pubfig.min.js
Protocol
HTTP/1.1
Server
52.222.163.221 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-163-221.fra54.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
c3b1f44a9299edfac2726f1c2d1754efef04a3c83c3dbc8195db0acc27e3a3a2

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Tue, 31 Oct 2017 20:49:54 GMT
Content-Encoding
gzip
Last-Modified
Fri, 29 Sep 2017 20:13:45 GMT
Server
AmazonS3
Age
1283993
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 09f4ecc806a7e34780fd19a93b984724.cloudfront.net (CloudFront)
Cache-Control
max-age=2592000
Transfer-Encoding
chunked
Connection
keep-alive
X-Amz-Cf-Id
M1xz2c-etNTTjuX02afiOxTomyTSJ6kTRN4yPAFUXofheMl2VmRvdA==
100652X1574425.skimlinks.js
s.skimresources.com/js/
54 KB
19 KB
Script
General
Full URL
https://s.skimresources.com/js/100652X1574425.skimlinks.js
Requested by
Host: a.pub.network
URL: https://a.pub.network/coindesk/pubfig.min.js
Protocol
SPDY
Server
151.101.14.202 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Skimlinks V9.0 /
Resource Hash
2e2bef8d6efe56792a695f8238e130d57f8f5d2b8ebe455ff0f04d3619257ef4

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

x-amz-version-id
J_DiUiKCX3n5lj_4XpvkO3WyAllADk7J
content-encoding
gzip
server
Skimlinks V9.0
etag
"3e55a269b18502c5bda087e0aae34f97"
x-served-by
cache-fra19146-FRA
vary
Accept-Encoding
x-cache
HIT
p3p
policyref="https://s.skimresources.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
status
200
cache-control
public, max-age=3600
date
Fri, 04 May 2018 20:42:36 GMT
accept-ranges
bytes
content-type
application/octet-stream
content-length
19382
x-cache-hits
1
gpt.js
www.googletagservices.com/tag/js/
14 KB
6 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: a.pub.network
URL: https://a.pub.network/coindesk/pubfig.min.js
Protocol
SPDY
Server
172.217.22.34 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s16-in-f34.1e100.net
Software
sffe /
Resource Hash
e3ecb64ed7c80f6fffdb2961a6d5f522fd2de15cc43682a8fc29c0969f019a62
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"4 / 4 of 1000 / last-modified: 1525358774"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
hq="googleads.g.doubleclick.net:443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="43,42,41,39,35",hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
5740
x-xss-protection
1; mode=block
expires
Fri, 04 May 2018 20:42:36 GMT
prebid-analytics-1.8.0.js
a.pub.network/core/
168 KB
52 KB
Script
General
Full URL
https://a.pub.network/core/prebid-analytics-1.8.0.js
Requested by
Host: a.pub.network
URL: https://a.pub.network/coindesk/pubfig.min.js
Protocol
SPDY
Server
104.27.106.38 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
62961a092da5939e3db7bddfd32ac056dd1f5fbdf0cbdcf09983014679627463

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:36 GMT
content-encoding
gzip
cf-cache-status
HIT
x-guploader-uploadid
AEnB2UrgVlnbRDFLjK461Nqmu2uEkfvGqMwBYW9iOWv2RLhamHv0AkyE6Er_nenxY7ye0rNqUZdPQoPNm61UQT789un4DuB3zA
x-goog-storage-class
MULTI_REGIONAL
status
200
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
last-modified
Wed, 02 May 2018 20:17:36 GMT
server
cloudflare
etag
W/"659cce9beec02bda855b5c88fa561c50"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=lQnBNA==, md5=ZZzOm+7AK9qFW1yI+lYcUA==
x-goog-generation
1525292256200842
content-type
application/javascript
cache-control
public, max-age=14400
x-goog-stored-content-length
172352
cf-ray
415dcb77d99d64c3-FRA
expires
Sat, 05 May 2018 00:42:36 GMT
location
c.pub.network/
996 B
1 KB
XHR
General
Full URL
https://c.pub.network/location
Requested by
Host: a.pub.network
URL: https://a.pub.network/coindesk/pubfig.min.js
Protocol
HTTP/1.1
Server
104.155.128.21 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
21.128.155.104.bc.googleusercontent.com
Software
/
Resource Hash
d2b3c9f933cbbb98a1c35044fbf4b435a83be045012d14294461f519d8880b9c

Request headers

Accept
application/json, text/plain, */*
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Access-Control-Allow-Origin
https://www.coindesk.com
Date
Fri, 04 May 2018 20:42:36 GMT
Access-Control-Allow-Credentials
true
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Content-Length
996
Vary
Origin
Content-Type
application/json;charset=utf-8
null
d.pub.network/rfm/cookie/
3 B
238 B
XHR
General
Full URL
https://d.pub.network/rfm/cookie/null
Requested by
Host: a.pub.network
URL: https://a.pub.network/coindesk/pubfig.min.js
Protocol
HTTP/1.1
Server
35.226.96.66 Ann Arbor, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
66.96.226.35.bc.googleusercontent.com
Software
/
Resource Hash
8eb95bcbc154530931e15fc418c8b1fe991095671409552099ea1aa596999ede

Request headers

Accept
application/json, text/plain, */*
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Access-Control-Allow-Origin
https://www.coindesk.com
Date
Fri, 04 May 2018 20:42:36 GMT
Access-Control-Allow-Credentials
true
Vary
Origin
Transfer-Encoding
chunked
Content-Type
application/json
classification
d.pub.network/
3 B
238 B
XHR
General
Full URL
https://d.pub.network/classification?siteId=147&pageUrl=https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Requested by
Host: a.pub.network
URL: https://a.pub.network/coindesk/pubfig.min.js
Protocol
HTTP/1.1
Server
35.226.96.66 Ann Arbor, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
66.96.226.35.bc.googleusercontent.com
Software
/
Resource Hash
8eb95bcbc154530931e15fc418c8b1fe991095671409552099ea1aa596999ede

Request headers

Accept
application/json, text/plain, */*
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Access-Control-Allow-Origin
https://www.coindesk.com
Date
Fri, 04 May 2018 20:42:36 GMT
Access-Control-Allow-Credentials
true
Vary
Origin
Transfer-Encoding
chunked
Content-Type
application/json
cdb
bidder.criteo.com/
0
190 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=48&profileId=184&cb=65244068967
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.js
Protocol
HTTP/1.1
Server
178.250.2.89 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

Access-Control-Allow-Origin
https://www.coindesk.com
Date
Fri, 04 May 2018 20:42:36 GMT
Access-Control-Allow-Credentials
true
Server
Finatra
Vary
Origin
b
sb.scorecardresearch.com/
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b?c1=2&c2=23384447&ns__t=1525466556147&ns_c=UTF-8&cv=3.1e&c8=Monero%20Mining%20Malware%20Attack%20Linked%20to%20Egyptian%20Telecom%20Giant%20-%20CoinDesk&c7=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&c9=
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
172.227.124.249 Cambridge, United States, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a172-227-124-249.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:36 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
legacy-api.min.js
a.optmstr.com/app/js/
105 KB
33 KB
Script
General
Full URL
https://a.optmstr.com/app/js/legacy-api.min.js
Requested by
Host: a.optnmstr.com
URL: https://a.optnmstr.com/app/js/api.min.js?ver=1.2.2
Protocol
SPDY
Server
23.111.11.100 Phoenix, United States, ASN54104 (AS-STACKPATH - netDNA, US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
4560ec7248e5bf33455cd581896f0935c45c0320b47505ba77ab0573aeffcfd7

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:36 GMT
content-encoding
gzip
last-modified
Fri, 04 May 2018 19:57:54 GMT
server
NetDNA-cache/2.2
x-amz-request-id
47EEFDAA2CA9475D
etag
W/"f8cdff6a2d0599f41a72f52aafd798c5"
x-cache
HIT
content-type
application/javascript
status
200
cache-control
2592000
access-control-allow-origin
*
x-amz-id-2
S3alsG/1wNGj6F8mYYc9RUTUhdKBa6EEv+UrVaUuspQNQBJkzRbNdwVrhugUGc5jtiwulJEGeXA=
expires
Sat May 04 2019 19:57:52 GMT+0000 (UTC)
coindesk.com
srv-2018-05-04-20.config.parsely.com/config/
384 B
802 B
Script
General
Full URL
https://srv-2018-05-04-20.config.parsely.com/config/coindesk.com
Requested by
Host: d1z2jf7jlzjs58.cloudfront.net
URL: https://d1z2jf7jlzjs58.cloudfront.net/p.js
Protocol
HTTP/1.1
Server
52.4.118.65 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-4-118-65.compute-1.amazonaws.com
Software
/ Express
Resource Hash
9984b8d92e6636ffcb00f56db03fac2f1a262b5c05ef35b4787c043d3e20e324

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:36 GMT
Cache-Control
private, no-cache
ETag
W/"180-WxHL5jSubvyG2dTDm5/psQ"
Connection
keep-alive
X-Powered-By
Express
Content-Length
384
Content-Type
text/javascript; charset=utf-8
pixel;r=1051137032;rf=0;a=p-K_XxnWXzqCqGb;url=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F;fpan=1;fpa=P0-1076074650-1525466556350;ns=0;ce=1;cm=;...
pixel.quantserve.com/
35 B
479 B
Image
General
Full URL
https://pixel.quantserve.com/pixel;r=1051137032;rf=0;a=p-K_XxnWXzqCqGb;url=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F;fpan=1;fpa=P0-1076074650-1525466556350;ns=0;ce=1;cm=;ref=;je=0;sr=1600x1200x24;enc=n;dst=0;et=1525466556350;tzo=0;ogl=locale.en_US%2Ctype.article%2Ctitle.Monero%20Mining%20Malware%20Attack%20Linked%20to%20Egyptian%20Telecom%20Giant%20-%20CoinDesk%2Cdescription.Thousands%20of%20devices%20allegedly%20affected%20by%20malware%20across%20Egypt%252C%20Turkey%20and%20Syri%2Curl.https%3A%2F%2Fwww%252Ecoindesk%252Ecom%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom%2Csite_name.CoinDesk%2Cupdated_time.2018-03-12T05%3A03%3A03%2B00%3A00%2Cimage.https%3A%2F%2Fmedia%252Ecoindesk%252Ecom%2Fuploads%2F2018%2F03%2Fshutterstock_776510485%252Ejpg%2Cimage%3Asecure_url.https%3A%2F%2Fmedia%252Ecoindesk%252Ecom%2Fuploads%2F2018%2F03%2Fshutterstock_776510485%252Ejpg%2Cimage%3Awidth.5472%2Cimage%3Aheight.3648
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
35.156.182.21 Frankfurt, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-156-182-21.eu-central-1.compute.amazonaws.com
Software
QS /
Resource Hash
a0d3a0aff7dc3bf32d2176fc3dcda6e7aba2867c4f4d1f7af6355d2cfc6c44f8

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:36 GMT
Server
QS
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAo PSDo OUR SAMa IND COM NAV"
Cache-Control
private, no-cache, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
Fri, 04 Aug 1978 12:00:00 GMT
serve.js.php
trends.revcontent.com/
40 KB
13 KB
XHR
General
Full URL
https://trends.revcontent.com/serve.js.php?w=81252&t=rc_95&c=1525466555604&width=1600&referer=
Requested by
Host: trends.revcontent.com
URL: https://trends.revcontent.com/serve.js.php?w=81252&t=rc_95&c=1525466555604&width=1600&referer=
Protocol
SPDY
Server
54.76.124.19 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-76-124-19.eu-west-1.compute.amazonaws.com
Software
Apache/2.4.18 (Ubuntu) /
Resource Hash
3d7f2a326afc49a315fa256363db8f0d5c4a4a5be3a6b60d0c47a90d99f0485a

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

date
Fri, 04 May 2018 20:42:36 GMT
content-encoding
gzip
server
Apache/2.4.18 (Ubuntu)
status
200
p3p
CP="NOI DSP COR NID ADM DEV OUR NOR CNT"
access-control-allow-origin
https://www.coindesk.com
access-control-allow-credentials
true
content-type
text/javascript; charset=utf-8
/
www.facebook.com/tr/
44 B
150 B
Image
General
Full URL
https://www.facebook.com/tr/?id=472218139648482&ev=Microdata&dl=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&rl=&if=false&ts=1525466556392&cd[Schema.org]=%5B%7B%22type%22%3A%22https%3A%2F%2Fschema.org%2FOrganization%22%2C%22properties%22%3A%7B%22url%22%3A%22https%3A%2F%2Fwww.coindesk.com%2F%22%2C%22logo%22%3A%22%2Fwp-content%2Fthemes%2Fcoindesk2%2Fimages%2Flogo-coindesk-square-x2.png%22%7D%2C%22dimensions%22%3A%7B%22w%22%3A1248%2C%22h%22%3A0%7D%2C%22subscopes%22%3A%5B%5D%7D%5D&cd[OpenGraph]=%7B%22twitter%3Aaccount_id%22%3A%221418565129%22%2C%22article%3Apublished_time%22%3A%222018-03-12T06%3A00%3A44%2B00%3A00%22%2C%22article%3Amodified_time%22%3A%222018-03-12T05%3A03%3A03%2B00%3A00%22%2C%22og%3Alocale%22%3A%22en_US%22%2C%22og%3Atype%22%3A%22article%22%2C%22og%3Atitle%22%3A%22Monero%20Mining%20Malware%20Attack%20Linked%20to%20Egyptian%20Telecom%20Giant%20-%20CoinDesk%22%2C%22og%3Adescription%22%3A%22Thousands%20of%20devices%20allegedly%20affected%20by%20malware%20across%20Egypt%2C%20Turkey%20and%20Syria.%22%2C%22og%3Aurl%22%3A%22https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F%22%2C%22og%3Asite_name%22%3A%22CoinDesk%22%2C%22article%3Atag%22%3A%22cryptocurrency%20mining%22%2C%22article%3Asection%22%3A%22News%22%2C%22og%3Aupdated_time%22%3A%222018-03-12T05%3A03%3A03%2B00%3A00%22%2C%22og%3Aimage%22%3A%22https%3A%2F%2Fmedia.coindesk.com%2Fuploads%2F2018%2F03%2Fshutterstock_776510485.jpg%22%2C%22og%3Aimage%3Asecure_url%22%3A%22https%3A%2F%2Fmedia.coindesk.com%2Fuploads%2F2018%2F03%2Fshutterstock_776510485.jpg%22%2C%22og%3Aimage%3Awidth%22%3A%225472%22%2C%22og%3Aimage%3Aheight%22%3A%223648%22%7D&cd[Meta]=%7B%22title%22%3A%22Monero%20Mining%20Malware%20Attack%20Linked%20to%20Egyptian%20Telecom%20Giant%20-%20CoinDesk%22%7D&cd[DataLayer]=%5B%5D&sw=1600&sh=1200&v=2.8.14&r=stable&ec=1&o=28&it=1525466555588&es=automatic
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
SPDY
Server
185.60.216.35 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:36 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Fri, 04 May 2018 20:42:36 GMT
ConsentA.js
s.skimresources.com/js/GDPR/
11 KB
4 KB
Script
General
Full URL
https://s.skimresources.com/js/GDPR/ConsentA.js
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100652X1574425.skimlinks.js
Protocol
SPDY
Server
151.101.14.202 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Skimlinks V9.0 /
Resource Hash
afc77beb05dd73fd1bc0a62e87ebf315e368d588dfde2890b0162af215fe11cc

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

x-amz-version-id
xRqpM7SBYdarFhiycFrcASz2S7sJkFWD
content-encoding
gzip
server
Skimlinks V9.0
etag
"461a11a1e58457af47a2beeae1202556"
x-served-by
cache-fra19146-FRA
vary
Accept-Encoding
x-cache
HIT
p3p
policyref="https://s.skimresources.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
status
200
cache-control
public, max-age=3600
date
Fri, 04 May 2018 20:42:36 GMT
accept-ranges
bytes
content-type
application/javascript
content-length
3924
x-cache-hits
191
/
r.skimresources.com/api/
229 B
672 B
Script
General
Full URL
https://r.skimresources.com/api/?callback=skimlinksBeaconCallback&data=%7B%22pubcode%22%3A%22100652X1574425%22%2C%22domains%22%3A%5B%22jobs.coindesk.com%22%2C%22twitter.com%22%2C%22facebook.com%22%2C%22plus.google.com%22%2C%22linkedin.com%22%2C%22reddit.com%22%2C%22citizenlab.ca%22%2C%22books.google.com%22%2C%22forbes.com%22%2C%22washingtonpost.com%22%2C%22ooni.torproject.org%22%2C%22reuters.com%22%2C%22shutterstock.com%22%2C%22feeds.feedburner.com%22%5D%2C%22page%22%3A%22https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F%22%7D
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100652X1574425.skimlinks.js
Protocol
SPDY
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
b00f14805ce1ba7d29e7776a683b009f70f655be65a7e3c0fe512d0127f36682
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:36 GMT
via
1.1 google
x-content-type-options
nosniff
server
openresty/1.11.2.5
status
200
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://www.coindesk.com
access-control-allow-credentials
true
content-type
application/javascript
alt-svc
clear
px.gif
p.skimresources.com/
43 B
247 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=1&rn=0.24250025593566438
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
SPDY
Server
35.190.91.160 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
160.91.190.35.bc.googleusercontent.com
Software
Skimlinks Pixel 1.0 /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:36 GMT
via
1.1 google
server
Skimlinks Pixel 1.0
p3p
policyref="http://skimlinks.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
status
200
content-type
image/gif
alt-svc
clear
content-length
43
px.gif
p.skimresources.com/
43 B
105 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=2&rn=0.24250025593566438
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
SPDY
Server
35.190.91.160 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
160.91.190.35.bc.googleusercontent.com
Software
Skimlinks Pixel 1.0 /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:36 GMT
via
1.1 google
server
Skimlinks Pixel 1.0
p3p
policyref="http://skimlinks.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
status
200
content-type
image/gif
alt-svc
clear
content-length
43
688623564507970
connect.facebook.net/signals/config/
1 KB
928 B
Script
General
Full URL
https://connect.facebook.net/signals/config/688623564507970?v=2.8.14&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
SPDY
Server
185.60.216.19 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
d76cd6752a837303d03ffc2c3d5d6dfad650574fc2cb29fef3982830427b1c2d
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' fbstatic-a.akamaihd.net fbcdn-static-b-a.akamaihd.net *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* *.akamaihd.net wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' fbstatic-a.akamaihd.net fbcdn-static-b-a.akamaihd.net *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* *.akamaihd.net wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
778
x-xss-protection
0
pragma
public
x-fb-debug
Ocz0YsGyfMgq++BICGhU+M5szjqk1/FbELokr7DYyZBDFvBHY/XyyShr1yOIDf7ihB+eAJlIsxy4rCKcQ3k9Fw==
x-frame-options
DENY
date
Fri, 04 May 2018 20:42:36 GMT
strict-transport-security
max-age=31536000; preload; includeSubDomains
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
expires
Sat, 01 Jan 2000 00:00:00 GMT
sp.js
dc8xl0ndzn2cb.cloudfront.net/
65 KB
23 KB
Script
General
Full URL
https://dc8xl0ndzn2cb.cloudfront.net/sp.js
Requested by
Host: dc8xl0ndzn2cb.cloudfront.net
URL: https://dc8xl0ndzn2cb.cloudfront.net/js/coindeskcom/v0/keywee.min.js
Protocol
HTTP/1.1
Server
52.222.163.221 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-163-221.fra54.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
fddc7902ebf1de2a57a737a41bf2a5357fcd264246f1c58d5713a19a99a2019b

