Submitted URL: https://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGWlwzHJZCDqbswoUxZdX70nL30BnYPp572VhPywT5pQTzLEICX5iqTS9Aa_Covm6Xg7V1r-UM=
Effective URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3...
Submission: On November 11 via api from IN — Scanned from DE

Summary

This website contacted 34 IPs in 4 countries across 23 domains to perform 224 HTTP transactions. The main IP is 50.56.167.254, located in United States and belongs to RMH-14, US. The main domain is www.databreachtoday.com. The Cisco Umbrella rank of the primary domain is 445907.
TLS certificate: Issued by Go Daddy Secure Certificate Authority... on July 30th 2024. Valid for: a year.
This is the only time www.databreachtoday.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 104.17.74.206 13335 (CLOUDFLAR...)
31 50.56.167.254 33070 (RMH-14)
1 2a00:1450:400... 15169 (GOOGLE)
1 3.160.150.71 16509 (AMAZON-02)
78 23.209.23.77 16625 (AKAMAI-AS)
1 104.130.251.6 33070 (RMH-14)
1 2a00:1450:400... 15169 (GOOGLE)
2 23.199.214.136 16625 (AKAMAI-AS)
3 2a00:1450:400... 15169 (GOOGLE)
2 142.250.186.99 15169 (GOOGLE)
1 199.232.196.134 54113 (FASTLY)
2 34.117.77.79 396982 (GOOGLE-CL...)
1 2600:9000:206... 16509 (AMAZON-02)
2 35.156.183.132 16509 (AMAZON-02)
2 2a02:26f0:350... 20940 (AKAMAI-ASN1)
13 23.53.43.58 20940 (AKAMAI-ASN1)
1 3.219.124.110 14618 (AMAZON-AES)
2 172.217.18.2 15169 (GOOGLE)
2 192.28.147.68 15224 (OMNITURE)
2 2620:1ec:29:1... 8075 (MICROSOFT...)
5 2600:9000:206... 16509 (AMAZON-02)
1 151.101.192.134 54113 (FASTLY)
1 3 2620:1ec:21::14 8068 (MICROSOFT...)
1 13.107.42.14 8068 (MICROSOFT...)
2 2a02:26f0:ab0... 20940 (AKAMAI-ASN1)
41 142.250.74.194 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 99.83.231.3 16509 (AMAZON-02)
3 2001:4860:480... 15169 (GOOGLE)
3 2600:9000:215... 16509 (AMAZON-02)
8 2a00:1450:400... 15169 (GOOGLE)
1 1 35.71.131.137 16509 (AMAZON-02)
1 13.225.83.200 16509 (AMAZON-02)
3 23.96.124.68 8075 (MICROSOFT...)
224 34
78    23.209.23.77 (Vienna, Austria)
ASN16625 (AKAMAI-AS, US)
PTR: a23-209-23-77.deploy.static.akamaitechnologies.com
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
Apex Domain
Subdomains
Transfer
78 rackcdn.com
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 300626
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 962745
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 913077
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 433197
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 676131
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 403058
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 359278
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
8 MB
50 googlesyndication.com
pagead2.googlesyndication.com — Cisco Umbrella Rank: 116
9709a20d219a1608138fbdc6c139f766.safeframe.googlesyndication.com
tpc.googlesyndication.com — Cisco Umbrella Rank: 163
613 KB
31 databreachtoday.com
www.databreachtoday.com — Cisco Umbrella Rank: 445907
473 KB
17 6sc.co
j.6sc.co — Cisco Umbrella Rank: 5626
c.6sc.co — Cisco Umbrella Rank: 6951
ipv6.6sc.co — Cisco Umbrella Rank: 5794
b.6sc.co — Cisco Umbrella Rank: 3611
eps.6sc.co — Cisco Umbrella Rank: 11869
