mdsattacks.com
Open in
urlscan Pro
2606:4700:3033::6815:2608
Public Scan
Effective URL: https://mdsattacks.com/
Submission: On October 11 via api from US — Scanned from US
Summary
TLS certificate: Issued by WE1 on September 22nd 2024. Valid for: 3 months.
This is the only time mdsattacks.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 22 | 2606:4700:303... 2606:4700:3033::6815:2608 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 104.18.10.207 104.18.10.207 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 2606:4700:303... 2606:4700:3037::ac43:8ef5 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2600:9000:21f... 2600:9000:21f9:ac00:1e:dd27:2100:93a1 | 16509 (AMAZON-02) (AMAZON-02) | |
1 1 | 134.96.225.252 134.96.225.252 | 680 (DFN Verei...) (DFN Verein zur Foerderung eines Deutschen Forschungsnetzes e.V.) | |
1 2 | 212.21.165.114 212.21.165.114 | 9022 (TWL-KOM-A...) (TWL-KOM-AS Donnersbergweg 4) | |
6 | 2607:f8b0:400... 2607:f8b0:400d:c00::5d | 15169 (GOOGLE) (GOOGLE) | |
1 | 172.253.115.136 172.253.115.136 | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a04:4e42::649 2a04:4e42::649 | 54113 (FASTLY) (FASTLY) | |
2 | 104.17.25.14 104.17.25.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
40 | 9 |
ASN13335 (CLOUDFLARENET, US)
www.mdsattacks.com | |
mdsattacks.com |
ASN13335 (CLOUDFLARENET, US)
stackpath.bootstrapcdn.com | |
maxcdn.bootstrapcdn.com |
ASN680 (DFN Verein zur Foerderung eines Deutschen Forschungsnetzes e.V., DE)
PTR: www.cispa.uni-saarland.de
cispa.saarland |
ASN9022 (TWL-KOM-AS Donnersbergweg 4, DE)
PTR: cispa-webp01.cispa.she.de
cispa.de |
Apex Domain Subdomains |
Transfer | |
---|---|---|
22 |
mdsattacks.com
1 redirects
www.mdsattacks.com mdsattacks.com |
3 MB |
7 |
youtube.com
www.youtube.com — Cisco Umbrella Rank: 77 |
|
4 |
bootstrapcdn.com
stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 3270 maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 1113 |
125 KB |
3 |
fontawesome.com
use.fontawesome.com — Cisco Umbrella Rank: 1222 |
159 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 220 |
11 KB |
2 |
cispa.de
1 redirects
cispa.de |
72 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 791 |
24 KB |
1 |
cispa.saarland
1 redirects
cispa.saarland |
313 B |
1 |
vusec.net
www.vusec.net |
31 KB |
40 | 9 |
Domain | Requested by | |
---|---|---|
21 | mdsattacks.com |
mdsattacks.com
|
7 | www.youtube.com |
mdsattacks.com
|
3 | use.fontawesome.com |
mdsattacks.com
use.fontawesome.com |
2 | cdnjs.cloudflare.com |
mdsattacks.com
|
2 | cispa.de |
1 redirects
mdsattacks.com
|
2 | maxcdn.bootstrapcdn.com |
mdsattacks.com
maxcdn.bootstrapcdn.com |
2 | stackpath.bootstrapcdn.com |
mdsattacks.com
|
1 | code.jquery.com |
mdsattacks.com
|
1 | cispa.saarland | 1 redirects |
1 | www.vusec.net |
mdsattacks.com
|
1 | www.mdsattacks.com | 1 redirects |
40 | 11 |
This site contains links to these domains. Also see Links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
mdsattacks.com WE1 |
2024-09-22 - 2024-12-21 |
3 months | crt.sh |
bootstrapcdn.com WE1 |
2024-09-20 - 2024-12-19 |
3 months | crt.sh |
use.fontawesome.com WE1 |
2024-09-09 - 2024-12-09 |
3 months | crt.sh |
www.vusec.net Amazon RSA 2048 M03 |
2024-06-05 - 2025-07-04 |
a year | crt.sh |
*.google.com WR2 |
2024-09-24 - 2024-12-17 |
3 months | crt.sh |
*.jquery.com Sectigo ECC Domain Validation Secure Server CA |
2024-06-25 - 2025-06-25 |
a year | crt.sh |
cdnjs.cloudflare.com WE1 |
2024-09-28 - 2024-12-27 |
3 months | crt.sh |
This page contains 8 frames:
Primary Page:
https://mdsattacks.com/
Frame ID: 6D3D9CAB34255E399F69BA873AB9C401
Requests: 33 HTTP requests in this frame
Frame:
https://www.youtube.com/embed/4DQAcCfg3b8
Frame ID: B5F89981FC88EA737FF415E56ECF746A
Requests: 1 HTTP requests in this frame
Frame:
https://www.youtube.com/embed/UV9GDcOWeeI
Frame ID: 36DDEA611560D2D6343C1ED61275D1B9