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Mon, 07 Nov 2016 02:57:16 GMT
Content-Encoding
gzip
Last-Modified
Sun, 26 Apr 2015 13:52:29 GMT
Server
AmazonS3
Age
17015788
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
application/x-javascript
Via
1.1 09f4ecc806a7e34780fd19a93b984724.cloudfront.net (CloudFront)
Cache-Control
max-age=315360000
Transfer-Encoding
chunked
Connection
keep-alive
X-Amz-Cf-Id
7-3sGijxy3ISobuMeuAHi3iX3ew-oXUayJ9ZNG3_dZaGPlHnS2oYWQ==
integrator.js
adservice.google.nl/adsid/
111 B
172 B
Script
General
Full URL
https://adservice.google.nl/adsid/integrator.js?domain=www.coindesk.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
SPDY
Server
172.217.21.226 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s13-in-f2.1e100.net
Software
cafe /
Resource Hash
207461e411e1ff6d6c5b0dd702d26031adb86de86ed3f571baa5a6fc498fc4b6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 04 May 2018 20:42:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
hq="googleads.g.doubleclick.net:443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="43,42,41,39,35",hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
105
x-xss-protection
1; mode=block
integrator.js
adservice.google.com/adsid/
111 B
172 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.coindesk.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
SPDY
Server
172.217.23.130 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f130.1e100.net
Software
cafe /
Resource Hash
207461e411e1ff6d6c5b0dd702d26031adb86de86ed3f571baa5a6fc498fc4b6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 04 May 2018 20:42:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
hq="googleads.g.doubleclick.net:443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="43,42,41,39,35",hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
105
x-xss-protection
1; mode=block
pubads_impl_199.js
securepubads.g.doubleclick.net/gpt/
162 KB
57 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_199.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
SPDY
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
1a427c31646c4dbcda43c5760eb5a224f5e695209d2bb6b1fb40229d6e5e1063
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 26 Apr 2018 00:30:19 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
58006
x-xss-protection
1; mode=block
expires
Fri, 04 May 2018 20:42:36 GMT
a.js
stats.pagefair.com/stats/page_view_event/CF571B77F23545C7/
25 B
726 B
XHR
General
Full URL
https://stats.pagefair.com/stats/page_view_event/CF571B77F23545C7/a.js?wl_div_hid_t0=0&div_hid_t0=0&s_blk=0&wl_i_blk=0&i_blk=0&is_ab=0&is_wl=1&new_monthly=1&new_daily=1&_=1525466555462
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/wp-includes/js/jquery/jquery.js?ver=1.12.4
Protocol
HTTP/1.1
Server
34.226.0.232 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-226-0-232.compute-1.amazonaws.com
Software
nginx /
Resource Hash
2671d72b96d6d9a1b8bbc1429048505ea6dbc3514daf22ab6dd6dfc8a70ce8d3

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:36 GMT
Server
nginx
Access-Control-Allow-Methods
GET, POST, OPTIONS
P3P
CP="NID DSP ALL COR"
Access-Control-Allow-Origin
https://www.coindesk.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/javascript
Access-Control-Allow-Headers
Authorization,Content-Type,Accept,Origin,User-Agent,Cache-Control,Keep-Alive,X-Requested-With,If-Modified-Since,X-CSRF-TOKEN
Content-Length
25
inspectlet.js
cdn.inspectlet.com/
199 KB
67 KB
Script
General
Full URL
https://cdn.inspectlet.com/inspectlet.js?wid=1048872546&r=423740
Requested by
Host: a.pub.network
URL: https://a.pub.network/coindesk/inspectlet.js
Protocol
SPDY
Server
104.20.183.9 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
6fbf2f97d3a8d6caa59fd4421417d84cb7e94342b3a68ea16b8056a7f3ec9300

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

cf-ray
415dcb79c85a646f-FRA
date
Fri, 04 May 2018 20:42:36 GMT
via
1.1 vegur
cf-cache-status
HIT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
s-maxage=60, max-age=14400
content-encoding
gzip
webfont.js
ajax.googleapis.com/ajax/libs/webfont/1.5.18/
16 KB
6 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/webfont/1.5.18/webfont.js
Requested by
Host: a.optmstr.com
URL: https://a.optmstr.com/app/js/legacy-api.min.js
Protocol
SPDY
Server
216.58.207.42 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s24-in-f10.1e100.net
Software
sffe /
Resource Hash
ce261eb163fcaee6953cedc35059732a133766ab824dc512bbdf9424d48601e4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Mon, 12 Feb 2018 14:55:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
7019253
status
200
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
6490
x-xss-protection
1; mode=block
last-modified
Tue, 20 Dec 2016 18:17:03 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 12 Feb 2019 14:55:03 GMT
/
www.facebook.com/tr/
44 B
104 B
Image
General
Full URL
https://www.facebook.com/tr/?id=688623564507970&ev=PageView&dl=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&rl=&if=false&ts=1525466556531&sw=1600&sh=1200&v=2.8.14&r=stable&ec=0&o=28&it=1525466555588
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
SPDY
Server
185.60.216.35 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:36 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Fri, 04 May 2018 20:42:36 GMT
apstag.js
c.amazon-adsystem.com/aax2/
44 KB
13 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: a.pub.network
URL: https://a.pub.network/coindesk/pubfig.min.js
Protocol
HTTP/1.1
Server
52.222.162.71 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-162-71.fra54.r.cloudfront.net
Software
Server /
Resource Hash
182dbe17e9b8a4666a3625fee302aded0186d7fd74d0d209c7e871ffd328b734

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:09:11 GMT
Content-Encoding
gzip
Server
Server
Age
2004
ETag
602208cbba73bcf156046815f9b16029
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 05e6fd312b38836c9def63a422bd7429.cloudfront.net (CloudFront)
Cache-Control
public, max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
X-Amz-Cf-Id
HE56tPAeinbu6dmRhEl8WC8bhnlfzVnM_5J0Afvx4V11eNjQo31T2g==
arj
freestar-d.openx.net/w/1.0/
Redirect Chain
  • https://freestar-d.openx.net/w/1.0/arj?ju=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&jr=&ch=UTF-8&res=1600x1200x24&ifr=false&tz=0&tws=1600x120...
  • https://freestar-d.openx.net/w/1.0/arj?cc=1&ju=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&jr=&ch=UTF-8&res=1600x1200x24&ifr=false&tz=0&tws=160...
0
-1 B
XHR
General
Full URL
https://freestar-d.openx.net/w/1.0/arj?cc=1&ju=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&jr=&ch=UTF-8&res=1600x1200x24&ifr=false&tz=0&tws=1600x1200&be=1&dddid=5bd0c978-32ac-4a4e-962c-1856e665dd38%2C8b2e4d68-c09d-4580-871f-437f9c84bf5a%2C572555ec-7e62-47a5-b801-6f5ecfde6577%2C82d44017-29ac-4a8f-b3ca-d34b8f7aa08b&nocache=1525466556550&auid=538583837%2C538583837%2C538583837%2C538583837&aus=728x90%7C160x600%2C300x250%2C300x600%7C300x250%2C300x600%7C728x90&bc=hb_pb_2.0.2&
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
173.241.240.220 New York, United States, ASN36089 (OPENX-AS1 - OPENX TECHNOLOGIES, INC., US),
Reverse DNS
ox-173-241-240-220.xa.dc.openx.org
Software
OXGW/16.19.2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Location
https://freestar-d.openx.net/w/1.0/arj?cc=1&ju=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&jr=&ch=UTF-8&res=1600x1200x24&ifr=false&tz=0&tws=1600x1200&be=1&dddid=5bd0c978-32ac-4a4e-962c-1856e665dd38%2C8b2e4d68-c09d-4580-871f-437f9c84bf5a%2C572555ec-7e62-47a5-b801-6f5ecfde6577%2C82d44017-29ac-4a8f-b3ca-d34b8f7aa08b&nocache=1525466556550&auid=538583837%2C538583837%2C538583837%2C538583837&aus=728x90%7C160x600%2C300x250%2C300x600%7C300x250%2C300x600%7C728x90&bc=hb_pb_2.0.2&
Date
Fri, 04 May 2018 20:42:36 GMT
Access-Control-Allow-Credentials
true
Server
OXGW/16.19.2
Access-Control-Allow-Origin
https://www.coindesk.com
Content-Length
0
P3P
CP="CUR ADM OUR NOR STA NID"

Redirect headers

Location
https://freestar-d.openx.net/w/1.0/arj?cc=1&ju=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&jr=&ch=UTF-8&res=1600x1200x24&ifr=false&tz=0&tws=1600x1200&be=1&dddid=5bd0c978-32ac-4a4e-962c-1856e665dd38%2C8b2e4d68-c09d-4580-871f-437f9c84bf5a%2C572555ec-7e62-47a5-b801-6f5ecfde6577%2C82d44017-29ac-4a8f-b3ca-d34b8f7aa08b&nocache=1525466556550&auid=538583837%2C538583837%2C538583837%2C538583837&aus=728x90%7C160x600%2C300x250%2C300x600%7C300x250%2C300x600%7C728x90&bc=hb_pb_2.0.2&
Date
Fri, 04 May 2018 20:42:36 GMT
Access-Control-Allow-Credentials
true
Server
OXGW/16.19.2
Access-Control-Allow-Origin
https://www.coindesk.com
Content-Length
0
P3P
CP="CUR ADM OUR NOR STA NID"
mvo
tag.1rx.io/rmp/65021/0/
0
803 B
XHR
General
Full URL
https://tag.1rx.io/rmp/65021/0/mvo?z=1r&domain=www.coindesk.com&url=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&title=Monero%20Mining%20Malware%20Attack%20Linked%20to%20Egyptian%20Telecom%20Giant%20-%20CoinDesk&dsh=1200&dsw=1600&tz=0&dtype=2&flash=0&hbv=1.8%2C1&imp=div-gpt-ad-728x90-ATF%2Cdiv-gpt-ad-300x250-ATF%2Cdiv-gpt-ad-300x250-BTF%2Cdiv-gpt-ad-728x90-BTF&w=728%2C160%7C300%7C300%2C300%7C300%2C728&h=90%2C600%7C250%7C600%2C250%7C600%2C90&floor=0%2C0%2C0%2C0&t=d%2Cd%2Cd%2Cd&
Requested by
Host: a.pub.network
URL: https://a.pub.network/core/prebid-analytics-1.8.0.js
Protocol
HTTP/1.1
Server
204.2.250.100 North Fort Myers, United States, ASN26120 (RHYTHMONE - RhythmOne, LLC, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:36 GMT
Server
nginx
P3P
policyref="http://tag.1rx.io:443/p3p/PolicyRef.xml", CP="NOI DSP COR CURa DEVa TAIa OUR SAMa NOR STP NAV STA LOC"
Access-Control-Allow-Origin
https://www.coindesk.com
Cache-Control
private, max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
1rsrv
ams-rmx-44.rhythmxchange.com
Keep-Alive
timeout=120
Expires
Sat, 01 Jan 2000 00:00:00 GMT
24
media.msg.dotomi.com/s2s/header/
0
421 B
XHR
General
Full URL
https://media.msg.dotomi.com/s2s/header/24
Requested by
Host: a.pub.network
URL: https://a.pub.network/core/prebid-analytics-1.8.0.js
Protocol
HTTP/1.1
Server
63.215.202.75 Amsterdam, Netherlands, ASN25751 (VALUECLICK - Conversant, Inc., US),
Reverse DNS
media-ams5.msg.dotomi.com
Software
Apache/2.2.31 (Unix) mod_apreq2-20090110/2.8.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Content-Type
text/plain

Response headers

Date
Fri, 04 May 2018 20:42:36 GMT
Server
Apache/2.2.31 (Unix) mod_apreq2-20090110/2.8.0
P3P
policyref="/w3c/p3p.xml", CP="NOI NID DEVo TAIo PSAo HISo OTPo OUR DELo BUS COM NAV INT DSP COR"
Access-Control-Allow-Origin
https://www.coindesk.com
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
text/plain
Keep-Alive
timeout=5, max=99994
Content-Length
0
prebid
ib.adnxs.com/ut/v3/
21 B
826 B
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: a.pub.network
URL: https://a.pub.network/core/prebid-analytics-1.8.0.js
Protocol
HTTP/1.1
Server
37.252.172.27 , European Union, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
153.bm-nginx-loadbalancer.mgmt.fra1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
aaaabde3f68c325033b37bb3ebff887e3b589b7137e717e96648a52221881429
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:38 GMT
X-Proxy-Origin
148.251.45.254; 148.251.45.254; 153.bm-nginx-loadbalancer.mgmt.fra1; *.adnxs.com; 37.252.172.24:80
AN-X-Request-Uuid
5de5d583-2c24-4a81-9a93-aca31200c7d6
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.coindesk.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
21
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
cdb
bidder.criteo.com/
0
209 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=48&profileId=207&av=4&cb=26935183056
Requested by
Host: a.pub.network
URL: https://a.pub.network/core/prebid-analytics-1.8.0.js
Protocol
HTTP/1.1
Server
178.250.2.89 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Content-Type
text/plain

Response headers

Access-Control-Allow-Origin
https://www.coindesk.com
Date
Fri, 04 May 2018 20:42:35 GMT
X-Cnection
close
Access-Control-Allow-Credentials
true
Server
Finatra
Vary
Origin
prebid
ib.adnxs.com/ut/v3/
21 B
827 B
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: a.pub.network
URL: https://a.pub.network/core/prebid-analytics-1.8.0.js
Protocol
HTTP/1.1
Server
37.252.172.42 , European Union, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
247.bm-nginx-loadbalancer.mgmt.fra1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
aaaabde3f68c325033b37bb3ebff887e3b589b7137e717e96648a52221881429
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:38 GMT
X-Proxy-Origin
148.251.45.254; 148.251.45.254; 247.bm-nginx-loadbalancer.mgmt.fra1; *.adnxs.com; 37.252.172.165:80
AN-X-Request-Uuid
004c2a1b-1304-42ba-bb5e-ae6acef03b8d
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.coindesk.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
21
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
prebid
ib.adnxs.com/ut/v3/
21 B
826 B
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: a.pub.network
URL: https://a.pub.network/core/prebid-analytics-1.8.0.js
Protocol
HTTP/1.1
Server
37.252.172.42 , European Union, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
247.bm-nginx-loadbalancer.mgmt.fra1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
aaaabde3f68c325033b37bb3ebff887e3b589b7137e717e96648a52221881429
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:38 GMT
X-Proxy-Origin
148.251.45.254; 148.251.45.254; 247.bm-nginx-loadbalancer.mgmt.fra1; *.adnxs.com; 37.252.172.22:80
AN-X-Request-Uuid
01357feb-f5c5-4b96-ab47-4cf6ce92de82
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.coindesk.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
21
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
bid
ap.lijit.com/rtb/
24 B
629 B
XHR
General
Full URL
https://ap.lijit.com/rtb/bid?src=prebid_prebid_1.8.0
Requested by
Host: a.pub.network
URL: https://a.pub.network/core/prebid-analytics-1.8.0.js
Protocol
HTTP/1.1
Server
5.153.8.144 Amsterdam, Netherlands, ASN36351 (SOFTLAYER - SoftLayer Technologies Inc., US),
Reverse DNS
90.08.9905.ip4.static.sl-reverse.com
Software
nginx /
Resource Hash
5d8538750056651f3b113ce84849373dbc39b563fcf1b1bb28a058e5afab239b

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Content-Type
text/plain

Response headers

Date
Fri, 04 May 2018 20:42:36 GMT
Content-Encoding
gzip
Server
nginx
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET, POST, DELETE, PUT
Content-Type
application/json
Access-Control-Allow-Origin
https://www.coindesk.com
Transfer-Encoding
chunked
X-Sovrn-Pod
ap1ams2
Access-Control-Allow-Headers
X-Requested-With, Content-Type
Access-Control-Allow-Credentials
true
Expires
Thu, 01 Jan 1970 00:00:00 GMT
ortb
bid.contextweb.com/header/
0
2 KB
XHR
General
Full URL
https://bid.contextweb.com/header/ortb
Requested by
Host: a.pub.network
URL: https://a.pub.network/core/prebid-analytics-1.8.0.js
Protocol
HTTP/1.1
Server
74.214.194.134 Amsterdam, Netherlands, ASN59940 (PULSEPOINT-EU, NL),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Content-Type
text/plain

Response headers

Date
Fri, 04 May 2018 20:42:36 GMT
Server
nginx
CWDL
22/139,22/139,22/139,22/139,22/139
Access-Control-Allow-Origin
https://www.coindesk.com
Access-Control-Expose-Headers
Access-Control-Allow-Origin
Access-Control-Allow-Credentials
true
Connection
keep-alive
CW-FEServer
ams-prts04.pulse.prod
CW-Server
ams-bid09
Content-Length
0
fastlane.json
fastlane.rubiconproject.com/a/api/
239 B
1 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=16924&site_id=151312&zone_id=718926&size_id=2&p_pos=btf&rp_floor=0.01&rp_secure=1&tk_flint=pbjs_lite_v1.8.0&x_source.tid=5bd0c978-32ac-4a4e-962c-1856e665dd38&p_screen_res=1600x1200&tk_user_key=&rand=0.9840286854011122&rf=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F
Requested by
Host: a.pub.network
URL: https://a.pub.network/core/prebid-analytics-1.8.0.js
Protocol
HTTP/1.1
Server
62.67.193.96 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
b295847bfc053ff49f89b10ffe9c79839fb8de062d7583ae75212bbe507d5f1c