23 KB
7 sharethis.com
platform-api.sharethis.com — Cisco Umbrella Rank: 4938
buttons-config.sharethis.com — Cisco Umbrella Rank: 5686
l.sharethis.com — Cisco Umbrella Rank: 5365
platform-cdn.sharethis.com — Cisco Umbrella Rank: 10495
50 KB
5 ensighten.com
nexus.ensighten.com — Cisco Umbrella Rank: 4670
21 KB
5 clarity.ms
www.clarity.ms — Cisco Umbrella Rank: 634
s.clarity.ms — Cisco Umbrella Rank: 7093
29 KB
4 linkedin.com
px.ads.linkedin.com — Cisco Umbrella Rank: 321
px4.ads.linkedin.com — Cisco Umbrella Rank: 6828
3 KB
3 google-analytics.com
region1.google-analytics.com — Cisco Umbrella Rank: 3643
3 ml314.com
ml314.com — Cisco Umbrella Rank: 1614
in.ml314.com — Cisco Umbrella Rank: 11277
13 KB
3 googletagmanager.com
www.googletagmanager.com — Cisco Umbrella Rank: 39
276 KB
2 mktoresp.com
051-zxi-237.mktoresp.com
636 B
2 doubleclick.net
securepubads.g.doubleclick.net — Cisco Umbrella Rank: 215
151 KB
2 disqus.com
bankinfosecurity.disqus.com
disqus.com — Cisco Umbrella Rank: 1153
26 KB
2 gstatic.com
fonts.gstatic.com
96 KB
2 marketo.net
munchkin.marketo.net — Cisco Umbrella Rank: 3657
6 KB
2 ismgcorp.com
links.ismgcorp.com — Cisco Umbrella Rank: 358227
worker.ismgcorp.com — Cisco Umbrella Rank: 575707
2 KB
1 cloudfront.net
d1eoo1tco6rr5e.cloudfront.net
1 adsrvr.org
insight.adsrvr.org — Cisco Umbrella Rank: 945
87 B
1 licdn.com
snap.licdn.com — Cisco Umbrella Rank: 784
14 KB
1 bizographics.com
sjs.bizographics.com — Cisco Umbrella Rank: 42347
17 KB
1 googletagservices.com
www.googletagservices.com — Cisco Umbrella Rank: 307
33 KB
1 googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 30
3 KB
224 23
Domain Requested by
41 pagead2.googlesyndication.com securepubads.g.doubleclick.net
links.ismgcorp.com
pagead2.googlesyndication.com
31 www.databreachtoday.com links.ismgcorp.com
www.databreachtoday.com
17 130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com www.databreachtoday.com
15 75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com www.databreachtoday.com
10 dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com www.databreachtoday.com
10 0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com www.databreachtoday.com
9 b.6sc.co www.databreachtoday.com
8 tpc.googlesyndication.com securepubads.g.doubleclick.net
tpc.googlesyndication.com
6 6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com www.databreachtoday.com
5 nexus.ensighten.com www.googletagmanager.com
nexus.ensighten.com
5 752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com www.databreachtoday.com
4 21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com www.databreachtoday.com
4 fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com www.databreachtoday.com
4 4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com www.databreachtoday.com
3 s.clarity.ms www.clarity.ms
3 platform-cdn.sharethis.com www.databreachtoday.com
3 region1.google-analytics.com www.googletagmanager.com
3 px.ads.linkedin.com 1 redirects sjs.bizographics.com
snap.licdn.com
3 www.googletagmanager.com www.databreachtoday.com
www.googletagmanager.com
3 f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com www.databreachtoday.com