Requests: 1 HTTP requests in this frame
Frame:
https://www.youtube.com/embed/KAgoDQmod1Y
Frame ID: A5316B6910576BF1D67D143C3BA8B02D
Requests: 1 HTTP requests in this frame
Frame:
https://www.youtube.com/embed/1Y0h4JyK3fs
Frame ID: A34DC122E5076C78C358E4C6D69AAE19
Requests: 1 HTTP requests in this frame
Frame:
https://www.youtube.com/embed/baXY8NezHE0
Frame ID: 39F09B98D87E807ABA5505A340BD8931
Requests: 1 HTTP requests in this frame
Frame:
https://www.youtube.com/embed/4DQAcCfg3b8
Frame ID: 4A3C54775CEAF51C0B5202750114CEA8
Requests: 1 HTTP requests in this frame
Frame:
https://www.youtube.com/embed/zaTxBZXE9pQ
Frame ID: 696F83570FF0E416D4F293698C0F61C0
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
MDS Attacks: Microarchitectural Data SamplingPage URL History Show full URLs
-
http://www.mdsattacks.com/
HTTP 307
https://www.mdsattacks.com/ HTTP 301
https://mdsattacks.com/ Page URL
Detected technologies
WordPress (CMS) ExpandDetected patterns
- /wp-(?:content|includes)/
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Lightbox (JavaScript Libraries) Expand
Detected patterns
- <link [^>]*href="[^"]+lightbox(?:\.min)?\.css
- lightbox(?:-plus-jquery)?.{0,32}\.js
Popper (Miscellaneous) Expand
Detected patterns
- /popper\.js/([0-9.]+)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
88 Outgoing links
These are links going to different origins than the main page.
Title: CrossTalk (SRBDS)
Search URL Search Domain Scan URL
Title: paper
Search URL Search Domain Scan URL
Title: LVI
Search URL Search Domain Scan URL
Title: Snoop
Search URL Search Domain Scan URL
Title: 40th IEEE Symposium on Security and Privacy
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Code
Search URL Search Domain Scan URL
Title: 26th ACM Conference on Computer and Communications Security
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Stephan van Schaik
Search URL Search Domain Scan URL
Title: Alyssa Milburn
Search URL Search Domain Scan URL
Title: Sebastian Österlund
Search URL Search Domain Scan URL
Title: Pietro Frigo
Search URL Search Domain Scan URL
Title: Kaveh Razavi
Search URL Search Domain Scan URL
Title: Herbert Bos
Search URL Search Domain Scan URL
Title: Cristiano Giuffrida
Search URL Search Domain Scan URL
Title: Giorgi Maisuradze
Search URL Search Domain Scan URL
Title: Claudio Canella
Search URL Search Domain Scan URL
Title: Daniel Genkin
Search URL Search Domain Scan URL
Title: University of Michigan
Search URL Search Domain Scan URL
Title: Lukas Giner
Search URL Search Domain Scan URL
Title: Daniel Gruss
Search URL Search Domain Scan URL
Title: Moritz Lipp
Search URL Search Domain Scan URL
Title: Marina Minkin
Search URL Search Domain Scan URL
Title: Daniel Moghimi
Search URL Search Domain Scan URL
Title: Frank Piessens
Search URL Search Domain Scan URL
Title: Michael Schwarz
Search URL Search Domain Scan URL
Title: Berk Sunar
Search URL Search Domain Scan URL
Title: Jo Van Bulck
Search URL Search Domain Scan URL
Title: Yuval Yarom
Search URL Search Domain Scan URL
Title: Dan Horea Lutas' team
Search URL Search Domain Scan URL
Title: Michael Schwarz
Search URL Search Domain Scan URL
Title: Moritz Lipp
Search URL Search Domain Scan URL
Title: TU Graz
Search URL Search Domain Scan URL
Title: Jo Van Bulck
Search URL Search Domain Scan URL
Title: KU Leuven
Search URL Search Domain Scan URL
Title: ZombieLoadattack.com
Search URL Search Domain Scan URL
Title: Julian Stecklina
Search URL Search Domain Scan URL
Title: Thomas Prescher
Search URL Search Domain Scan URL
Title: Cyberus Technology
Search URL Search Domain Scan URL
Title: Lei Shi
Search URL Search Domain Scan URL
Title: Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco
Search URL Search Domain Scan URL
Title: Intel
Search URL Search Domain Scan URL
Title: Matt Miller, Brandon Falk
Search URL Search Domain Scan URL
Title: Volodymyr Pikhur