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:36 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://www.coindesk.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=58
Content-Length
239
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
258 B
1 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=16924&site_id=151312&zone_id=718926&size_id=15&alt_size_ids=9%2C10&p_pos=btf&rp_floor=0.01&rp_secure=1&tk_flint=pbjs_lite_v1.8.0&x_source.tid=8b2e4d68-c09d-4580-871f-437f9c84bf5a&p_screen_res=1600x1200&tk_user_key=&rand=0.3228811438914956&rf=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F
Requested by
Host: a.pub.network
URL: https://a.pub.network/core/prebid-analytics-1.8.0.js
Protocol
HTTP/1.1
Server
62.67.193.96 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
5926391bdfc8b29f579ec54efc8b20b8b340a3f41569da050a2962500b7f5854

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:36 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://www.coindesk.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=42
Content-Length
258
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
260 B
1 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=16924&site_id=151312&zone_id=718926&size_id=15&alt_size_ids=10&p_pos=btf&rp_floor=0.01&rp_secure=1&tk_flint=pbjs_lite_v1.8.0&x_source.tid=572555ec-7e62-47a5-b801-6f5ecfde6577&p_screen_res=1600x1200&tk_user_key=&rand=0.35912869620856247&rf=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F
Requested by
Host: a.pub.network
URL: https://a.pub.network/core/prebid-analytics-1.8.0.js
Protocol
HTTP/1.1
Server
62.67.193.96 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
cfd3d75f7e99c5c38ddd4d1535f23ceb0e21f77b7d2e9f73ba213666fa033f24

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:36 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://www.coindesk.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=19
Content-Length
260
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
239 B
1 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=16924&site_id=151312&zone_id=718926&size_id=2&p_pos=btf&rp_floor=0.01&rp_secure=1&tk_flint=pbjs_lite_v1.8.0&x_source.tid=82d44017-29ac-4a8f-b3ca-d34b8f7aa08b&p_screen_res=1600x1200&tk_user_key=&rand=0.8458530543575651&rf=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F
Requested by
Host: a.pub.network
URL: https://a.pub.network/core/prebid-analytics-1.8.0.js
Protocol
HTTP/1.1
Server
62.67.193.96 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
d5d287b3492351df0e34d707152b9e973d9e8626253560cdf2f342ee3919e2b5

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:36 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://www.coindesk.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=11
Content-Length
239
Expires
Wed, 17 Sep 1975 21:32:10 GMT
placementbid.json
an.facebook.com/v2/
153 B
1 KB
XHR
General
Full URL
https://an.facebook.com/v2/placementbid.json?placementids[]=1013032832186924_1038653612958179&adformats[]=300x250&testmode=false&pageurl=&sdk[]=5.5.web&pbv=1.8.0
Requested by
Host: a.pub.network
URL: https://a.pub.network/core/prebid-analytics-1.8.0.js
Protocol
SPDY
Server
185.60.216.15 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
21edec13fe5497f33629313cb4e896220f04dd2fa1625f63ba31df613678607b
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' fbstatic-a.akamaihd.net fbcdn-static-b-a.akamaihd.net *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* *.akamaihd.net wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Content-Type
text/plain

Response headers

strict-transport-security
max-age=15552000; preload
content-encoding
gzip
x-fb-an-request-id
5763625148742168191
x-fb-an-errors
No user match (are cookies passed, and user logged in?)
status
200
x-xss-protection
0
pragma
no-cache
x-fb-debug
Z0nLn6+dEJ+R72coRzDa7v4lSMsMr8s1vsjhmdqJGUHNboWaUDYih5ASz/RFOee9KvcSc0dP6bW8q4Mic7NYzg==
x-frame-options
DENY
date
Fri, 04 May 2018 20:42:36 GMT
expect-ct
max-age=10, report-uri="http://reports.fb.com/expectct/"
vary
Accept-Encoding
content-type
text/javascript; charset=utf-8
access-control-allow-origin
https://www.coindesk.com
access-control-expose-headers
X-FB-AN-Request-ID, X-FB-AN-Errors, X-FB-AN-Bid-Count
cache-control
private, no-cache, no-store, must-revalidate
access-control-allow-credentials
true
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' fbstatic-a.akamaihd.net fbcdn-static-b-a.akamaihd.net *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* *.akamaihd.net wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
x-content-type-options
nosniff
expires
Sat, 01 Jan 2000 00:00:00 GMT
rev2.min.css
cdn.revcontent.com/build/css/
28 KB
7 KB
Stylesheet
General
Full URL
https://cdn.revcontent.com/build/css/rev2.min.css?v=c75d860790cfbd475402bedb463df89716d9b597
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
205.185.216.42 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
00f93e1c78bf6f2fc0ea203652c4b3ef24f4089c711a304e150d1db0d59191b5

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:36 GMT
Content-Encoding
gzip
Last-Modified
Thu, 03 May 2018 23:00:07 GMT
ETag
"1525388407"
X-HW
1525466556.dop009.fr8.shc,1525466556.dop009.fr8.t,1525466556.cds036.fr8.c
Content-Type
text/css
Cache-Control
max-age=22029
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
6520
rev2.min.js
cdn.revcontent.com/build/js/
223 KB
76 KB
Script
General
Full URL
https://cdn.revcontent.com/build/js/rev2.min.js?v=c75d860790cfbd475402bedb463df89716d9b597&del=//trends.revcontent.com/&lg=//cdn.revcontent.com/assets/img/rc-logo.png&ci=//cdn.revcontent.com/assets/img/icon-close.png&ab=//trends.revcontent.com/rc-about.php&ldr=//cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=//trends.revcontent.com/rc-interests.php
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
9070d7243d0be2988f0460e490537a87905ebc31a1a2c2844f9e14e217b05fda

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:36 GMT
Content-Encoding
gzip
Last-Modified
Thu, 03 May 2018 23:00:07 GMT
ETag
"1525388407"
X-HW
1525466556.dop007.fr8.shc,1525466556.dop007.fr8.t,1525466556.cds032.fr8.c
Content-Type
application/javascript
Cache-Control
max-age=9499
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
77111
rules-p-aD1qr93XuF6aC.js
rules.quantcount.com/
3 B
338 B
Script
General
Full URL
https://rules.quantcount.com/rules-p-aD1qr93XuF6aC.js
Requested by
Host: secure.quantserve.com
URL: https://secure.quantserve.com/quant.js
Protocol
SPDY
Server
52.222.168.128 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-128.fra54.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Mon, 12 Jun 2017 07:09:59 GMT
via
1.1 bd3e2233bf25337a89461c638cad13b9.cloudfront.net (CloudFront)
last-modified
Sat, 04 Mar 2017 20:46:24 GMT
server
AmazonS3
age
58112
etag
"8a80554c91d9fca8acb82f023de02f11"
x-cache
Hit from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=86400
accept-ranges
bytes
content-length
3
x-amz-cf-id
uPlJ5RO77i_MRUOX7ppsZrgaxZh9AdUc-38K0iLtPiSYcWpp_EW7RA==
pixel;r=1371956621;labels=Publishers.Publisher-74902%2CWidgets.Widget-81252;rf=3;a=p-aD1qr93XuF6aC;url=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant...
pixel.quantserve.com/
35 B
292 B
Image
General
Full URL
https://pixel.quantserve.com/pixel;r=1371956621;labels=Publishers.Publisher-74902%2CWidgets.Widget-81252;rf=3;a=p-aD1qr93XuF6aC;url=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F;fpan=0;fpa=P0-1076074650-1525466556350;ns=0;ce=1;cm=;ref=;je=0;sr=1600x1200x24;enc=n;dst=0;et=1525466556570;tzo=0;ogl=locale.en_US%2Ctype.article%2Ctitle.Monero%20Mining%20Malware%20Attack%20Linked%20to%20Egyptian%20Telecom%20Giant%20-%20CoinDesk%2Cdescription.Thousands%20of%20devices%20allegedly%20affected%20by%20malware%20across%20Egypt%252C%20Turkey%20and%20Syri%2Curl.https%3A%2F%2Fwww%252Ecoindesk%252Ecom%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom%2Csite_name.CoinDesk%2Cupdated_time.2018-03-12T05%3A03%3A03%2B00%3A00%2Cimage.https%3A%2F%2Fmedia%252Ecoindesk%252Ecom%2Fuploads%2F2018%2F03%2Fshutterstock_776510485%252Ejpg%2Cimage%3Asecure_url.https%3A%2F%2Fmedia%252Ecoindesk%252Ecom%2Fuploads%2F2018%2F03%2Fshutterstock_776510485%252Ejpg%2Cimage%3Awidth.5472%2Cimage%3Aheight.3648
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
35.156.182.21 Frankfurt, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-156-182-21.eu-central-1.compute.amazonaws.com
Software
QS /
Resource Hash
a0d3a0aff7dc3bf32d2176fc3dcda6e7aba2867c4f4d1f7af6355d2cfc6c44f8

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:36 GMT
Server
QS
Content-Type
image/gif
Cache-Control
private, no-cache, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
35
Expires
Fri, 04 Aug 1978 12:00:00 GMT
pixel_sync
cm.revcontent.com/
Redirect Chain
  • https://bttrack.com/pixel/cookiesync?source=0b0edea9-c9fe-4b9c-9bcd-a51022f2873f&publisherid=MGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM=&pushdata=109&secure=1
  • https://cm.revcontent.com/pixel_sync?bidder=109&bidder_uid=9cbe7c35-61c7-4e1f-91ac-18763ecc2e9b&exchange_uid=MGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM=
35 B
183 B
Image
General
Full URL
https://cm.revcontent.com/pixel_sync?bidder=109&bidder_uid=9cbe7c35-61c7-4e1f-91ac-18763ecc2e9b&exchange_uid=MGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM=
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
46.51.193.174 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-46-51-193-174.eu-west-1.compute.amazonaws.com
Software
/ Express
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:37 GMT
Connection
keep-alive
X-Powered-By
Express
Content-Length
35
Content-Type
image/gif

Redirect headers

X-ServerName
track002-dc3-va
Pragma
no-cache
Date
Fri, 04 May 2018 20:42:36 GMT
X-AspNetMvc-Version
5.2
Server
Microsoft-IIS/8.5
X-AspNet-Version
4.0.30319
P3P
CP="CAO DSP COR ADMo DEVo PSAo PSDo HISo IVAo IVDo OUR IND OTC"
Location
https://cm.revcontent.com/pixel_sync?bidder=109&bidder_uid=9cbe7c35-61c7-4e1f-91ac-18763ecc2e9b&exchange_uid=MGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM=
Cache-Control
private,no-cache
Content-Type
text/html; charset=utf-8
Content-Length
278
Expires
-1
pixel_sync
cm.revcontent.com/
Redirect Chain
  • http://ib.adnxs.com/getuid?https%3A%2F%2Fcm.revcontent.com%2Fpixel_sync%3Fbidder%3D115%26bidder_uid%3D%24UID%26exchange_uid%3DMGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM=&geo=35
  • http://ib.adnxs.com/bounce?%2Fgetuid%3Fhttps%253A%252F%252Fcm.revcontent.com%252Fpixel_sync%253Fbidder%253D115%2526bidder_uid%253D%2524UID%2526exchange_uid%253DMGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY...
  • https://cm.revcontent.com/pixel_sync?bidder=115&bidder_uid=4866744130209625172&exchange_uid=MGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM=&geo=35
35 B
183 B
Image
General
Full URL
https://cm.revcontent.com/pixel_sync?bidder=115&bidder_uid=4866744130209625172&exchange_uid=MGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM=&geo=35
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
54.77.248.219 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-77-248-219.eu-west-1.compute.amazonaws.com
Software
/ Express
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:36 GMT
Connection
keep-alive
X-Powered-By
Express
Content-Length
35
Content-Type
image/gif

Redirect headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:38 GMT
X-Proxy-Origin
148.251.45.254; 148.251.45.254; 153.bm-nginx-loadbalancer.mgmt.fra1; *.adnxs.com; 37.252.172.19:80
AN-X-Request-Uuid
57d79265-eca2-48eb-92a0-5f36f176d740
Server
nginx/1.13.4
Access-Control-Allow-Origin
*
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Location
https://cm.revcontent.com/pixel_sync?bidder=115&bidder_uid=4866744130209625172&exchange_uid=MGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM=&geo=35
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
pixel_sync
cm.revcontent.com/
Redirect Chain
  • https://b1sync.zemanta.com/usersync/revcontent/?puid=MGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM=&cb=https%3A%2F%2Fcm.revcontent.com%2Fpixel_sync%3Fexchange_uid%3DMGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MW...
  • https://stags.bluekai.com/site/23178?id=C2mS2cD_K02GLrkraTmt&redir=https%3A%2F%2Fb1sync.zemanta.com%2Fusersync%2Fbluekai%2Fcallback%2F%3Fd%3DNB2HI4DTHIXS6Y3NFZZGK5TDN5XHIZLOOQXGG33NF5YGS6DFNRPXG6LO...
  • https://stags.bluekai.com/site/23178?dt=0&r=1671903496&sig=3800964531&bkca=KJh5MqaryM9DHqIsMkUgTe9hxsvdhwjp/cS1TbDv/P/HCaRCemlUNb0Pf7ONM3frIqEm0sC/7ld/ByJ3rA05cKKUSEi5odU7wcd4aXkZxUM1X4lIzI+44TKhrX...
  • https://b1sync.zemanta.com/usersync/bluekai/callback/?d=NB2HI4DTHIXS6Y3NFZZGK5TDN5XHIZLOOQXGG33NF5YGS6DFNRPXG6LOMM7WE2LEMRSXEPJTEZRGSZDEMVZF65LJMQ6UGMTNKMZGGRC7JMYDER2MOJVXEYKUNV2CMZLYMNUGC3THMU6XE...
  • https://cm.revcontent.com/pixel_sync?bidder=3&bidder_uid=C2mS2cD_K02GLrkraTmt&exchange_uid=MGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM%3D
35 B
183 B
Image
General
Full URL
https://cm.revcontent.com/pixel_sync?bidder=3&bidder_uid=C2mS2cD_K02GLrkraTmt&exchange_uid=MGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM%3D
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
46.51.193.174 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-46-51-193-174.eu-west-1.compute.amazonaws.com
Software
/ Express
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:37 GMT
Connection
keep-alive
X-Powered-By
Express
Content-Length
35
Content-Type
image/gif

Redirect headers

pragma
no-cache
date
Fri, 04 May 2018 20:42:37 GMT
content-type
text/html; charset=utf-8
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
status
302
p3p
CP="We do not support P3P header."
location
https://cm.revcontent.com/pixel_sync?bidder=3&bidder_uid=C2mS2cD_K02GLrkraTmt&exchange_uid=MGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM%3D
cache-control
no-cache, no-store, must-revalidate
cf-ray
415dcb7e0ae4970c-FRA
expires
Thu, 01 Dec 1994 16:00:00 GMT
pixel_sync
cm.revcontent.com/
Redirect Chain
  • https://g.cwkuki.com/cs/D8f2l?u=MGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM=
  • https://cm.revcontent.com/pixel_sync?exchange_uid=MGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM%3D&bidder=112&bidder_uid=adcdfbf0-4fdb-11e8-9e78-0242ac110003
35 B
183 B
Image
General
Full URL
https://cm.revcontent.com/pixel_sync?exchange_uid=MGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM%3D&bidder=112&bidder_uid=adcdfbf0-4fdb-11e8-9e78-0242ac110003
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
46.51.193.174 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-46-51-193-174.eu-west-1.compute.amazonaws.com
Software
/ Express
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:36 GMT
Connection
keep-alive
X-Powered-By
Express
Content-Length
35
Content-Type
image/gif

Redirect headers

date
Fri, 04 May 2018 20:42:36 GMT
via
1.1 google
server
Cookie_Sync
status
302
location
https://cm.revcontent.com/pixel_sync?exchange_uid=MGVkYzM3ZjJlMDczZjE0ZmE1MTU0M2Y3MWIwY2FhODM%3D&bidder=112&bidder_uid=adcdfbf0-4fdb-11e8-9e78-0242ac110003
alt-svc
clear
content-length
0
x-application-context
application
sync
x.bidswitch.net/
Redirect Chain
  • https://x.bidswitch.net/sync?ssp=revcontent
  • https://x.bidswitch.net/ul_cb/sync?ssp=revcontent
  • https://a.company-target.com/bidswitch_match?bidswitch_ssp_id=revcontent&bsw_custom_parameter=86440d29-d871-4128-9c7d-13fd1a8a9125
  • https://a.company-target.com/ul_cb/bidswitch_match?bidswitch_ssp_id=revcontent&bsw_custom_parameter=86440d29-d871-4128-9c7d-13fd1a8a9125
  • https://x.bidswitch.net/sync?dsp_id=7&user_id=de609f41-c236-40f2-89bc-5abf047d97c7&user_group=3&ssp=revcontent&bsw_param=86440d29-d871-4128-9c7d-13fd1a8a9125
43 B
346 B
Image
General
Full URL
https://x.bidswitch.net/sync?dsp_id=7&user_id=de609f41-c236-40f2-89bc-5abf047d97c7&user_group=3&ssp=revcontent&bsw_param=86440d29-d871-4128-9c7d-13fd1a8a9125
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
18.196.109.185 Cambridge, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-196-109-185.eu-central-1.compute.amazonaws.com
Software
nginx/1.12.0 /
Resource Hash
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:37 GMT
Server
nginx/1.12.0
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Keep-Alive
timeout=10
Content-Length
43

Redirect headers

date
Fri, 04 May 2018 20:42:36 GMT
via
1.1 google
status
302
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
location
//x.bidswitch.net/sync?dsp_id=7&user_id=de609f41-c236-40f2-89bc-5abf047d97c7&user_group=3&ssp=revcontent&bsw_param=86440d29-d871-4128-9c7d-13fd1a8a9125
cache-control
no-cache, no-store, must-revalidate
alt-svc
clear
content-length
0
p-aD1qr93XuF6aC.gif
pixel.quantserve.com/pixel/
35 B
292 B
Image
General
Full URL
https://pixel.quantserve.com/pixel/p-aD1qr93XuF6aC.gif?labels=Publishers.Publisher-74902,Widgets.Widget-81252
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
35.156.182.21 Frankfurt, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-156-182-21.eu-central-1.compute.amazonaws.com
Software
QS /
Resource Hash
a0d3a0aff7dc3bf32d2176fc3dcda6e7aba2867c4f4d1f7af6355d2cfc6c44f8