2 eps.6sc.co j.6sc.co
2 ipv6.6sc.co j.6sc.co
2 c.6sc.co j.6sc.co
2 www.clarity.ms links.ismgcorp.com
www.clarity.ms
2 051-zxi-237.mktoresp.com munchkin.marketo.net
2 securepubads.g.doubleclick.net www.googletagservices.com
2 j.6sc.co www.databreachtoday.com
links.ismgcorp.com
2 l.sharethis.com www.databreachtoday.com
platform-api.sharethis.com
2 ml314.com www.databreachtoday.com
ml314.com
2 fonts.gstatic.com fonts.googleapis.com
2 munchkin.marketo.net www.databreachtoday.com
munchkin.marketo.net
1 d1eoo1tco6rr5e.cloudfront.net nexus.ensighten.com
1 insight.adsrvr.org 1 redirects
1 9709a20d219a1608138fbdc6c139f766.safeframe.googlesyndication.com securepubads.g.doubleclick.net
1 px4.ads.linkedin.com www.databreachtoday.com
1 disqus.com bankinfosecurity.disqus.com
1 in.ml314.com ml314.com
1 snap.licdn.com www.databreachtoday.com
1 sjs.bizographics.com www.databreachtoday.com
1 buttons-config.sharethis.com platform-api.sharethis.com
1 bankinfosecurity.disqus.com www.databreachtoday.com
1 www.googletagservices.com www.databreachtoday.com
1 worker.ismgcorp.com www.databreachtoday.com
1 platform-api.sharethis.com www.databreachtoday.com
1 fonts.googleapis.com www.databreachtoday.com
1 links.ismgcorp.com
224 46
Subject Issuer Validity Valid
links.ismgcorp.com
E6
2024-10-25 -
2025-01-23
3 months crt.sh
ismg.io
Go Daddy Secure Certificate Authority - G2
2024-07-30 -
2025-07-30
a year crt.sh
upload.video.google.com
WR2
2024-10-07 -
2024-12-30
3 months crt.sh
sharethis.com
Amazon RSA 2048 M03
2024-04-19 -
2025-05-17
a year crt.sh
*.ssl.cf1.rackcdn.com
DigiCert TLS RSA SHA256 2020 CA1
2024-01-29 -
2025-01-29
a year crt.sh
worker.ismgcorp.com
Go Daddy Secure Certificate Authority - G2
2024-02-13 -
2025-03-16
a year crt.sh
*.g.doubleclick.net
WR2
2024-10-07 -
2024-12-30
3 months crt.sh
*.marketo.net
DigiCert TLS RSA SHA256 2020 CA1
2024-10-22 -
2025-10-24
a year crt.sh
*.google-analytics.com
WR2
2024-10-07 -
2024-12-30
3 months crt.sh
*.gstatic.com
WR2
2024-10-07 -
2024-12-30
3 months crt.sh
*.disqus.com
Sectigo RSA Domain Validation Secure Server CA
2024-04-16 -
2025-04-16
a year crt.sh
event-horizon.gcp.bomm.in
WR3
2024-10-18 -
2025-01-16
3 months crt.sh
js.bizographics.com
DigiCert SHA2 Secure Server CA
2024-07-12 -
2025-07-11
a year crt.sh
snap.licdn.com
DigiCert SHA2 Secure Server CA
2023-12-13 -
2024-12-12
a year crt.sh
6sc.co
R10
2024-09-23 -
2024-12-22
3 months crt.sh
*.ml314.com
Amazon RSA 2048 M02
2024-09-14 -
2025-10-11
a year crt.sh
*.mktoresp.com
DigiCert Global G2 TLS RSA SHA256 2020 CA1
2024-08-15 -
2025-09-15
a year crt.sh
www.clarity.ms
DigiCert TLS RSA SHA256 2020 CA1
2024-09-04 -
2025-09-04
a year crt.sh
nexus.ensighten.com
Amazon RSA 2048 M03
2024-08-29 -
2025-09-28
a year crt.sh
www.linkedin.com
DigiCert SHA2 Secure Server CA
2024-10-14 -
2025-04-14
6 months crt.sh
eps.6sc.co
Amazon RSA 2048 M02
2024-08-29 -
2025-09-27
a year crt.sh
tpc.googlesyndication.com
WR2
2024-10-07 -
2024-12-30
3 months crt.sh
*.cloudfront.net
Amazon RSA 2048 M01
2024-07-30 -
2025-07-03
a year crt.sh
a.clarity.ms
Microsoft Azure RSA TLS Issuing CA 08
2024-06-23 -
2025-06-18
a year crt.sh