Search URL Search Domain Scan URL
Title: Spectre
Search URL Search Domain Scan URL
Title: Foreshadow
Search URL Search Domain Scan URL
Title: [MFBDS] CVE-2018-12130
Search URL Search Domain Scan URL
Title: [MLPDS] CVE-2018-12127
Search URL Search Domain Scan URL
Title: [MDSUM] CVE-2019-11091,
Search URL Search Domain Scan URL
Title: [TAA] CVE-2019-11135
Search URL Search Domain Scan URL
Title: [MSBDS] CVE-2018-12126
Search URL Search Domain Scan URL
Title: [L1DES] CVE-2020-0549
Search URL Search Domain Scan URL
Title: [VRS] CVE-2020-0548
Search URL Search Domain Scan URL
Title: @themadstephan
Search URL Search Domain Scan URL
Title: Intel
Search URL Search Domain Scan URL
Title: Security Advisory
Search URL Search Domain Scan URL
Title: CVE-2020-0551: "Load Value Injection (LVI)"
Search URL Search Domain Scan URL
Title: CVE-2020-0550: "Snoop-assisted L1 Data Sampling (Snoop)"
Search URL Search Domain Scan URL
Title: CVE-2020-0543: "Special Register Buffer Data Sampling (SRBDS)"
Search URL Search Domain Scan URL
Title: CC0
Search URL Search Domain Scan URL
Title: 1st AMSEC Workshop: Security in Diversity
Search URL Search Domain Scan URL
Title: Cybersecurity and Privacy (CySeP) Summer School
Search URL Search Domain Scan URL
Title: OFFZONE
Search URL Search Domain Scan URL
Title: HITB CyberWeek
Search URL Search Domain Scan URL
Title: CSAW '19
Search URL Search Domain Scan URL
Title: L1D Eviction Sampling (L1DES)
Search URL Search Domain Scan URL
Title: camera-ready version of the RIDL paper
Search URL Search Domain Scan URL
Title: CacheOut team
Search URL Search Domain Scan URL
Title: Vector Register Sampling (VRS)
Search URL Search Domain Scan URL
Title: Jonas Theis
Search URL Search Domain Scan URL
Title: analysis
Search URL Search Domain Scan URL
Title: New York Times
Search URL Search Domain Scan URL
Title: Ars Technica
Search URL Search Domain Scan URL
Title: WIRED
Search URL Search Domain Scan URL
Title: De Volkskrant
Search URL Search Domain Scan URL
Title: NRC Next
Search URL Search Domain Scan URL
Title: Tweakers
Search URL Search Domain Scan URL
Title: RTL nieuws
Search URL Search Domain Scan URL
Title: AVRO Tros
Search URL Search Domain Scan URL
Title: The Verge
Search URL Search Domain Scan URL
Title: ZDNet
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.mdsattacks.com/
HTTP 307
https://www.mdsattacks.com/ HTTP 301
https://mdsattacks.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 9- https://cispa.saarland/img/CISPA_only_web_mobile.png HTTP 308
- https://cispa.de/img/CISPA_only_web_mobile.png HTTP 301
- https://cispa.de/_default_upload_bucket/CISPA_only_web_mobile.png
40 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
mdsattacks.com/ Redirect Chain
|
927 KB 139 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
speculation
mdsattacks.com/cdn-cgi/ |
128 B 474 B |
Other
application/speculationrules+json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.css
stackpath.bootstrapcdn.com/bootstrap/4.3.1/css/ |
152 KB 24 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.css
use.fontawesome.com/releases/v5.8.2/css/ |
54 KB 13 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
font-awesome.min.css
maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/ |
30 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
mdsattacks.com/css/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
timeline.css
mdsattacks.com/css/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
skylake.css
mdsattacks.com/css/ |
1 KB 1000 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mds.svg
mdsattacks.com/logos/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vusec-logo_large-768x172.png
www.vusec.net/wp-content/uploads/2016/04/ |
30 KB 31 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
CISPA_only_web_mobile.png
cispa.de/_default_upload_bucket/ Redirect Chain
|