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:36 GMT
Server
QS
Content-Type
image/gif
Cache-Control
private, no-cache, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
35
Expires
Fri, 04 Aug 1978 12:00:00 GMT
/
img.revcontent.com/
24 KB
24 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/15226901931763368228.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: scdn.cxense.com
URL: https://scdn.cxense.com/cx.js
Protocol
HTTP/1.1
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
c366451ae1db995d612f1b441ae989fa2bfea9101d5589e0c12621657ef9b4ba

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:36 GMT
Last-Modified
Mon, 02 Apr 2018 17:29:54 GMT
ETag
"1522690194"
X-HW
1525466556.dop007.fr8.shc,1525466556.dop007.fr8.t,1525466556.cds017.fr8.c
Content-Type
image/jpeg
Cache-Control
max-age=79268
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
24631
/
img.revcontent.com/
53 KB
54 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/15254154170213274754.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: scdn.cxense.com
URL: https://scdn.cxense.com/cx.js
Protocol
HTTP/1.1
Server
205.185.216.42 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
2a3c8bf5b850e456dfaf53a2e239351cb1221a6c37c9f24dedeb418121345e53

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:36 GMT
Last-Modified
Fri, 04 May 2018 06:30:18 GMT
ETag
"1525415418"
X-HW
1525466556.dop009.fr8.shc,1525466556.dop009.fr8.t,1525466556.cds039.fr8.c
Content-Type
image/jpeg
Cache-Control
max-age=76026
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
54614
/
img.revcontent.com/
39 KB
39 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/15244862650279840821.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: scdn.cxense.com
URL: https://scdn.cxense.com/cx.js
Protocol
HTTP/1.1
Server
205.185.216.42 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
7b831853b9c464915bb5dfc8bf93c7488276df88a6077643bba6916cdb9444d0

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:36 GMT
Last-Modified
Mon, 23 Apr 2018 12:24:26 GMT
ETag
"1524486266"
X-HW
1525466556.dop009.fr8.shc,1525466556.dop009.fr8.t,1525466556.cds027.fr8.c
Content-Type
image/jpeg
Cache-Control
max-age=65548
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
40017
/
img.revcontent.com/
47 KB
47 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/15179777751665486770.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: scdn.cxense.com
URL: https://scdn.cxense.com/cx.js
Protocol
HTTP/1.1
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
87e2ab189f17ff9c11ba1483bc2274ca74cd75eaf461e5be86014493a01f5982

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:36 GMT
Last-Modified
Wed, 07 Feb 2018 04:29:36 GMT
ETag
"1517977776"
X-HW
1525466556.dop007.fr8.shc,1525466556.dop007.fr8.t,1525466556.cds023.fr8.c
Content-Type
image/jpeg
Cache-Control
max-age=44748
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
47723
/
img.revcontent.com/
29 KB
29 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/15184503130888891861.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: scdn.cxense.com
URL: https://scdn.cxense.com/cx.js
Protocol
HTTP/1.1
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
a54ef5eb239365fcd9dd70b52827e1bfe061495256c66bae2ec6c656ade34bcd

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:36 GMT
Last-Modified
Mon, 12 Feb 2018 15:45:14 GMT
ETag
"1518450314"
X-HW
1525466556.dop007.fr8.shc,1525466556.dop007.fr8.t,1525466556.cds003.fr8.c
Content-Type
image/jpeg
Cache-Control
max-age=86400
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
29639
/
img.revcontent.com/
68 KB
68 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/15226855460355013665.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: scdn.cxense.com
URL: https://scdn.cxense.com/cx.js
Protocol
HTTP/1.1
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
27e97ef6fd765349d8a693863ae35793db4af4df8f16b7dbb5e27f4fafe7bcc2

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:36 GMT
Last-Modified
Mon, 02 Apr 2018 16:12:27 GMT
ETag
"1522685547"
X-HW
1525466556.dop007.fr8.shc,1525466556.dop007.fr8.t,1525466556.cds027.fr8.c
Content-Type
image/jpeg
Cache-Control
max-age=80943
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
69228
/
p.skimresources.com/ Frame D7AC
Redirect Chain
  • https://sync.crwdcntrl.net/map/c=7505/tp=SKIM/?https%3A%2F%2Fx.skimresources.com%2F%3Fprovider%3Dlotame%26skim_mapping%3Dtrue%26provider_id%3D%24%7Bprofile_id%7D
  • https://sync.crwdcntrl.net/map/ct=y/c=7505/tp=SKIM/?https%3A%2F%2Fx.skimresources.com%2F%3Fprovider%3Dlotame%26skim_mapping%3Dtrue%26provider_id%3D%24%7Bprofile_id%7D
  • https://x.skimresources.com/?provider=lotame&skim_mapping=true&provider_id=3a16b0cb121dd9d91b38bac5fe6081c3
  • https://p.skimresources.com/?provider_id=3a16b0cb121dd9d91b38bac5fe6081c3&skim_mapping=true
43 B
105 B
Image
General
Full URL
https://p.skimresources.com/?provider_id=3a16b0cb121dd9d91b38bac5fe6081c3&skim_mapping=true
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
SPDY
Server
35.190.91.160 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
160.91.190.35.bc.googleusercontent.com
Software
Skimlinks Pixel 1.0 /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:37 GMT
via
1.1 google
server
Skimlinks Pixel 1.0
p3p
policyref="http://skimlinks.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
status
200
content-type
image/gif
alt-svc
clear
content-length
43

Redirect headers

Location
https://p.skimresources.com?provider_id=3a16b0cb121dd9d91b38bac5fe6081c3&skim_mapping=true
Date
Fri, 04 May 2018 20:42:37 GMT
Server
TornadoServer/2.4.1
Connection
keep-alive
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length
0
Content-Type
text/html; charset=UTF-8
css
fonts.googleapis.com/
1 KB
444 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Montserrat%7COpen+Sans%3A300%2C400%2C600%2C800
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/webfont/1.5.18/webfont.js
Protocol
SPDY
Server
216.58.207.74 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f10.1e100.net
Software
ESF /
Resource Hash
f40488d098ab112c5e7094f9fbc79d5004a699b2c60592fa0a458fe547656593
Security Headers
Name Value
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:36 GMT
content-encoding
gzip
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400
timing-allow-origin
*
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
x-xss-protection
1; mode=block
expires
Fri, 04 May 2018 20:42:36 GMT
analytics.js
www.google-analytics.com/
34 KB
14 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
SPDY
Server
172.217.23.142 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f14.1e100.net
Software
Golfe2 /
Resource Hash
2218bbf47b340278b7b696dbe3af4eed89edffa709c19abd6747b18147c3a675
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 12 Apr 2018 18:13:11 GMT
server
Golfe2
age
7185
date
Fri, 04 May 2018 18:42:51 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
timing-allow-origin
*
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
14353
expires
Fri, 04 May 2018 20:42:51 GMT
b
sb.scorecardresearch.com/
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b?c1=7&c2=20310460&c3=12345&ns__t=1525466556714&ns_c=UTF-8&cv=3.1e&c8=Monero%20Mining%20Malware%20Attack%20Linked%20to%20Egyptian%20Telecom%20Giant%20-%20CoinDesk&c7=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&c9=
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
172.227.124.249 Cambridge, United States, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a172-227-124-249.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:36 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
i
pixel.keywee.co/
43 B
409 B
Image
General
Full URL
https://pixel.keywee.co/i?e=pv&url=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&page=Monero%20Mining%20Malware%20Attack%20Linked%20to%20Egyptian%20Telecom%20Giant%20-%20CoinDesk&tv=js-2.4.3&tna=cf&aid=578&p=web&tz=UTC&lang=en-US&cs=UTF-8&res=1600x1200&cd=24&cookie=1&eid=a486c8a2-0a10-463e-9aa2-f9ee1cbb6685&dtm=1525466556731&vp=1600x1200&ds=1585x4418&vid=1&duid=a48f8ccee742073e&fp=1907392054
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
107.22.194.189 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-107-22-194-189.compute-1.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
caa849b179befa2645a8e2c474d2e82a76777a3305315ece911013e8ee9a916c
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:37 GMT
X-Content-Type-Options
nosniff
Server
nginx/1.8.1
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
Status
200 OK
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
134240187179576
connect.facebook.net/signals/config/
55 KB
13 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/134240187179576?v=2.8.14&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
SPDY
Server
185.60.216.19 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
238640391c616568c3ec4cd37584c2ad41486ee8250330f247a0e3774660ae4d
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' fbstatic-a.akamaihd.net fbcdn-static-b-a.akamaihd.net *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* *.akamaihd.net wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' fbstatic-a.akamaihd.net fbcdn-static-b-a.akamaihd.net *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* *.akamaihd.net wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
13406
x-xss-protection
0
pragma
public
x-fb-debug
pSpXYpwDa0ys1Q3bOq1ZB1reo5hxdH6QBJVJrtkLP+juG6FNgE7YN6mh/bbPnH57vU0fpymwxjs704y14xiObw==
x-frame-options
DENY
date
Fri, 04 May 2018 20:42:36 GMT
strict-transport-security
max-age=31536000; preload; includeSubDomains
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
expires
Sat, 01 Jan 2000 00:00:00 GMT
arj
freestar-d.openx.net/w/1.0/
167 B
738 B
XHR
General
Full URL
https://freestar-d.openx.net/w/1.0/arj?cc=1&ju=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&jr=&ch=UTF-8&res=1600x1200x24&ifr=false&tz=0&tws=1600x1200&be=1&dddid=5bd0c978-32ac-4a4e-962c-1856e665dd38%2C8b2e4d68-c09d-4580-871f-437f9c84bf5a%2C572555ec-7e62-47a5-b801-6f5ecfde6577%2C82d44017-29ac-4a8f-b3ca-d34b8f7aa08b&nocache=1525466556550&auid=538583837%2C538583837%2C538583837%2C538583837&aus=728x90%7C160x600%2C300x250%2C300x600%7C300x250%2C300x600%7C728x90&bc=hb_pb_2.0.2&
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
173.241.240.220 New York, United States, ASN36089 (OPENX-AS1 - OPENX TECHNOLOGIES, INC., US),
Reverse DNS
ox-173-241-240-220.xa.dc.openx.org
Software
OXGW/16.19.2 /
Resource Hash
1ea6a149bfcf8c8feb075ac35cd7d2e98150edf7bf7cd759e5252d16aab6b0e2

Request headers

X-DevTools-Emulate-Network-Conditions-Client-Id
B06F7678DDAAB496D49F08BA0FC8AD38
Origin
https://www.coindesk.com
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:36 GMT
Content-Encoding
gzip
Server
OXGW/16.19.2
Vary
Accept
P3P
CP="CUR ADM OUR NOR STA NID"
Access-Control-Allow-Origin
https://www.coindesk.com
Cache-Control
private, max-age=0, no-cache
Access-Control-Allow-Credentials
true
Content-Type
application/json
Transfer-Encoding
chunked
Expires
Mon, 26 Jul 1997 05:00:00 GMT
bid
aax.amazon-adsystem.com/e/dtb/
136 B
456 B
XHR
General
Full URL
https://aax.amazon-adsystem.com/e/dtb/bid?src=600&pubid=0ab198dd-b265-462a-ae36-74e163ad6159&u=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&pid=876274241821525466556795&cb=9789161938751525466556797&ws=1600x1200&v=6.9.4&t=1200&slots=%5B%7B%22sd%22%3A%22div-gpt-ad-728x90-ATF%22%2C%22s%22%3A%5B%22728x90%22%5D%2C%22sn%22%3A%22%2F15184186%2Fcoindesk_728x90_970x90_320x50_ATF%22%7D%2C%7B%22sd%22%3A%22div-gpt-ad-300x250-ATF%22%2C%22s%22%3A%5B%22160x600%22%2C%22300x250%22%2C%22300x600%22%5D%2C%22sn%22%3A%22%2F15184186%2Fcoindesk_300x250_300x600_ATF%22%7D%2C%7B%22sd%22%3A%22div-gpt-ad-300x250-BTF%22%2C%22s%22%3A%5B%22300x250%22%2C%22300x600%22%5D%2C%22sn%22%3A%22%2F15184186%2Fcoindesk_300x250_BTF%22%7D%2C%7B%22sd%22%3A%22div-gpt-ad-728x90-BTF%22%2C%22s%22%3A%5B%22728x90%22%5D%2C%22sn%22%3A%22%2F15184186%2Fcoindesk_728x90_320x50_BTF%22%7D%5D&cfgv=0
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
HTTP/1.1
Server
52.94.218.7 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
Server /
Resource Hash
289e8077033608b6663426102e707b3f3ea07658f60b867719c01197bbff4ed7

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com

Response headers

Date
Fri, 04 May 2018 20:42:36 GMT
Content-Encoding
gzip
Server
Server
Vary
Accept-Encoding,User-Agent
Content-Type
text/javascript;charset=UTF-8
Access-Control-Allow-Origin
https://www.coindesk.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
141
/
www.facebook.com/tr/
44 B
104 B
Image
General
Full URL
https://www.facebook.com/tr/?id=134240187179576&ev=PageView&dl=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&rl=&if=false&ts=1525466556902&sw=1600&sh=1200&v=2.8.14&r=stable&ec=0&o=30&it=1525466555588
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
SPDY
Server
185.60.216.35 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:36 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Fri, 04 May 2018 20:42:36 GMT
/
www.facebook.com/tr/
44 B
104 B
Image
General
Full URL
https://www.facebook.com/tr/?id=472218139648482&ev=ViewContent&dl=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&rl=&if=false&ts=1525466556902&cd[freestar]=5d99b3c1-c202-4a85-9d0d-779a5ef13bd5&cd[client]=94&cd[site]=147&cd[page]=4ed8e7c40c0b05446bf8493986ce51d1&sw=1600&sh=1200&v=2.8.14&r=stable&ec=2&o=28&it=1525466555588
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
SPDY
Server
185.60.216.35 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:36 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Fri, 04 May 2018 20:42:36 GMT
/
www.facebook.com/tr/
44 B
104 B
Image
General
Full URL
https://www.facebook.com/tr/?id=688623564507970&ev=ViewContent&dl=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&rl=&if=false&ts=1525466556903&cd[freestar]=5d99b3c1-c202-4a85-9d0d-779a5ef13bd5&cd[client]=94&cd[site]=147&cd[page]=4ed8e7c40c0b05446bf8493986ce51d1&sw=1600&sh=1200&v=2.8.14&r=stable&ec=1&o=28&it=1525466555588
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
SPDY
Server
185.60.216.35 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:36 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Fri, 04 May 2018 20:42:36 GMT
/
www.facebook.com/tr/
44 B
104 B
Image
General
Full URL
https://www.facebook.com/tr/?id=134240187179576&ev=ViewContent&dl=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&rl=&if=false&ts=1525466556903&cd[freestar]=5d99b3c1-c202-4a85-9d0d-779a5ef13bd5&cd[client]=94&cd[site]=147&cd[page]=4ed8e7c40c0b05446bf8493986ce51d1&sw=1600&sh=1200&v=2.8.14&r=stable&ec=1&o=30&it=1525466555588
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
SPDY
Server
185.60.216.35 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:36 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Fri, 04 May 2018 20:42:36 GMT
ptrack-v1.0.3-engagedtime-slots.js
d1z2jf7jlzjs58.cloudfront.net/code/
34 KB
14 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/code/ptrack-v1.0.3-engagedtime-slots.js
Requested by
Host: d1z2jf7jlzjs58.cloudfront.net
URL: https://d1z2jf7jlzjs58.cloudfront.net/p.js
Protocol
HTTP/1.1
Server
52.222.163.55 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-163-55.fra54.r.cloudfront.net
Software
nginx /
Resource Hash
98ad0180e1ce93363cbd6dbb583083f306a73af8888a23887ba56aa711392cd6

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Pragma
public
Date
Tue, 13 Feb 2018 20:03:34 GMT
Content-Encoding
gzip
Last-Modified
Tue, 13 Feb 2018 19:48:02 GMT
Server
nginx
Age
6914342
ETag
W/"5a8340f2-89b8"
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
application/x-javascript
Via
1.1 1eb4c4d1a01293f27e472fcc60f7102d.cloudfront.net (CloudFront)
Cache-Control
max-age=315360000, public
Connection
keep-alive
X-Amz-Cf-Id
sDaL7ZdELxlEMNTHnzDeTkx9EslLm8W1H6B1m25GARh8fcmPLJsmpQ==
Expires
Thu, 31 Dec 2037 23:55:55 GMT
1048872546
hn.inspectlet.com/ginit/
30 B
455 B
XHR
General
Full URL
https://hn.inspectlet.com/ginit/1048872546
Requested by
Host: cdn.inspectlet.com
URL: https://cdn.inspectlet.com/inspectlet.js?wid=1048872546&r=423740
Protocol
HTTP/1.1
Server
52.44.144.199 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-44-144-199.compute-1.amazonaws.com
Software
Cowboy / Express
Resource Hash
e778aa41e011b353fa8d079ff316f8d1d7efc1b313aa4614c9f51672ac36098e