This page contains 11 frames:

Primary Page: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Frame ID: B94AC7B801AA086A63B714BAB317DFFD
Requests: 174 HTTP requests in this frame

Frame: https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709&t_d=Chinese%20Hackers%20Use%20Quad7%20Botnet%20for%20Credential%20Theft&t_t=Chinese%20Hackers%20Use%20Quad7%20Botnet%20for%20Credential%20Theft&s_o=default
Frame ID: 8A38CCA97709C505EFBE5B1B574ABAD8
Requests: 1 HTTP requests in this frame

Frame: https://9709a20d219a1608138fbdc6c139f766.safeframe.googlesyndication.com/safeframe/1-0-40/html/container.html
Frame ID: B54D943891BE602592C82F37821D942B
Requests: 1 HTTP requests in this frame

Frame: https://pagead2.googlesyndication.com/pcs/view?xai=AKAOjstzIvOfe9kQnRalB6CYV_5Sm7KDi8-VfFf6ADare3K9IEkjF_PWxnOyxEEn5PWwQWSSMyn0lYEjpIr3yDfitj7WmkywSvziOeSEYyHKQREkorYkcezXlRXs9hW5flv8vwWpvSlIdIn7a7uO4XNSjkbne-MEreRGMEKHXBD01ScJ-caS0hLm12aY6JNFG0rGfFFxvbxmz3HRs1mo8Ra-_hd03PyR8ztmBq59z7EzwabAwCaL-cBI5CzUyjtFvdBYmYEXbpNIKwEKVKhkEqbwfZ2EjDO7VuRZVAnUXjuQKV-D_2DJHeNVVOdwr22aBHnyd7N55MBjY5zMUebb4dlXgjwp7F7WSW8uHXGsRMigMJe1rejZrJEx091iSE6siths6vgLL7OGlxf9MbZ3LOzJCMZkEg&sig=Cg0ArKJSzBv1lT3v38ZoEAE&uach_m=%5BUACH%5D&adurl=
Frame ID: 9C6735BE2B351DB0AA87862B00AEF6EE
Requests: 9 HTTP requests in this frame

Frame: https://pagead2.googlesyndication.com/pcs/view?xai=AKAOjstdWLfAncpkgoolvJIc61P-RqOHMcv2anm19G07b06gqJSD6DH0TQ_p0YTunXqZ7Zus1fFxCNeXp-Ta9hdIsT-cJGSXAlYQtY4nwN7Z3FAWGm7VbqaHLSHL3I1QTmQ3A72uf6aWtuO4dAr-yaBKc3LSiOkGXNMKyPeFpAymB16plPOMA8d61tU5x9K7fVRPPHvw9-S39E5PeKIozjKGyQI7s0cOkmqG4aCa1ypEHmIhPZtALweqebOlRpWi8eGTkBIXuZi67Ku5DhsjXf8Tgyi8kaXUI4_RjT8MeNTq_19FeK6Xhfjh6HX21PmImfqluhm_fQXPp1cXaLfPvAaIFcEN0TYONFxsySOz6w2ogn3VrRGHfTp9aUt9Pw_21HLMDAVC3BZ6CjX4oSNID_Rmq7SoSBHHRKo&sig=Cg0ArKJSzGxXQI7w3HwbEAE&uach_m=%5BUACH%5D&adurl=
Frame ID: A766A083D6BAED6DC3E48FB3DEDA7697
Requests: 9 HTTP requests in this frame