70 KB 71 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
umich.png
mdsattacks.com/logos/ |
15 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
adelaide.png
mdsattacks.com/logos/ |
47 KB 48 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
data61.png
mdsattacks.com/logos/ |
58 KB 59 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wpi.png
mdsattacks.com/logos/ |
590 KB 591 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
gratz.png
mdsattacks.com/logos/ |
21 KB 21 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
kuleuven.png
mdsattacks.com/logos/ |
16 KB 16 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
4DQAcCfg3b8
www.youtube.com/embed/ Frame B5F8 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
UV9GDcOWeeI
www.youtube.com/embed/ Frame 36DD |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KAgoDQmod1Y
www.youtube.com/embed/ Frame A531 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1Y0h4JyK3fs
www.youtube.com/embed/ Frame A34D |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
baXY8NezHE0
www.youtube.com/embed/ Frame 39F0 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
4DQAcCfg3b8
www.youtube.com/embed/ Frame 4A3C |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
zaTxBZXE9pQ
www.youtube.com/embed/ Frame 696F |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mdstool.png
mdsattacks.com/images/ |
18 KB 19 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
skylake-lite.svg
mdsattacks.com/images/ |
487 KB 61 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
overview.svg
mdsattacks.com/images/ |
11 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
beer.jpg
mdsattacks.com/images/ |
966 KB 968 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
rack.jpg
mdsattacks.com/images/ |
641 KB 642 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
patents.jpg
mdsattacks.com/images/ |
636 KB 637 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
email-decode.min.js
mdsattacks.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.3.1.slim.min.js
code.jquery.com/ |
68 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
popper.min.js
cdnjs.cloudflare.com/ajax/libs/popper.js/1.14.7/umd/ |
21 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.3.1/js/ |
57 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ekko-lightbox.min.js
cdnjs.cloudflare.com/ajax/libs/ekko-lightbox/5.3.0/ |
14 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
skylake.js
mdsattacks.com/js/ |
291 B 659 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-solid-900.woff2
use.fontawesome.com/releases/v5.8.2/webfonts/ |
73 KB 73 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
fontawesome-webfont.woff2
maxcdn.bootstrapcdn.com/font-awesome/4.7.0/fonts/ |
75 KB 76 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-brands-400.woff2
use.fontawesome.com/releases/v5.8.2/webfonts/ |
73 KB 73 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mds.png
mdsattacks.com/logos/ |
36 KB 37 KB |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| 1 object| 2 object| 3 object| 4 object| 5 object| 6 function| $ function| jQuery function| Popper object| bootstrap3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.youtube.com/ | Name: YSC Value: wkKCAAyRzs0 |
|
.youtube.com/ | Name: VISITOR_INFO1_LIVE Value: JQoTFgWwBno |
|
.youtube.com/ | Name: VISITOR_PRIVACY_METADATA Value: CgJVUxIEGgAgLQ%3D%3D |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
cispa.de
cispa.saarland
code.jquery.com
maxcdn.bootstrapcdn.com
mdsattacks.com
stackpath.bootstrapcdn.com
use.fontawesome.com
www.mdsattacks.com
www.vusec.net
www.youtube.com
104.17.25.14
104.18.10.207
134.96.225.252
172.253.115.136
212.21.165.114
2600:9000:21f9:ac00:1e:dd27:2100:93a1
2606:4700:3033::6815:2608
2606:4700:3037::ac43:8ef5
2607:f8b0:400d:c00::5d
2a04:4e42::649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