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Date
Fri, 04 May 2018 20:42:37 GMT
Via
1.1 vegur
Server
Cowboy
X-Powered-By
Express
Access-Control-Allow-Methods
GET, POST
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
https://www.coindesk.com
Cache-Control
no-cache
Access-Control-Allow-Credentials
true
Connection
keep-alive
Access-Control-Allow-Headers
X-Requested-With, Content-Type
Content-Length
30
ads
securepubads.g.doubleclick.net/gampad/
213 KB
54 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&correlator=4140734347744679&output=json_html&callback=googletag.impl.pubads.callbackProxy1&impl=fifs&adsid=NT&json_a=1&eid=21061799%2C21061865%2C21061149&vrg=199&sc=1&sfv=1-0-23&iu_parts=15184186%2Ccoindesk_728x90_970x90_320x50_ATF%2Ccoindesk_300x250_300x600_ATF%2Ccoindesk_300x250_BTF%2Ccoindesk_728x90_320x50_BTF%2Ccoindesk_1x1&enc_prev_ius=%2F0%2F1%2C%2F0%2F2%2C%2F0%2F3%2C%2F0%2F4%2C%2F0%2F5&prev_iu_szs=728x90%2C160x600%7C300x250%7C300x600%2C300x250%7C300x600%2C728x90%2C1x1&prev_scp=amznbid%3D2%26amznp%3D2%7Camznbid%3D2%26amznp%3D2%7Camznbid%3D2%26amznp%3D2%7Camznbid%3D2%26amznp%3D2%7C&eri=1&cust_params=user-agent%3DChrome%2520Headless%26coindesk_pid%3D318426%26template%3DArticle&cookie_enabled=1&bc=5&abxe=1&lmt=1525466555&dt=1525466556978&frm=20&biw=1585&bih=1200&oid=3&adxs=239%2C1153%2C1083%2C239%2C792&adys=600%2C470%2C1926%2C4101%2C0&adks=4148930914%2C376459447%2C1407742508%2C109362310%2C4139838163&gut=v2&ifi=1&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&dssz=118&icsg=35184388866032&std=16&vis=1&dmc=8&scr_x=0&scr_y=0&psz=860x90%7C360x-1%7C360x-1%7C740x90%7C1585x1200&ga_vid=2033778555.1525466556&ga_sid=1525466556&ga_hid=970681402&ga_fc=true
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_199.js
Protocol
SPDY
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
8c6d63046b09e5fa688b9a2ffa9ab10bc5117bb537a7169fef2f9ec2083ba014
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com

Response headers

date
Fri, 04 May 2018 20:42:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
55132
x-xss-protection
1; mode=block
google-lineitem-id
-1,-1,-1,-1,-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-1,-1,-1,-1,-2
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
https://www.coindesk.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_199.js
securepubads.g.doubleclick.net/gpt/
43 KB
16 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_199.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_199.js
Protocol
SPDY
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
3d26b8433950bf918452f3913de7e092c5ce0d586d3f0903aad5e4e33dbdab0f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 26 Apr 2018 00:30:19 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
16506
x-xss-protection
1; mode=block
expires
Fri, 04 May 2018 20:42:37 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-23/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-23/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_199.js
Protocol
SPDY
Server
172.217.23.129 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f1.1e100.net
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Purpose
prefetch
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Sun, 29 Apr 2018 19:53:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
434955
status
200
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
1479
x-xss-protection
1; mode=block
last-modified
Tue, 10 Apr 2018 14:51:09 GMT
server
sffe
vary
Accept-Encoding
content-type
text/html
cache-control
public, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Mon, 29 Apr 2019 19:53:22 GMT
/
srv-2018-05-04-20.pixel.parsely.com/plogger/
43 B
229 B
Image
General
Full URL
https://srv-2018-05-04-20.pixel.parsely.com/plogger/?rand=1525466557047&idsite=coindesk.com&url=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&urlref=&screen=1600x1200%7C1600x1200%7C24&data=%7B%22parsely_uuid%22%3A%228b6654e1-d76e-4377-b7cd-ef536edc798c%22%2C%22parsely_site_uuid%22%3A%222881068a-4927-4491-8399-7712e109f5b8%22%7D&sid=1&surl=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&sref=&sts=1525466557043&slts=0&title=Monero+Mining+Malware+Attack+Linked+to+Egyptian+Telecom+Giant+-+CoinDesk&date=Fri+May+04+2018+20%3A42%3A37+GMT%2B0000+(UTC)&action=pageview&u=2881068a-4927-4491-8399-7712e109f5b8
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
34.233.103.206 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-233-103-206.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:37 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
profile
api.parsely.com/v2/
345 B
660 B
Script
General
Full URL
https://api.parsely.com/v2/profile?apikey=coindesk.com&uuid=2881068a-4927-4491-8399-7712e109f5b8&url=https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/&callback=jQuery112405456171450758265_1525466555460&_=1525466555463
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/wp-includes/js/jquery/jquery.js?ver=1.12.4
Protocol
HTTP/1.1
Server
34.237.174.116 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-237-174-116.compute-1.amazonaws.com
Software
JSONP-Server /
Resource Hash
8c7ea5a71f484f16e7721363627a4ab07c6488439b23aec6c09947e1b65062d9

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:35 GMT
Via
1.1 varnish
Server
JSONP-Server
Age
0
transfer-encoding
chunked
X-Cache
MISS
Content-Type
application/json
Cache-Control
max-age=600
X-Varnish
187784496, 187784495
Connection
keep-alive
Accept-Ranges
bytes
link
t.skimresources.com/api/
22 B
526 B
XHR
General
Full URL
https://t.skimresources.com/api/link
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100652X1574425.skimlinks.js
Protocol
HTTP/1.1
Server
54.154.30.221 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-30-221.eu-west-1.compute.amazonaws.com
Software
nginx/1.12.2 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:37 GMT
X-Content-Type-Options
nosniff
Server
nginx/1.12.2
Access-Control-Allow-Methods
GET, POST
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store, no-cache, must-revalidate
Connection
keep-alive
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
Content-Length
22
track.php
t.skimresources.com/api/
22 B
526 B
XHR
General
Full URL
https://t.skimresources.com/api/track.php
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100652X1574425.skimlinks.js
Protocol
HTTP/1.1
Server
54.154.30.221 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-30-221.eu-west-1.compute.amazonaws.com
Software
nginx/1.12.2 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:37 GMT
X-Content-Type-Options
nosniff
Server
nginx/1.12.2
Access-Control-Allow-Methods
GET, POST
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store, no-cache, must-revalidate
Connection
keep-alive
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
Content-Length
22
osd.js
pagead2.googlesyndication.com/pagead/
67 KB
25 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/osd.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_199.js
Protocol
SPDY
Server
172.217.16.194 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
54b609b349536fea6b8ef7baa154182f9ce5d5a216b9c163d0d72b3d4f9bfd22
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:36:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
346
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
hq="googleads.g.doubleclick.net:443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="43,42,41,39,35",hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
25193
x-xss-protection
1; mode=block
server
cafe
etag
8026376403173667377
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=3600
timing-allow-origin
*
expires
Fri, 04 May 2018 21:36:51 GMT
/
www.facebook.com/tr/
44 B
127 B
Image
General
Full URL
https://www.facebook.com/tr/?id=134240187179576&ev=Microdata&dl=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&rl=&if=false&ts=1525466557422&cd[Schema.org]=%5B%7B%22type%22%3A%22https%3A%2F%2Fschema.org%2FOrganization%22%2C%22properties%22%3A%7B%22url%22%3A%22https%3A%2F%2Fwww.coindesk.com%2F%22%2C%22logo%22%3A%22%2Fwp-content%2Fthemes%2Fcoindesk2%2Fimages%2Flogo-coindesk-square-x2.png%22%7D%2C%22dimensions%22%3A%7B%22w%22%3A1248%2C%22h%22%3A0%7D%2C%22subscopes%22%3A%5B%5D%7D%5D&cd[OpenGraph]=%7B%22twitter%3Aaccount_id%22%3A%221418565129%22%2C%22article%3Apublished_time%22%3A%222018-03-12T06%3A00%3A44%2B00%3A00%22%2C%22article%3Amodified_time%22%3A%222018-03-12T05%3A03%3A03%2B00%3A00%22%2C%22og%3Alocale%22%3A%22en_US%22%2C%22og%3Atype%22%3A%22article%22%2C%22og%3Atitle%22%3A%22Monero%20Mining%20Malware%20Attack%20Linked%20to%20Egyptian%20Telecom%20Giant%20-%20CoinDesk%22%2C%22og%3Adescription%22%3A%22Thousands%20of%20devices%20allegedly%20affected%20by%20malware%20across%20Egypt%2C%20Turkey%20and%20Syria.%22%2C%22og%3Aurl%22%3A%22https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F%22%2C%22og%3Asite_name%22%3A%22CoinDesk%22%2C%22article%3Atag%22%3A%22cryptocurrency%20mining%22%2C%22article%3Asection%22%3A%22News%22%2C%22og%3Aupdated_time%22%3A%222018-03-12T05%3A03%3A03%2B00%3A00%22%2C%22og%3Aimage%22%3A%22https%3A%2F%2Fmedia.coindesk.com%2Fuploads%2F2018%2F03%2Fshutterstock_776510485.jpg%22%2C%22og%3Aimage%3Asecure_url%22%3A%22https%3A%2F%2Fmedia.coindesk.com%2Fuploads%2F2018%2F03%2Fshutterstock_776510485.jpg%22%2C%22og%3Aimage%3Awidth%22%3A%225472%22%2C%22og%3Aimage%3Aheight%22%3A%223648%22%7D&cd[Meta]=%7B%22title%22%3A%22Monero%20Mining%20Malware%20Attack%20Linked%20to%20Egyptian%20Telecom%20Giant%20-%20CoinDesk%22%7D&cd[DataLayer]=%5B%5D&sw=1600&sh=1200&v=2.8.14&r=stable&ec=2&o=30&it=1525466555588&es=automatic
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
SPDY
Server
185.60.216.35 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:37 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Fri, 04 May 2018 20:42:37 GMT
c
c.pub.network/
36 B
261 B
XHR
General
Full URL
https://c.pub.network/c
Requested by
Host: a.pub.network
URL: https://a.pub.network/coindesk/pubfig.min.js
Protocol
HTTP/1.1
Server
104.155.128.21 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
21.128.155.104.bc.googleusercontent.com
Software
/
Resource Hash
7dcebe29911c91e38cd616db5b97132dbbec6e7c3c33c69847a06a8063fc714d

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Access-Control-Allow-Origin
https://www.coindesk.com
Date
Fri, 04 May 2018 20:42:37 GMT
Access-Control-Allow-Credentials
true
Content-Length
36
Vary
Origin
Content-Type
text/plain;charset=utf-8
c
c.pub.network/
36 B
261 B
XHR
General
Full URL
https://c.pub.network/c
Requested by
Host: a.pub.network
URL: https://a.pub.network/coindesk/pubfig.min.js
Protocol
HTTP/1.1
Server
104.155.128.21 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
21.128.155.104.bc.googleusercontent.com
Software
/
Resource Hash
7dcebe29911c91e38cd616db5b97132dbbec6e7c3c33c69847a06a8063fc714d

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Access-Control-Allow-Origin
https://www.coindesk.com
Date
Fri, 04 May 2018 20:42:38 GMT
Access-Control-Allow-Credentials
true
Content-Length
36
Vary
Origin
Content-Type
text/plain;charset=utf-8
user.sync
media.msg.dotomi.com/w/
43 B
542 B
Image
General
Full URL
https://media.msg.dotomi.com/w/user.sync
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
63.215.202.75 Amsterdam, Netherlands, ASN25751 (VALUECLICK - Conversant, Inc., US),
Reverse DNS
media-ams5.msg.dotomi.com
Software
Apache/2.2.31 (Unix) mod_apreq2-20090110/2.8.0 /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:39 GMT
Server
Apache/2.2.31 (Unix) mod_apreq2-20090110/2.8.0
P3P
policyref="/w3c/p3p.xml", CP="NOI NID DEVo TAIo PSAo HISo OTPo OUR DELo BUS COM NAV INT DSP COR"
Cache-Control
no-cache
Connection
Keep-Alive
Content-Type
image/gif
Keep-Alive
timeout=5, max=99729
Content-Length
43
Expires
0
audit
hbevents.1rx.io/
0
318 B
Image
General
Full URL
https://hbevents.1rx.io/audit?bidder_version=1.0.0.0&doc_type=Prebid%20Audit&doc_version=1&framed=0&placement_codes=div-gpt-ad-728x90-ATF%2Cdiv-gpt-ad-300x250-ATF%2Cdiv-gpt-ad-300x250-BTF%2Cdiv-gpt-ad-728x90-BTF&placement_id=65021%2C65021%2C65021%2C65021&popped=0&prebid_version=1.8.0&response_ms=224&url=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
54.245.238.60 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-245-238-60.us-west-2.compute.amazonaws.com
Software
nginx/1.4.6 (Ubuntu) / PHP/5.5.9-1ubuntu4.21
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:40 GMT
Content-Encoding
gzip
Server
nginx/1.4.6 (Ubuntu)
X-Powered-By
PHP/5.5.9-1ubuntu4.21
Content-Type
text/html
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Length
20
Expires
0
prebid
bh.contextweb.com/visitormatch/
Redirect Chain
  • https://bh.contextweb.com/visitormatch/prebid
  • https://x.bidswitch.net/sync?ssp=pulsepoint
  • https://ads.programattik.com/sync?ssp=bidswitch&bidswitch_ssp_id=pulsepoint
  • https://ads.programattik.com/ul_cb/sync?ssp=bidswitch&bidswitch_ssp_id=pulsepoint
  • https://x.bidswitch.net/sync?dsp_id=156&expires=14&user_id=0085eceb-1e9e-4ff1-98ba-60cc25b73722&ssp=pulsepoint
  • https://bh.contextweb.com/bh/rtset?do=add&pid=556010&ev=86440d29-d871-4128-9c7d-13fd1a8a9125
  • https://bh.contextweb.com/visitormatch/prebid?s=1525466559964&r=1&v=556010
49 B
554 B
Image
General
Full URL
https://bh.contextweb.com/visitormatch/prebid?s=1525466559964&r=1&v=556010
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
151.101.12.166 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Jetty(9.4.6.v20170531) /
Resource Hash
d0409a1b73dab4e29dc40f92fb431fa9133baa23b4a1ffae4897f39068110e32

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:40 GMT
Via
1.1 varnish
Server
Jetty(9.4.6.v20170531)
Transfer-Encoding
chunked
Content-Language
en-US
P3P
policyref="/bh/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
Expires
-1
Cache-Control
private, max-age=0, no-cache, no-store
X-Cache-Hits
0
X-Cache
MISS
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
image/gif;charset=iso-8859-1
CW-Server
ams-bh01
X-Served-By
cache-fra19137-FRA

Redirect headers

Date
Fri, 04 May 2018 20:42:40 GMT
Via
1.1 varnish
Server
Jetty(9.4.6.v20170531)
P3P
policyref="/bh/w3c/p3p.xml", CP="NOI DSP COR NID CURa DEVa PSAa OUR BUS COM NAV INT"
Transfer-Encoding
chunked
X-Cache
MISS
Content-Language
en-US
Location
//bh.contextweb.com/visitormatch/prebid?s=1525466559964&r=1&v=556010
Expires
-1
Cache-Control
private, max-age=0, no-cache, no-store
X-Cache-Hits
0
Connection
keep-alive
Accept-Ranges
bytes
CW-Server
ams-bh01
X-Served-By
cache-fra19137-FRA
lazyload.1.0.5.min.js
www.coindesk.com/wp-content/plugins/wp-rocket/inc/front/js/
9 KB
3 KB
Script
General
Full URL
https://www.coindesk.com/wp-content/plugins/wp-rocket/inc/front/js/lazyload.1.0.5.min.js
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
f907f3f8ff6029715e2bee4d579f0a7c9c7c66361079feaa8a85b9829fb00c77

Request headers

:path
/wp-content/plugins/wp-rocket/inc/front/js/lazyload.1.0.5.min.js
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553; optimizelyEndUserId=oeu1525466555543r0.6808766353952749; optimizelySegments=%7B%7D; optimizelyBuckets=%7B%7D; optimizelyPendingLogEvents=%5B%5D; cX_S=jgsfefkc4wbn4s1g; cX_P=jgsfefkess30x55f; __utma=204792322.2033778555.1525466556.1525466556.1525466556.1; __utmc=204792322; __utmz=204792322.1525466556.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmt=1; __utmb=204792322.1.10.1525466556; _fssid=abcd747e-c7a9-4d11-a7b6-45ce9814bbd2; __qca=P0-1076074650-1525466556350; bm_last_load_status=NOT_BLOCKING; bm_monthly_unique=true; bm_daily_unique=true; _omappvp=Gobs2VUEtcHlgObgXNeDlcsajD1SJNCx7CAaY6TVcRMkveaxLsWOEU0oc4BlrJQTK0bUjXWXCXddgt2YZWQq2Ikea6oPTR1b; _omappvs=true; _sp_id.dcec=a48f8ccee742073e.1525466557.1.1525466557.1525466557; _sp_ses.dcec=*; _fsuid=5d99b3c1-c202-4a85-9d0d-779a5ef13bd5; bm_sample_frequency=100; __insp_wid=1048872546; __insp_slim=1525466556938; __insp_nv=true; __insp_targlpu=aHR0cHM6Ly93d3cuY29pbmRlc2suY29tL21vbmVyby1taW5pbmctbWFsd2FyZS1hdHRhY2stbGlua2VkLXRvLWVneXB0aWFuLXRlbGVjb20tZ2lhbnQv; __insp_targlpt=TW9uZXJvIE1pbmluZyBNYWx3YXJlIEF0dGFjayBMaW5rZWQgdG8gRWd5cHRpYW4gVGVsZWNvbSBHaWFudCAtIENvaW5EZXNr; _parsely_session={%22sid%22:1%2C%22surl%22:%22https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/%22%2C%22sref%22:%22%22%2C%22sts%22:1525466557043%2C%22slts%22:0}; _parsely_visitor={%22id%22:%222881068a-4927-4491-8399-7712e109f5b8%22%2C%22session_count%22:1%2C%22last_session_ts%22:1525466557043}; __gads=ID=e21eab6e4c2163b2:T=1525466557:S=ALNI_ManL532lluqPz2jlGy-GQAu8bua9g; __insp_norec_howoften=true; __insp_norec_sess=true
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:40 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Fri, 04 May 2018 19:48:20 GMT
server
cloudflare
etag
W/"5aecb904-25af"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=2678400
x-rocket-nginx-bypass
No
cf-ray
415dcb948c952762-FRA
expires
Mon, 04 Jun 2018 20:42:40 GMT
roundtrip.js
s.adroll.com/j/
27 KB
9 KB
Script
General
Full URL
https://s.adroll.com/j/roundtrip.js
Requested by
Host: www.coindesk.com
URL: https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Protocol
HTTP/1.1
Server
2.18.233.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
7b66f192a25e07c93d7627c3d5cabe31e8931de9ee26cd59c8ea33f16fc1b5b2