Frame: https://pagead2.googlesyndication.com/pcs/view?xai=AKAOjsv5QCXqhF1R2orIRoMVDMXVihg7FYdLQk6_kqjVmVyHU_H2-fYR-Sv7xbXJbouoDUv7Pciqg3BknaRAK_fKfi1mN-CSkSxK4l3vT5xw-E7Tdo3UkSxXFu4tuygbNj3fQldmPXMYbUVI1CC7akRi419VTbyvmfX27J6EpvUTiFcukYxfCB5Km0H9TAwe34VJaw1oE_w6nUvgwe2EYg9kuMsOE2njrWxd1PVsCpyICmzJ4C062V8GgZnR7DMkH5yr9BvKi3Ni6KhpwoiBwO7gLriV3nTPhg9Nz7-K6-bDHmNu_OaYIxHWCc_VVL15Qb59OpOBXFwPMmVkMJdlVUo-xeCWQFeMCgebJEesyr8dLFh_kwVAyPSoTw6zG10S8XpTQ8F8oZQzuOCsoBBP8gjJG-Rf_2o_rmEllQ&sig=Cg0ArKJSzGwfrrU98ZuLEAE&uach_m=%5BUACH%5D&adurl=
Frame ID: 515C05A474FA17493D135FDA61C32B72
Requests: 8 HTTP requests in this frame

Frame: https://pagead2.googlesyndication.com/pcs/view?xai=AKAOjsu8PYjoYnViohxvkVeHGwokZ4RRbvq4UIfc_-Zb0wXMvGm5Rhw53fturdo8VAVQ8vtKol_-nTc5NJWTAV2VpBJk5o3raR-_-tMpZ1L0lVETK639EFMP_3LWS0ex5PhYcgWmM2CIKnfs2YY1FkUpfd8JUQTqO8dC9ur5t2Am5FcWs7uSbKZBpIMWP_b--VQpvXB07Ik4n2avOhu4-UkqupEjK7tlM7sZAwTapcidEMS1US40xxow3mwtR1YdT2PDreK-NSY1SBG4PNRNFRLiWtHUy4Anbq93GUTdDamPjX6MH70jQrXOTRxu7uFw5wftox7Fqp9tcX-MW3i259FBKmPAN4teHAVA2UY6ycVhfy2L_riVzvCXeTscKu2St7pmVmuAJrV6WrBmIp3k7vmyvEcVdqLQxrw&sig=Cg0ArKJSzDY8MvH4z_FTEAE&uach_m=%5BUACH%5D&adurl=
Frame ID: B039B95D83FE4F479C840D7F2DF9CC70
Requests: 8 HTTP requests in this frame

Frame: https://pagead2.googlesyndication.com/pcs/view?xai=AKAOjss4d_NeWH-EYOD2imI-M3o7V-p2crjFxIEseSb4gBDKAVLId-TvZc85VPl0K7A2KSKrUKGE0A8is56wcAMLQ4pPBV3SpZnWTV76mAARoatCZFhQlb4lc7GrlJsBr9LOLUk39pXUgOCcGSz70WZPYIfpQMcUCVH2OLSqwlF-S08A8Vi-yDw7XZ6u9U-kcb5okSnSs3a4mWcUZUgV4mmo27yHLzRs0U_4J1Msbf9q9ea_OP88eRQqjtaMN99aUiM1c1eHhAIfluypz3GmAZ_7I_u3gG-j6lM2hgQNTopxYkRq1OJYIEjaqpiaQnKGzLFCwoy6RKMF9gjzcqJRxwMdFhUuSPipOaGKhXpXq4pta15oaqz9Xj8qVEbN1q4FtRciP-NofvRlXCiQhuACUK4TS5J6Aw&sig=Cg0ArKJSzJB6C43_Zl1eEAE&uach_m=%5BUACH%5D&adurl=
Frame ID: 5AE2219506F8686CBF8BEBD3101017E6
Requests: 9 HTTP requests in this frame