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

x-amz-version-id
.s8_i4vHu.TAyvZkTDa2kCph36ZeIdz2
Content-Encoding
gzip
ETag
"0b723bd967212f43c2bfd4ec6d7ed686"
x-amz-request-id
9881336F9F6B1D1C
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
8807
x-amz-id-2
sPlVh0sH+ITnPxZKg6vq5F6UO4/mK0i+HfXBzGi73cqQaoDL7gFeeCnEjLyrfYyNpHe1wMWoHio=
Last-Modified
Wed, 02 May 2018 13:46:47 GMT
Server
AmazonS3
Date
Fri, 04 May 2018 20:42:40 GMT
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=300, must-revalidate
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
QICTVBHGAZFHLBW3CA2WBJ.js
s.adroll.com/pixel/WA6JJB5VTNEZPKT5KCWPAP/K6WN3BMWOBHDNG6TEQF5J7/
Redirect Chain
  • https://d.adroll.com/pixel/WA6JJB5VTNEZPKT5KCWPAP/K6WN3BMWOBHDNG6TEQF5J7?pv=79208505129.24046&cookie=&adroll_s_ref=&keyw=&arrfrr=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked...
  • https://s.adroll.com/pixel/WA6JJB5VTNEZPKT5KCWPAP/K6WN3BMWOBHDNG6TEQF5J7/QICTVBHGAZFHLBW3CA2WBJ.js
4 KB
2 KB
Script
General
Full URL
https://s.adroll.com/pixel/WA6JJB5VTNEZPKT5KCWPAP/K6WN3BMWOBHDNG6TEQF5J7/QICTVBHGAZFHLBW3CA2WBJ.js
Protocol
HTTP/1.1
Server
2.18.233.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
96daab9c523968bfa13b40f16775512e8fd301320f16e6a4049ffca8837f7ac2

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

x-amz-version-id
M9d9QN_b6reUia9J2vRZgGWIkSetvXXV
Content-Encoding
gzip
ETag
"534de1662d26d3a1538a49b4d30155cc"
x-amz-request-id
52FEE42F949F0A84
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
1376
x-amz-id-2
giPmDlp6iOMff/AstXcJx3MPFUTsTMzkGICMKmxjalBJt4URzycPEXZyJPgRb16Eg3wrxEL7+TE=
Last-Modified
Wed, 04 Apr 2018 09:33:45 GMT
Server
AmazonS3
Date
Fri, 04 May 2018 20:42:40 GMT
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Content-Type
text/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=300, must-revalidate
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*

Redirect headers

Date
Fri, 04 May 2018 20:42:40 GMT
X-Segment-Display-Name
P3P
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
Connection
keep-alive
Content-Length
0
Pragma
no-cache
X-Conversion-Value
0.0
Server
nginx/1.12.1
X-Rule
*
X-Segment-Eid
QICTVBHGAZFHLBW3CA2WBJ
Location
https://s.adroll.com/pixel/WA6JJB5VTNEZPKT5KCWPAP/K6WN3BMWOBHDNG6TEQF5J7/QICTVBHGAZFHLBW3CA2WBJ.js
Cache-Control
no-store, no-cache, must-revalidate
X-Pixel-Eid
K6WN3BMWOBHDNG6TEQF5J7
X-Segment-Name
*
X-Advertisable-Eid
WA6JJB5VTNEZPKT5KCWPAP
X-Conversion-Currency
Screen-Shot-2018-05-04-at-6.57.17-AM-100x95.png
media.coindesk.com/uploads/2018/05/
13 KB
13 KB
Image
General
Full URL
https://media.coindesk.com/uploads/2018/05/Screen-Shot-2018-05-04-at-6.57.17-AM-100x95.png
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
8c618daffe6ab4f013e90d105049844d378948c8c5badb49fc61da4d4ec2970d

Request headers

:path
/uploads/2018/05/Screen-Shot-2018-05-04-at-6.57.17-AM-100x95.png
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553; optimizelyEndUserId=oeu1525466555543r0.6808766353952749; optimizelySegments=%7B%7D; optimizelyBuckets=%7B%7D; optimizelyPendingLogEvents=%5B%5D; cX_S=jgsfefkc4wbn4s1g; cX_P=jgsfefkess30x55f; __utma=204792322.2033778555.1525466556.1525466556.1525466556.1; __utmc=204792322; __utmz=204792322.1525466556.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmt=1; __utmb=204792322.1.10.1525466556; __qca=P0-1076074650-1525466556350; _sp_id.dcec=a48f8ccee742073e.1525466557.1.1525466557.1525466557; _sp_ses.dcec=*; __insp_wid=1048872546; __insp_slim=1525466556938; __insp_nv=true; __insp_targlpu=aHR0cHM6Ly93d3cuY29pbmRlc2suY29tL21vbmVyby1taW5pbmctbWFsd2FyZS1hdHRhY2stbGlua2VkLXRvLWVneXB0aWFuLXRlbGVjb20tZ2lhbnQv; __insp_targlpt=TW9uZXJvIE1pbmluZyBNYWx3YXJlIEF0dGFjayBMaW5rZWQgdG8gRWd5cHRpYW4gVGVsZWNvbSBHaWFudCAtIENvaW5EZXNr; _parsely_session={%22sid%22:1%2C%22surl%22:%22https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/%22%2C%22sref%22:%22%22%2C%22sts%22:1525466557043%2C%22slts%22:0}; _parsely_visitor={%22id%22:%222881068a-4927-4491-8399-7712e109f5b8%22%2C%22session_count%22:1%2C%22last_session_ts%22:1525466557043}; __gads=ID=e21eab6e4c2163b2:T=1525466557:S=ALNI_ManL532lluqPz2jlGy-GQAu8bua9g; __insp_norec_howoften=true; __insp_norec_sess=true
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
media.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:40 GMT
cf-cache-status
HIT
x-amz-request-id
B2E383A0C2F9B702
cf-polished
origFmt=png, origSize=20132
cf-ray
415dcb950cd92762-FRA
status
200
content-disposition
inline; filename="Screen-Shot-2018-05-04-at-6.webp"
content-length
12982
x-amz-id-2
JC84u+P4OFja59CQHvqo1lqrD+zQIQpFj6NpHdrKdQoOdXPLn7HIdqQ71CO+ZEmONRbiHeVgTec=
last-modified
Fri, 04 May 2018 10:57:51 GMT
server
cloudflare
etag
"96782420022d0dbe7f2e56e8c21591f3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept
x-amz-version-id
Lyx2_Ws2RZeFCbTJrFVmJs5CnnD2gQvI
expires
Mon, 04 Jun 2018 20:42:40 GMT
cache-control
public, max-age=2678400
content-type
image/webp
cf-bgj
imgq:85
dragon-bridge-100x95.jpg
media.coindesk.com/uploads/2018/05/
3 KB
3 KB
Image
General
Full URL
https://media.coindesk.com/uploads/2018/05/dragon-bridge-100x95.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
dba424f9e997ff39ea7365173eb1b47063429ed080d060c4009bb8dac1183958

Request headers

:path
/uploads/2018/05/dragon-bridge-100x95.jpg
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553; optimizelyEndUserId=oeu1525466555543r0.6808766353952749; optimizelySegments=%7B%7D; optimizelyBuckets=%7B%7D; optimizelyPendingLogEvents=%5B%5D; cX_S=jgsfefkc4wbn4s1g; cX_P=jgsfefkess30x55f; __utma=204792322.2033778555.1525466556.1525466556.1525466556.1; __utmc=204792322; __utmz=204792322.1525466556.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmt=1; __utmb=204792322.1.10.1525466556; __qca=P0-1076074650-1525466556350; _sp_id.dcec=a48f8ccee742073e.1525466557.1.1525466557.1525466557; _sp_ses.dcec=*; __insp_wid=1048872546; __insp_slim=1525466556938; __insp_nv=true; __insp_targlpu=aHR0cHM6Ly93d3cuY29pbmRlc2suY29tL21vbmVyby1taW5pbmctbWFsd2FyZS1hdHRhY2stbGlua2VkLXRvLWVneXB0aWFuLXRlbGVjb20tZ2lhbnQv; __insp_targlpt=TW9uZXJvIE1pbmluZyBNYWx3YXJlIEF0dGFjayBMaW5rZWQgdG8gRWd5cHRpYW4gVGVsZWNvbSBHaWFudCAtIENvaW5EZXNr; _parsely_session={%22sid%22:1%2C%22surl%22:%22https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/%22%2C%22sref%22:%22%22%2C%22sts%22:1525466557043%2C%22slts%22:0}; _parsely_visitor={%22id%22:%222881068a-4927-4491-8399-7712e109f5b8%22%2C%22session_count%22:1%2C%22last_session_ts%22:1525466557043}; __gads=ID=e21eab6e4c2163b2:T=1525466557:S=ALNI_ManL532lluqPz2jlGy-GQAu8bua9g; __insp_norec_howoften=true; __insp_norec_sess=true
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
media.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:40 GMT
cf-cache-status
HIT
x-amz-request-id
E22C344B63CD9294
cf-polished
qual=85, origFmt=jpeg, origSize=3610
cf-ray
415dcb950cda2762-FRA
status
200
content-disposition
inline; filename="dragon-bridge-100x95.webp"
content-length
2876
x-amz-id-2
9dcW/e5Bw5JHF6P32i8La+EpUkSXQPmnxKyxuuIa24sEvoUskrPMV2UOxLYAcQ6i8VUGaGuunsA=
last-modified
Fri, 04 May 2018 03:58:01 GMT
server
cloudflare
etag
"dfa8c6adb83c01c0552422ca6782a487"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept
x-amz-version-id
QZcFeBAsLsAfTfvHjWYqW6o.AW7IEtPc
expires
Mon, 04 Jun 2018 20:42:40 GMT
cache-control
public, max-age=2678400
content-type
image/webp
cf-bgj
imgq:85
DcHu1qSW4AA9oUz-100x95.jpg
media.coindesk.com/uploads/2018/05/
3 KB
4 KB
Image
General
Full URL
https://media.coindesk.com/uploads/2018/05/DcHu1qSW4AA9oUz-100x95.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2340e109210348f99955d7c14235d08b70ce69c52cbe32c11fb7084d373c1aec

Request headers

:path
/uploads/2018/05/DcHu1qSW4AA9oUz-100x95.jpg
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553; optimizelyEndUserId=oeu1525466555543r0.6808766353952749; optimizelySegments=%7B%7D; optimizelyBuckets=%7B%7D; optimizelyPendingLogEvents=%5B%5D; cX_S=jgsfefkc4wbn4s1g; cX_P=jgsfefkess30x55f; __utma=204792322.2033778555.1525466556.1525466556.1525466556.1; __utmc=204792322; __utmz=204792322.1525466556.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmt=1; __utmb=204792322.1.10.1525466556; __qca=P0-1076074650-1525466556350; _sp_id.dcec=a48f8ccee742073e.1525466557.1.1525466557.1525466557; _sp_ses.dcec=*; __insp_wid=1048872546; __insp_slim=1525466556938; __insp_nv=true; __insp_targlpu=aHR0cHM6Ly93d3cuY29pbmRlc2suY29tL21vbmVyby1taW5pbmctbWFsd2FyZS1hdHRhY2stbGlua2VkLXRvLWVneXB0aWFuLXRlbGVjb20tZ2lhbnQv; __insp_targlpt=TW9uZXJvIE1pbmluZyBNYWx3YXJlIEF0dGFjayBMaW5rZWQgdG8gRWd5cHRpYW4gVGVsZWNvbSBHaWFudCAtIENvaW5EZXNr; _parsely_session={%22sid%22:1%2C%22surl%22:%22https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/%22%2C%22sref%22:%22%22%2C%22sts%22:1525466557043%2C%22slts%22:0}; _parsely_visitor={%22id%22:%222881068a-4927-4491-8399-7712e109f5b8%22%2C%22session_count%22:1%2C%22last_session_ts%22:1525466557043}; __gads=ID=e21eab6e4c2163b2:T=1525466557:S=ALNI_ManL532lluqPz2jlGy-GQAu8bua9g; __insp_norec_howoften=true; __insp_norec_sess=true
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
media.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:40 GMT
cf-cache-status
HIT
x-amz-request-id
6B4CD389EF62587E
cf-polished
qual=85, origFmt=jpeg, origSize=3991
cf-ray
415dcb950cdb2762-FRA
status
200
content-disposition
inline; filename="DcHu1qSW4AA9oUz-100x95.webp"
content-length
3230
x-amz-id-2
SKiylazUbcvyhdEifINApAGLeawQJWgmaxDmW0Mrs9HlkL7QNQM6eS3DuHNHCHVvx0PJDwjDDUo=
last-modified
Thu, 03 May 2018 12:53:37 GMT
server
cloudflare
etag
"56db222d7c2d05f3e692586541b2c169"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept
x-amz-version-id
uQw1b_5Ul.vHyzkKwpnv9dHwyEehPjJH
expires
Mon, 04 Jun 2018 20:42:40 GMT
cache-control
public, max-age=2678400
content-type
image/webp
cf-bgj
imgq:85
farm-crop-100x95.jpg
media.coindesk.com/uploads/2018/05/
4 KB
5 KB
Image
General
Full URL
https://media.coindesk.com/uploads/2018/05/farm-crop-100x95.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.106.195 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c0ca796da48b0a39e044aa5de11c636537aa7881d4effb199e25e7a280c30054

Request headers

:path
/uploads/2018/05/farm-crop-100x95.jpg
pragma
no-cache
cookie
__cfduid=d8c482d84c949edfb21204e6f2c87988c1525466553; optimizelyEndUserId=oeu1525466555543r0.6808766353952749; optimizelySegments=%7B%7D; optimizelyBuckets=%7B%7D; optimizelyPendingLogEvents=%5B%5D; cX_S=jgsfefkc4wbn4s1g; cX_P=jgsfefkess30x55f; __utma=204792322.2033778555.1525466556.1525466556.1525466556.1; __utmc=204792322; __utmz=204792322.1525466556.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmt=1; __utmb=204792322.1.10.1525466556; __qca=P0-1076074650-1525466556350; _sp_id.dcec=a48f8ccee742073e.1525466557.1.1525466557.1525466557; _sp_ses.dcec=*; __insp_wid=1048872546; __insp_slim=1525466556938; __insp_nv=true; __insp_targlpu=aHR0cHM6Ly93d3cuY29pbmRlc2suY29tL21vbmVyby1taW5pbmctbWFsd2FyZS1hdHRhY2stbGlua2VkLXRvLWVneXB0aWFuLXRlbGVjb20tZ2lhbnQv; __insp_targlpt=TW9uZXJvIE1pbmluZyBNYWx3YXJlIEF0dGFjayBMaW5rZWQgdG8gRWd5cHRpYW4gVGVsZWNvbSBHaWFudCAtIENvaW5EZXNr; _parsely_session={%22sid%22:1%2C%22surl%22:%22https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/%22%2C%22sref%22:%22%22%2C%22sts%22:1525466557043%2C%22slts%22:0}; _parsely_visitor={%22id%22:%222881068a-4927-4491-8399-7712e109f5b8%22%2C%22session_count%22:1%2C%22last_session_ts%22:1525466557043}; __gads=ID=e21eab6e4c2163b2:T=1525466557:S=ALNI_ManL532lluqPz2jlGy-GQAu8bua9g; __insp_norec_howoften=true; __insp_norec_sess=true
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
media.coindesk.com
referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
:scheme
https
:method
GET
Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:40 GMT
cf-cache-status
HIT
x-amz-request-id
FEF652D101E2F683
cf-polished
qual=85, origFmt=jpeg, origSize=4881
cf-ray
415dcb950cdc2762-FRA
status
200
content-disposition
inline; filename="farm-crop-100x95.webp"
content-length
4492
x-amz-id-2
ZCItSyGb7eJX5XQHauIkDE80TnSCRXaiJ4jUhqEwbdu9p0lJQomNj+QMml6DsWS8uef48/cdUOw=
last-modified
Wed, 02 May 2018 22:13:53 GMT
server
cloudflare
etag
"43c80948a06816b4c0e4169f4fb10ccd"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept
x-amz-version-id
R7B38XdSSBU1ZNLoS08VPjmvDizcKbxa
expires
Mon, 04 Jun 2018 20:42:40 GMT
cache-control
public, max-age=2678400
content-type
image/webp
cf-bgj
imgq:85
1238587386238610
connect.facebook.net/signals/config/
55 KB
13 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/1238587386238610?v=2.8.14&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
SPDY
Server
185.60.216.19 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
c73b508966e30eff850dfae0bb524b175750a5b4a8305c115fa2b3fb6a132e7b
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' fbstatic-a.akamaihd.net fbcdn-static-b-a.akamaihd.net *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* *.akamaihd.net wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' fbstatic-a.akamaihd.net fbcdn-static-b-a.akamaihd.net *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* *.akamaihd.net wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
13396
x-xss-protection
0
pragma
public
x-fb-debug
7C8W7LF32mJXm0PzsPM3RI6B9SfpFC/8MOh9dfhi+i5919JFPfSvQ/zxNktJwEiQAB8SrdT5XV4DdAzcWDxtMA==
x-frame-options
DENY
date
Fri, 04 May 2018 20:42:40 GMT
strict-transport-security
max-age=31536000; preload; includeSubDomains
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
expires
Sat, 01 Jan 2000 00:00:00 GMT
sync
pixel.advertising.com/ups/55980/
Redirect Chain
  • https://d.adroll.com/cm/aol/out
  • https://pixel.advertising.com/ups/55980/sync?uid=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk&_origin=1
  • https://pixel.advertising.com/ups/55980/sync?uid=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk&_origin=1&verify=true
0
299 B
Image
General
Full URL
https://pixel.advertising.com/ups/55980/sync?uid=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk&_origin=1&verify=true
Protocol
SPDY
Server
52.58.8.97 Frankfurt, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-58-8-97.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

status
204
date
Fri, 04 May 2018 20:42:40 GMT
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV

Redirect headers

status
302
date
Fri, 04 May 2018 20:42:40 GMT
content-length
0
location
https://pixel.advertising.com/ups/55980/sync?uid=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk&_origin=1&verify=true
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
rum
dsum-sec.casalemedia.com/
Redirect Chain
  • https://d.adroll.com/cm/index/out
  • https://dsum-sec.casalemedia.com/rum?cm_dsp_id=105&external_user_id=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk&expiration=1557002560
  • https://dsum-sec.casalemedia.com/rum?cm_dsp_id=105&external_user_id=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk&expiration=1557002560&C=1
43 B
1 KB
Image
General
Full URL
https://dsum-sec.casalemedia.com/rum?cm_dsp_id=105&external_user_id=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk&expiration=1557002560&C=1
Protocol
HTTP/1.1
Server
2.18.234.21 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:40 GMT
Server
Apache
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Fri, 04 May 2018 20:42:40 GMT

Redirect headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:40 GMT
Server
Apache
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Location
https://dsum-sec.casalemedia.com/rum?cm_dsp_id=105&external_user_id=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk&expiration=1557002560&C=1
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Content-Type
text/html; charset=iso-8859-1
Content-Length
333
Expires
Fri, 04 May 2018 20:42:40 GMT
tap.php
pixel.rubiconproject.com/
Redirect Chain
  • https://d.adroll.com/cm/n/out
  • https://pixel.rubiconproject.com/tap.php?v=194538&nid=3644&put=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk&expires=365
42 B
853 B
Image
General
Full URL
https://pixel.rubiconproject.com/tap.php?v=194538&nid=3644&put=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk&expires=365
Protocol
HTTP/1.1
Server
62.67.193.75 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
Rubicon Project /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:40 GMT
Server
Rubicon Project
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
X-RPHost
Xih701U9lBqRgQE278rMFw
Expires
0

Redirect headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:40 GMT
Server
nginx/1.12.1
P3P
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
Location
https://pixel.rubiconproject.com/tap.php?v=194538&nid=3644&put=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk&expires=365
Cache-Control
no-store, no-cache, must-revalidate
Connection
keep-alive
Content-Length
124
pixel
sync.outbrain.com/adroll/
Redirect Chain
  • https://d.adroll.com/cm/outbrain/out
  • https://sync.outbrain.com/adroll/pixel?user_id=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk
96 B
96 B
Image
General
Full URL
https://sync.outbrain.com/adroll/pixel?user_id=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk
Protocol
SPDY
Server
151.101.14.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

strict-transport-security
max-age=0; includeSubDomains;
content-encoding
gzip
traffic-path
NYDC1, JFK, FRA, Europe1
x-timer
S1525466561.016378,VS0,VE82
date
Fri, 04 May 2018 20:42:41 GMT
x-served-by
cache-jfk8137-JFK, cache-fra19136-FRA
x-cache
MISS, MISS
status
200
backend-ip
104.156.90.37
accept-ranges
bytes, bytes
via
1.1 varnish, 1.1 varnish
x-cache-hits
0, 0

Redirect headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:41 GMT
Server
nginx/1.12.1
P3P
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
Location
https://sync.outbrain.com/adroll/pixel?user_id=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk
Cache-Control
no-store, no-cache, must-revalidate
Connection
keep-alive
Content-Length
96
Pug
simage2.pubmatic.com/AdServer/
Redirect Chain
  • https://d.adroll.com/cm/pubmatic/out
  • https://simage2.pubmatic.com/AdServer/Pug?vcode=bz0yJnR5cGU9MSZqcz0xJmNvZGU9MzMwNiZ0bD01MjU2MDA&piggybackCookie=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk
1 B
916 B
Image
General
Full URL
https://simage2.pubmatic.com/AdServer/Pug?vcode=bz0yJnR5cGU9MSZqcz0xJmNvZGU9MzMwNiZ0bD01MjU2MDA&piggybackCookie=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk
Protocol
HTTP/1.1
Server
198.47.127.15 Redwood City, United States, ASN3257 (GTT-BACKBONE GTT, DE),
Reverse DNS
Software
Apache/2.2.24 (Unix) mod_ssl/2.2.24 OpenSSL/1.0.1e-fips mod_fastcgi/2.4.6 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:41 GMT
X-lat
Pug22072:0:212
Server
Apache/2.2.24 (Unix) mod_ssl/2.2.24 OpenSSL/1.0.1e-fips mod_fastcgi/2.4.6
P3P
CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Cache-Control
no-store, no-cache, private
Connection
close
Content-Type
text/html; charset=utf-8
Content-Length
1

Redirect headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:41 GMT
Server
nginx/1.12.1
P3P
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
Location
https://simage2.pubmatic.com/AdServer/Pug?vcode=bz0yJnR5cGU9MSZqcz0xJmNvZGU9MzMwNiZ0bD01MjU2MDA&piggybackCookie=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk
Cache-Control
no-store, no-cache, must-revalidate
Connection
keep-alive
Content-Length
161
/
trc.taboola.com/sg/adroll-network/1/rtb-h/
Redirect Chain
  • https://d.adroll.com/cm/taboola/out
  • https://trc.taboola.com/sg/adroll-network/1/rtb-h/?taboola_hm=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk
0
287 B
Image
General
Full URL
https://trc.taboola.com/sg/adroll-network/1/rtb-h/?taboola_hm=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk
Protocol
SPDY
Server
151.101.14.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:41 GMT
via
1.1 varnish
server
nginx
x-timer
S1525466561.020570,VS0,VE8
x-served-by
cache-fra19136-FRA
x-cache
MISS
status
204
x-cache-hits
0
accept-ranges
bytes
expires
Thu, 01 Jan 1970 00:00:00 GMT

Redirect headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:41 GMT
Server
nginx/1.12.1
P3P
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
Location
https://trc.taboola.com/sg/adroll-network/1/rtb-h/?taboola_hm=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk
Cache-Control
no-store, no-cache, must-revalidate
Connection
keep-alive
Content-Length
111
xuid
eb2.3lift.com/
Redirect Chain
  • https://d.adroll.com/cm/triplelift/out
  • https://eb2.3lift.com/xuid?mid=4714&xuid=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk&dongle=c85e
  • https://eb2.3lift.com/xuid?ld=1&mid=4714&xuid=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk&dongle=c85e
37 B
464 B
Image
General
Full URL
https://eb2.3lift.com/xuid?ld=1&mid=4714&xuid=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk&dongle=c85e
Protocol
HTTP/1.1
Server
52.58.8.245 Frankfurt, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-58-8-245.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
bb229a48bee31f5d54ca12dc9bd960c63a671f0d4be86a054c1d324a44499d96

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 4 May 2018 20:42:41 GMT
cache-control
no-cache, no-store, must-revalidate
Connection
keep-alive
P3P
policyref="http://cdn.3lift.com/w3c/p3p.xml", CP="NON DSP COR NID OUR DEL SAM OTR UNR COM NAV INT DEM CNT STA PRE LOC OTC"
Content-Length
37
content-type
image/gif

Redirect headers

location
/xuid?ld=1&mid=4714&xuid=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk&dongle=c85e
date
Fri, 4 May 2018 20:42:41 GMT
cache-control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Length
0
P3P
policyref="http://cdn.3lift.com/w3c/p3p.xml", CP="NON DSP COR NID OUR DEL SAM OTR UNR COM NAV INT DEM CNT STA PRE LOC OTC"
pixel
ads.yahoo.com/
Redirect Chain
  • https://d.adroll.com/cm/r/out
  • https://ads.yahoo.com/pixel?id=2498203&t=2&piggyback=https%3A%2F%2Fads.yahoo.com%2Fcms%2Fv1%3Fesig%3D1~bf4e7dc4546a90c08591652d78a230d3f2ef5733%26nwid%3D10001032567%26sigv%3D1
0
1 KB
Image
General
Full URL
https://ads.yahoo.com/pixel?id=2498203&t=2&piggyback=https%3A%2F%2Fads.yahoo.com%2Fcms%2Fv1%3Fesig%3D1~bf4e7dc4546a90c08591652d78a230d3f2ef5733%26nwid%3D10001032567%26sigv%3D1
Protocol
HTTP/1.1
Server
217.12.15.83 , United Kingdom, ASN34010 (YAHOO-IRD, GB),
Reverse DNS
mpr1.ngd.vip.ir2.yahoo.com
Software
ATS /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Fri, 04 May 2018 20:42:41 GMT
Server
ATS
Age
0
Expect-CT
max-age=31536000, report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only"
Strict-Transport-Security
max-age=31536000
Public-Key-Pins-Report-Only
max-age=2592000; pin-sha256="2fRAUXyxl4A1/XHrKNBmc8bTkzA7y4FB/GLJuNAzCqY="; pin-sha256="2oALgLKofTmeZvoZ1y/fSZg7R9jPMix8eVA6DH4o/q8="; pin-sha256="47DEQpj8HBSa+/TImW+5JCeuQeRkm5NMpJWZG3hSuFU="; pin-sha256="cAajgxHlj7GTSEIzIYIQxmEloOSoJq7VOaxWHfv72QM="; pin-sha256="Gtk3r1evlBrs0hG3fm3VoM19daHexDWP//OCmeeMr5M="; pin-sha256="i7WTqTvh0OioIruIfFR4kMPnBqrS2rdiVPl/s2uC/CY="; pin-sha256="iduNzFNKpwYZ3se/XV+hXcbUonlLw09QPa6AYUwpu4M="; pin-sha256="I/Lt/z7ekCWanjD0Cvj5EqXls2lOaThEA0H2Bg4BT/o="; pin-sha256="JbQbUG5JMJUoI6brnx0x3vZF6jilxsapbXGVfjhN8Fg="; pin-sha256="lnsM2T/O9/J84sJFdnrpsFp3awZJ+ZZbYpCWhGloaHI="; pin-sha256="r/mIkG3eEpVdm+u/ko/cwxzOMo1bk4TyHIlByibiA5E="; pin-sha256="SVqWumuteCQHvVIaALrOZXuzVVVeS7f4FGxxu6V+es4="; pin-sha256="uUwZgwDOxcBXrQcntwu+kYFpkiVkOaezL0WYEZ3anJc="; pin-sha256="UZJDjsNp1+4M5x9cbbdflB779y5YRBcV6Z6rBMLIrO4="; pin-sha256="Wd8xe/qfTwq3ylFNd3IpaqLHZbh2ZNCLluVzmeNkcpw="; pin-sha256="WoiWRyIOVNa9ihaBciRSC7XHjliYS9VwUGOIud4PB18="; includeSubdomains; report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-hpkp-report-only"
Connection
keep-alive
Content-Length
0

Redirect headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:41 GMT
Server
nginx/1.12.1
P3P
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
Location
https://ads.yahoo.com/pixel?id=2498203&t=2&piggyback=https%3A%2F%2Fads.yahoo.com%2Fcms%2Fv1%3Fesig%3D1~bf4e7dc4546a90c08591652d78a230d3f2ef5733%26nwid%3D10001032567%26sigv%3D1
Cache-Control
no-store, no-cache, must-revalidate
Connection
keep-alive
Content-Length
181
sync
t.visx.net/ul_cb/
Redirect Chain
  • https://d.adroll.com/cm/b/out
  • https://x.bidswitch.net/sync?dsp_id=44&user_id=Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk
  • https://t.visx.net/sync?tp_id=1&tp_uid=86440d29-d871-4128-9c7d-13fd1a8a9125&ssp_custom_data=
  • https://t.visx.net/ul_cb/sync?tp_id=1&tp_uid=86440d29-d871-4128-9c7d-13fd1a8a9125&ssp_custom_data=
43 B
627 B
Image
General
Full URL
https://t.visx.net/ul_cb/sync?tp_id=1&tp_uid=86440d29-d871-4128-9c7d-13fd1a8a9125&ssp_custom_data=
Protocol
HTTP/1.1
Server
35.187.123.169 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
169.123.187.35.bc.googleusercontent.com
Software
nginx /
Resource Hash
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:41 GMT
Server
nginx
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Mon, 26 Jul 1997 05:00:00 GMT

Redirect headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:41 GMT
Server
nginx
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Location
https://t.visx.net/ul_cb/sync?tp_id=1&tp_uid=86440d29-d871-4128-9c7d-13fd1a8a9125&ssp_custom_data=
Connection
keep-alive
Content-Length
0
Expires
Mon, 26 Jul 1997 05:00:00 GMT
pxj
ib.adnxs.com/
Redirect Chain
  • https://d.adroll.com/cm/x/out
  • https://ib.adnxs.com/pxj?bidder=172&seg=802787&action=setuid(%27Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk%27)
0
591 B
Image
General
Full URL
https://ib.adnxs.com/pxj?bidder=172&seg=802787&action=setuid(%27Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk%27)
Protocol
HTTP/1.1
Server
37.252.172.42 , European Union, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
247.bm-nginx-loadbalancer.mgmt.fra1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:43 GMT
X-Proxy-Origin
148.251.45.254; 148.251.45.254; 247.bm-nginx-loadbalancer.mgmt.fra1; *.adnxs.com; 37.252.172.14:80
AN-X-Request-Uuid
e1995c1b-28ec-4d9c-9476-8d085864eacf
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Cache-Control
no-store, no-cache, private
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT

Redirect headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:41 GMT
Server
nginx/1.12.1
P3P
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
Location
https://ib.adnxs.com/pxj?bidder=172&seg=802787&action=setuid('Y2ZjODI2ZDljZWVmNGZiOGU4NTk3MjYxMGU3NWEzYTk')
Cache-Control
no-store, no-cache, must-revalidate
Connection
keep-alive
Content-Length
113
377928.gif
idsync.rlcdn.com/
Redirect Chain
  • https://d.adroll.com/cm/l/out
  • https://idsync.rlcdn.com/377928.gif?partner_uid=cfc826d9ceef4fb8e85972610e75a3a9
43 B
545 B
Image
General
Full URL
https://idsync.rlcdn.com/377928.gif?partner_uid=cfc826d9ceef4fb8e85972610e75a3a9
Protocol
HTTP/1.1
Server
52.54.147.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-54-147-76.compute-1.amazonaws.com
Software
/
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Expires
Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control
no-cache, no-store
Connection
keep-alive
P3P
CP: "NON DSP COR PSDo SAMo BUS IND UNI COM NAV INT POL PRE"
Content-Length
43
Content-Type
image/gif; charset=ISO-8859-1

Redirect headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:41 GMT
Server
nginx/1.12.1
P3P
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
Location
https://idsync.rlcdn.com/377928.gif?partner_uid=cfc826d9ceef4fb8e85972610e75a3a9
Cache-Control
no-store, no-cache, must-revalidate
Connection
keep-alive
Content-Length
86
sd
us-u.openx.net/w/1.0/
Redirect Chain
  • https://d.adroll.com/cm/o/out
  • https://us-u.openx.net/w/1.0/sd?id=537103138&val=cfc826d9ceef4fb8e85972610e75a3a9
43 B
318 B
Image
General
Full URL
https://us-u.openx.net/w/1.0/sd?id=537103138&val=cfc826d9ceef4fb8e85972610e75a3a9
Protocol
HTTP/1.1
Server
173.241.240.143 New York, United States, ASN36089 (OPENX-AS1 - OPENX TECHNOLOGIES, INC., US),
Reverse DNS
ox-173-241-240-143.xa.dc.openx.org
Software
OXGW/16.19.2 /
Resource Hash
4e0705327480ad2323cb03d9c450ffcae4a98bf3a5382fa0c7882145ed620e49

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:41 GMT
Server
OXGW/16.19.2
Vary
Accept
P3P
CP="CUR ADM OUR NOR STA NID"
Cache-Control
private, max-age=0, no-cache
Content-Type
image/gif
Content-Length
43
Expires
Mon, 26 Jul 1997 05:00:00 GMT

Redirect headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:41 GMT
Server
nginx/1.12.1
P3P
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
Location
https://us-u.openx.net/w/1.0/sd?id=537103138&val=cfc826d9ceef4fb8e85972610e75a3a9
Cache-Control
no-store, no-cache, must-revalidate
Connection
keep-alive
Content-Length
87
in
d.adroll.com/cm/g/
Redirect Chain
  • https://d.adroll.com/cm/g/out?google_nid=adroll5
  • https://cm.g.doubleclick.net/pixel?google_sc&google_nid=artb&google_hm=z8gm2c7vT7joWXJhDnWjqQ&google_ula=1535926
  • https://d.adroll.com/cm/g/in?google_ula=1535926,0
35 B
490 B
Image
General
Full URL
https://d.adroll.com/cm/g/in?google_ula=1535926,0
Protocol
HTTP/1.1
Server
54.247.77.12 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-247-77-12.eu-west-1.compute.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
ce4e964329e64bb7128c1c1d602433a744b48f6dbc1212e65b2b5184bd8c6617

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 04 May 2018 20:42:41 GMT
Server
nginx/1.12.1
P3P
CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
Cache-Control
no-store, no-cache, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
X-Result
g.-1.-1.1535926.0.-1

Redirect headers

pragma
no-cache
date
Fri, 04 May 2018 20:42:41 GMT
server
HTTP server (unknown)
status
302
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
location
https://d.adroll.com/cm/g/in?google_ula=1535926,0
cache-control
no-cache, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
hq="googleads.g.doubleclick.net:443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="43,42,41,39,35",hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
246
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
www.facebook.com/tr/
44 B
150 B
Image
General
Full URL
https://www.facebook.com/tr/?id=1238587386238610&ev=PageView&dl=https%3A%2F%2Fwww.coindesk.com%2Fmonero-mining-malware-attack-linked-to-egyptian-telecom-giant%2F&rl=&if=false&ts=1525466560915&cd[segment_eid]=QICTVBHGAZFHLBW3CA2WBJ%2C7C52WKODRJBULPTPC7BKLX&sw=1600&sh=1200&v=2.8.14&r=stable&ec=0&o=29&it=1525466555588
Protocol
SPDY
Server
185.60.216.35 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Fri, 04 May 2018 20:42:40 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Fri, 04 May 2018 20:42:40 GMT
c
c.pub.network/
36 B
261 B
XHR
General
Full URL
https://c.pub.network/c
Requested by
Host: a.pub.network
URL: https://a.pub.network/coindesk/pubfig.min.js
Protocol
HTTP/1.1
Server
104.155.128.21 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
21.128.155.104.bc.googleusercontent.com
Software
/
Resource Hash
7dcebe29911c91e38cd616db5b97132dbbec6e7c3c33c69847a06a8063fc714d

Request headers

Referer
https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
Origin
https://www.coindesk.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Access-Control-Allow-Origin
https://www.coindesk.com
Date
Fri, 04 May 2018 20:42:41 GMT
Access-Control-Allow-Credentials
true
Content-Length
36
Vary
Origin
Content-Type
text/plain;charset=utf-8

Verdicts & Comments Add Verdict or Comment

265 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| _wpemojiSettings number| j object| html5 object| twemoji object| wp function| __twttrll object| twttr object| __twttr function| $ function| jQuery string| bm_website_code function| fbq function| _fbq function| hj object| _hjSettings object| freestar object| _taboola object| cX function| OptinMonsterApp boolean| om_loaded object| geolocation object| optly object| optimizely object| riuyojisrlntqyiu function| riuyojisrlntqyiu_poll object| hjSiteSettings function| hjBootstrap function| EventEmitter function| MobileDetect object| revUtils object| revDetect function| RevMore object| devices boolean| empty object| TRC object| _tblConsole undefined| msg object| _comscore function| cx_callQueueExecute function| cx_pollActivity function| cx_pollActiveTime function| cx_pollFragmentMessage function| udm_ object| ns_p object| COMSCORE object| mc4wp object| revDiv object| cs object| rc_criteo function| callCriteo_rc_95 function| callRev_rc_95 function| revMap object| _gaq function| uuidProfileCall undefined| oldonload object| PARSELY function| getElementsByClassName object| dropdowns object| pxgz0fukuxnyx4so function| pxgz0fukuxnyx4so_poll object| hzqnyrqde3q081ar function| hzqnyrqde3q081ar_poll object| bkwa88yd18ys7pr4 function| bkwa88yd18ys7pr4_poll object| mrt6mt0mlp9ntn6y function| mrt6mt0mlp9ntn6y_poll boolean| riuyojisrlntqyiu_shortcode boolean| pxgz0fukuxnyx4so_shortcode boolean| hzqnyrqde3q081ar_shortcode boolean| bkwa88yd18ys7pr4_shortcode boolean| mrt6mt0mlp9ntn6y_shortcode object| device function| _typeof object| async object| Highcharts function| moment function| Spinner object| CD function| MarketCenterPage function| MarketCenterTable function| PricingWidget object| addComment object| pollsL10n number| poll_id string| poll_answer_id boolean| is_being_voted function| poll_vote function| poll_process function| poll_result function| poll_booth function| poll_process_success function| set_is_being_voted object| ubermenu_data function| uber_op function| uber_supports function| uberMenu_openMega function| uberMenu_openFlyout function| uberMenu_close function| uberMenu_redrawSubmenus object| jQuery112405456171450758265 object| mc4wp_forms_config function| Gator object| mc4wp_ajax_vars object| omapi_localized object| _bsa function| _bsa_go function| _bsa_serving_callback object| _bsa_queue string| adroll_adv_id string| adroll_pix_id object| _qevents number| freestarAdsTrigger object| _gat object| gaGlobal object| matched object| request_params function| disqus_config object| DISQUS function| quantserve function| __qc object| ezt object| _qoptions object| proto object| pbjs object| googletag function| fsRequestBids object| criteo_pubtag object| Criteo function| __trcCopyProps function| __trcFromError function| __trcClientTimestamp function| __trcLog function| __trcError function| __trcDebug function| __trcInfo function| __trcWarn function| __trcDOMWalker function| __trcPurgeEventHandlers function| __trcJSONify function| __trcGetMargins function| __trcAttachResize function| __trcDetachResize function| __trcTrim function| __trcGetElementsByClass function| __trcToArray function| __trcObjectCreate function| __trcUnJSONify function| Gettext object| amp function| PageManager object| modObject object| params number| trc_debug_level string| trc_article_id boolean| trc_testmode object| TRCImpl object| hcEvents object| __insp function| skimlinksODPCallback function| skimlinksBeaconCallback function| skimlinksBeaconSecondaryCallback function| skimlinksBeaconAuxCallback object| __SKIM_JS_GLOBAL__ boolean| skimlinks_revenue_forecast number| skimlinks_requests_in_flight object| GlobalSnowplowNamespace function| snowplowKW object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken number| __inspld object| OptinMonsterAppOptins boolean| OptinMonsterAppParsedLinks object| OptinMonsterAppLinksParsed object| OptinMonsterAppLinkSlugs object| OptinMonsterAppSettings object| OptinMonsterAppVariables boolean| OptinMonsterAppStorage number| OptinMonsterAppPosition boolean| OptinMonsterAppPopupLoaded object| OptinMonsterAppLocation boolean| OptinMonsterAdbl boolean| OptinMonsterJqLoaded boolean| OptinMonsterJqGlobal object| OptinMonsterSiteData boolean| OptinMonsterSiteLoaded object| OptinMonsterSiteInit number| OptinMonsterInactivityTime function| pbjsChunk object| __core-js_shared__ object| apstag object| clrm object| head object| body object| rc2css object| rc2js undefined| rc2js_beacon_5aecc5bc70b9b object| rc2js_beacon_5aecc5bc70c7e object| rc2js_beacon_5aecc5bc70d2c object| quant_push_tag object| rcel object| rcds object| beacon object| beaconNoScript object| rc_segmented_creatives object| rc_segmented_widgets object| rc_loaded_widgets undefined| rc_chosen_interests number| rc_loader_limit number| rc_loader_runs object| rcsc object| RevContentLoader number| provider string| do_branding object| WebFont string| GoogleAnalyticsObject function| __omGaTracker object| Snowplow function| _toConsumableArray function| _defineProperty function| _extends object| gaplugins object| GPT_jstiming undefined| google_measure_js_timing boolean| google_noFetch boolean| google_DisableInitialLoad number| __google_ad_urls_id undefined| root object| Base64i function| $i undefined| _ function| __insp_ object| __inspcr object| __inspm object| __inspq number| google_unique_id object| closure_memoize_cache_ object| Base64 function| rcjq boolean| scrolled boolean| swiped boolean| resized boolean| rc_segments_sent function| Hammer object| jQuery11020905884942692265 function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter object| __google_ad_urls object| ampInaboxIframes object| ampInaboxPendingMessages boolean| google_osd_loaded boolean| google_onload_fired function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure boolean| __adroll_loaded object| lazyRocketsConfig object| __adroll boolean| adroll_optout object| adroll_ext_network object| adroll_callbacks object| adroll_currency object| adroll_conversion_value object| adroll_conversion_value_in_dollars function| google_osd_amcb

63 Cookies

Domain/Path Name / Value
.contextweb.com/ Name: pb_rtb_ev
Value: 3-ml3|6zB.0.86440d29-d871-4128-9c7d-13fd1a8a9125|4is.0.CAESEBi09WgnqTy_m0U232ulRLg|Vs.0.ac8a2b42-bb13-4f7a-8d0f-14d2b132a7a6|7TY.0|4Ec.0|2N.0.AAALpRkBkQ6GagNmFGskAAAAAAA|3oy.0.9a705fb0-d3e4-4b12-b546-5e1353d0584f
.contextweb.com/ Name: sto-id-20480-bh
Value: DIANNMAKJCBP
.contextweb.com/ Name: V
Value: 566VaLKn8Qky
.doubleclick.net/ Name: DSID
Value: NO_DATA
.doubleclick.net/ Name: IDE
Value: AHWqTUkcoTLCbrpjqk07QMwG7fuREgqSnUeFI9vdVvUdn3B5uPuEPlzMVtkdmekZ
.pippio.com/ Name: pxrc
Value: CL2Ls9cFEgUIlw4QABIFCKsREAASBQisERAAEgUIrREQAA==
.pippio.com/ Name: nnls
Value:
.pippio.com/ Name: didts
Value: 1525466557
.contextweb.com/ Name: vf
Value: 1
.pippio.com/ Name: did
Value: HwSYOJInDUheu1yv
live.rezync.com/ Name: sd-session-id
Value: .eJwVykELgjAYgOG_Et_Zg0MFEToE2y3nxQR3EZ1rfatZukmU-N9bt_eFZ4PupRbbT2ryUPhlVRHIB4ZzUGwwopvXUCAzcr0NeZ_kGRI9wx6BU87hc-pw_MvDEFRFZSLMKeZGe07vH4FxLGhjz7VOy6_0bc1RUPbmlqWtaWxlGCnNJfiW8FqvJWVH2PcfuCoxgw.Dc5XPg.k-s5-HBlKBmdMHJ8al2msi6gdKc
www.coindesk.com/ Name: bm_sample_frequency
Value: 100
.disqus.com/ Name: __utmz
Value: 40641725.1525466557.1.1.utmcsr=coindesk.com|utmccn=(referral)|utmcmd=referral|utmcct=/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/
www.coindesk.com/ Name: _fsuid
Value: 5d99b3c1-c202-4a85-9d0d-779a5ef13bd5
.disqus.com/ Name: __utma
Value: 40641725.892574715.1525466557.1525466557.1525466557.1
.disqus.com/ Name: __utmb
Value: 40641725.1.10.1525466557
.coindesk.com/ Name: cX_S
Value: jgsfefkc4wbn4s1g
.disqus.com/ Name: disqus_unique
Value: 51fhb8a385i1gq
.google.com/ Name: NID
Value: 129=VU8j7oBkq_B-nqpEOuprKNgMpTWgcnbYsyWApFjlk6b-r4KFro_ihR8K-A6Wfw7OpEFVGxSQHy4bSJIr6wSlbqoTgUwTdSdIVISMakWiDxQ9-Rk_Z9SCHwcn_ku4Tsyb
.dianomi.com/ Name: session2
Value: L=1&N=1
.dianomi.com/ Name: session
Value: fda0e3b4bbe30087114965a034174994
.coindesk.com/ Name: __insp_norec_howoften
Value: true
.coindesk.com/ Name: _parsely_visitor
Value: {%22id%22:%222881068a-4927-4491-8399-7712e109f5b8%22%2C%22session_count%22:1%2C%22last_session_ts%22:1525466557043}
www.coindesk.com/ Name: bm_monthly_unique
Value: true
.coindesk.com/ Name: _parsely_session
Value: {%22sid%22:1%2C%22surl%22:%22https://www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant/%22%2C%22sref%22:%22%22%2C%22sts%22:1525466557043%2C%22slts%22:0}
.disqus.com/ Name: __utmt
Value: 1
.coindesk.com/ Name: __insp_targlpt
Value: TW9uZXJvIE1pbmluZyBNYWx3YXJlIEF0dGFjayBMaW5rZWQgdG8gRWd5cHRpYW4gVGVsZWNvbSBHaWFudCAtIENvaW5EZXNr
.coindesk.com/ Name: optimizelyEndUserId
Value: oeu1525466555543r0.6808766353952749
.coindesk.com/ Name: __insp_targlpu
Value: aHR0cHM6Ly93d3cuY29pbmRlc2suY29tL21vbmVyby1taW5pbmctbWFsd2FyZS1hdHRhY2stbGlua2VkLXRvLWVneXB0aWFuLXRlbGVjb20tZ2lhbnQv
.coindesk.com/ Name: __gads
Value: ID=e21eab6e4c2163b2:T=1525466557:S=ALNI_ManL532lluqPz2jlGy-GQAu8bua9g
.amazon-adsystem.com/ Name: ad-privacy
Value: 0
.coindesk.com/ Name: __insp_slim
Value: 1525466556938
www.coindesk.com/ Name: bm_last_load_status
Value: NOT_BLOCKING
.coindesk.com/ Name: __utma
Value: 204792322.2033778555.1525466556.1525466556.1525466556.1
.twitter.com/ Name: personalization_id
Value: "v1_UVBdK7ePqdyIdf7F+6eRlQ=="
.coindesk.com/ Name: __insp_wid
Value: 1048872546
.coindesk.com/ Name: __utmz
Value: 204792322.1525466556.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)
.coindesk.com/ Name: __qca
Value: P0-1076074650-1525466556350
disqus.com/ Name: __jid
Value: 51fhb89djoni7
www.coindesk.com/ Name: _fssid
Value: abcd747e-c7a9-4d11-a7b6-45ce9814bbd2
.coindesk.com/ Name: __utmt
Value: 1
.coindesk.com/ Name: __utmb
Value: 204792322.1.10.1525466556
.contextweb.com/ Name: wf
Value: 0
.coindesk.com/ Name: __insp_nv
Value: true
.coindesk.com/ Name: _sp_id.dcec
Value: a48f8ccee742073e.1525466557.1.1525466557.1525466557
www.coindesk.com/ Name: _omappvp
Value: Gobs2VUEtcHlgObgXNeDlcsajD1SJNCx7CAaY6TVcRMkveaxLsWOEU0oc4BlrJQTK0bUjXWXCXddgt2YZWQq2Ikea6oPTR1b
.coindesk.com/ Name: _sp_ses.dcec
Value: *
.dianomi.com/ Name: __cfduid
Value: df56da9f5f271548f96e882de6f76d25a1525466556
.coindesk.com/ Name: __insp_norec_sess
Value: true
.coindesk.com/ Name: __utmc
Value: 204792322
.disqus.com/ Name: __utmc
Value: 40641725
www.coindesk.com/ Name: _omappvs
Value: true
www.coindesk.com/ Name: bm_daily_unique
Value: true
.coindesk.com/ Name: cX_P
Value: jgsfefkess30x55f
.facebook.com/ Name: fr
Value: 0a8Xu8wLaw6eqQVYC..Ba7MW7...1.0.Ba7MW7.
.disqus.com/ Name: G_ENABLED_IDPS
Value: google
.coindesk.com/ Name: optimizelyPendingLogEvents
Value: %5B%5D
.coindesk.com/ Name: optimizelySegments
Value: %7B%7D
.amazon-adsystem.com/ Name: ad-id
Value: AwZLmQrRSU6HizHGzvxb6Rg
.coindesk.com/ Name: optimizelyBuckets
Value: %7B%7D
.rezync.com/ Name: zync-uuid
Value: 877f0468-492f-4d5f-8837-a3bd106a8b5f:1525466558.01
.coindesk.com/ Name: __cfduid
Value: d8c482d84c949edfb21204e6f2c87988c1525466553
www.coindesk.com/monero-mining-malware-attack-linked-to-egyptian-telecom-giant Name: trctestcookie
Value: ok

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

a.company-target.com
a.optmstr.com
a.optnmstr.com
a.pub.network
aax.amazon-adsystem.com
ads.programattik.com
ads.yahoo.com
adservice.google.com
adservice.google.nl
ajax.googleapis.com
an.facebook.com
analytics.twitter.com
ap.lijit.com
api.coindesk.com
api.optmstr.com
api.parsely.com
asset.pagefair.com
asset.pagefair.net
b1sync.zemanta.com
bh.contextweb.com
bid.contextweb.com
bidder.criteo.com
bttrack.com
c.amazon-adsystem.com
c.disquscdn.com
c.pub.network
cdn-images.mailchimp.com
cdn.inspectlet.com
cdn.optimizely.com
cdn.revcontent.com
cdn.taboola.com
cm.g.doubleclick.net
cm.revcontent.com
coindesk.disqus.com
connect.facebook.net
d.adroll.com
d.pub.network
d1z2jf7jlzjs58.cloudfront.net
dc8xl0ndzn2cb.cloudfront.net
disqus.com
dsum-sec.casalemedia.com
eb2.3lift.com
fastlane.rubiconproject.com
fonts.googleapis.com
freestar-d.openx.net
g.cwkuki.com
graph.facebook.com
hbevents.1rx.io
hello.myfonts.net
hn.inspectlet.com
ib.adnxs.com
idsync.rlcdn.com
img.revcontent.com
labs-cdn.revcontent.com
m.servedby-buysellads.com
media.coindesk.com
media.msg.dotomi.com
opensharecount.com
p.skimresources.com
pagead2.googlesyndication.com
pixel.advertising.com
pixel.keywee.co
pixel.quantserve.com
pixel.rubiconproject.com
platform.twitter.com
r.skimresources.com
rules.quantcount.com
s.adroll.com
s.skimresources.com
sb.scorecardresearch.com
scdn.cxense.com
scomcluster.cxense.com
script.hotjar.com
secure.gravatar.com
secure.quantserve.com
securepubads.g.doubleclick.net
simage2.pubmatic.com
srv-2018-05-04-20.config.parsely.com
srv-2018-05-04-20.pixel.parsely.com
ssl.google-analytics.com
stags.bluekai.com
static.ads-twitter.com
static.criteo.net
static.hotjar.com
stats.g.doubleclick.net
stats.pagefair.com
sync.crwdcntrl.net
sync.outbrain.com
t.co
t.skimresources.com
t.visx.net
tag.1rx.io
tpc.googlesyndication.com
trc.taboola.com
trends.revcontent.com
us-u.openx.net
www.coindesk.com
www.facebook.com
www.google-analytics.com
www.google.com
www.google.nl
www.googletagservices.com
www.linkedin.com
www.reddit.com
x.bidswitch.net
x.skimresources.com
104.109.82.245
104.155.128.21
104.16.78.166
104.17.106.195
104.20.183.9
104.20.90.61
104.244.42.133
104.244.42.195
104.244.43.112
104.27.106.38
104.27.165.180
107.22.194.189
108.161.189.78
151.101.12.134
151.101.12.166
151.101.13.140
151.101.14.2
151.101.14.202
151.101.192.134
172.217.16.194
172.217.21.226
172.217.22.34
172.217.23.129
172.217.23.130
172.217.23.142
172.227.119.12
172.227.124.249
173.241.240.143
173.241.240.220
178.250.0.74
178.250.2.89
178.63.12.208
18.196.109.185
185.60.216.15
185.60.216.19
185.60.216.35
185.63.145.1
192.0.73.2
192.132.33.27
198.47.127.15
199.96.57.6
2.18.233.40
2.18.234.21
204.2.250.100
205.185.216.10
205.185.216.42
216.58.207.42
216.58.207.66
216.58.207.67
216.58.207.68
216.58.207.74
216.58.214.40
216.58.214.66
217.12.15.83
23.111.11.100
23.111.11.222
23.111.11.83
23.111.9.30
23.45.97.170
34.226.0.232
34.233.103.206
34.237.174.116
35.156.182.21
35.187.123.169
35.190.24.107
35.190.59.101
35.190.91.160
35.201.83.118
35.205.46.65
35.226.96.66
37.252.172.27
37.252.172.42
46.51.193.174
5.153.8.144
50.17.52.222
52.18.169.38
52.211.79.86
52.222.162.71
52.222.163.221
52.222.163.55
52.222.168.128
52.222.170.116
52.222.175.184
52.4.118.65
52.44.144.199
52.54.147.76
52.58.8.245
52.58.8.97
52.94.218.7
54.154.30.221
54.245.238.60
54.247.77.12
54.76.124.19
54.77.248.219
62.67.193.75
62.67.193.96
63.215.202.75
64.233.166.156
74.214.194.134
79.125.105.126
95.172.94.34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