Frame: https://pagead2.googlesyndication.com/pcs/view?xai=AKAOjsvr0Gl1oCBpPMyui_bTYrZn7R5PkhZDsxFYy8Y_6pPsdam-9WumDDsSAfUiewludlFBjthMRhraWbUzd7DXN0rcqRs1oxnTUb1gKFUsQqZ1TCoi-jNqrdPyjKI9WN9UcRBzGJjEe-x8B1MWW9ZRZ79qXqn-soQg51NGz_CXdCj7_N6ZphxqOjWvxi1_Yw2sF8APfAqY_gY9JUE5LkwXCoOBi2KNnL5Gjt1hGBut7dFTjK6huk93cUvV8g0Ah4RmE7LtWpDgZpgpiS9EPp4-tW3Feq2IoZeRDyrEa8OgHjtoL5up5MhiPc2g_isYnPjhB3cOnoy1VwuvMFS2cE1vrNnbcXjRXxxNSYQ9ViEoTODz1fO6g1gDCS97jbzOc8ZRrJZE39BTpmfxzY9Z_aSrB2hXGs_fGA&sig=Cg0ArKJSzGwR2bcVmhHgEAE&uach_m=%5BUACH%5D&adurl=
Frame ID: 9B21426D84145A9D8F58920F862ED934
Requests: 8 HTTP requests in this frame

Frame: https://d1eoo1tco6rr5e.cloudfront.net/86s8kpd/lz0ctwz/iframe
Frame ID: 37C7217E4313A1702CDCF89B4BD092BA
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/232/runner.html
Frame ID: C19EB74342213B948E79C0D95A0EDCA0
Requests: 1 HTTP requests in this frame

Screenshot

Page Title

Chinese Hackers Use Quad7 Botnet for Credential Theft

Page URL History Show full URLs

  1. https://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGWlwzHJZCDqbswoUxZdX70nL30BnYPp572VhPywT5pQTzLEICX5iqTS9Aa... Page URL
  2. https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • /tiny_?mce(?:\.min)?\.js

Overall confidence: 100%
Detected patterns
  • bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js

Overall confidence: 100%
Detected patterns
  • googletagservices\.com/tag/js/gpt(?:_mobile)?\.js

Overall confidence: 100%
Detected patterns
  • //nexus\.ensighten\.com/

Overall confidence: 100%
Detected patterns
  • <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
  • <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
  • (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)

Overall confidence: 100%
Detected patterns
  • googlesyndication\.com/

Overall confidence: 100%
Detected patterns

Overall confidence: 100%
Detected patterns
  • <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com

Overall confidence: 100%
Detected patterns
  • googletagmanager\.com/gtm\.js
  • googletagmanager\.com/gtag/js

Overall confidence: 100%
Detected patterns
  • snap\.licdn\.com/li\.lms-analytics/insight\.min\.js

Overall confidence: 100%
Detected patterns
  • munchkin\.marketo\.\w+/(?:([\d.]+)/)?munchkin\.js

Overall confidence: 100%
Detected patterns
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Overall confidence: 100%
Detected patterns
  • jquery-ui.*\.js

Overall confidence: 100%
Detected patterns
  • (?:<link [^>]*href="[^"]*prettyPhoto(?:\.min)?\.css|<a [^>]*rel="prettyPhoto)
  • jquery\.prettyPhoto\.js

Page Statistics

224
Requests

99 %
HTTPS

38 %
IPv6

23
Domains

46
Subdomains

34
IPs

4
Countries

10387 kB
Transfer

19822 kB
Size

23
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGWlwzHJZCDqbswoUxZdX70nL30BnYPp572VhPywT5pQTzLEICX5iqTS9Aa_Covm6Xg7V1r-UM= Page URL
  2. https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 136
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749%2C2330930&time=1731317217078&url=https%3A%2F%2Fwww.databreachtoday.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709%3Frf%3D2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog HTTP 302
  • https://px4.ads.linkedin.com/collect?v=2&fmt=js&pid=749%2C2330930&time=1731317217078&url=https%3A%2F%2Fwww.databreachtoday.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709%3Frf%3D2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog&e_ipv6=AQJl0CP9k7O92wAAAZMajDl5-FizHhFSnPQdhBk7vueHwXv4_gSvTHVMzlwnDShbtA
Request Chain 194
  • https://insight.adsrvr.org/tags/86s8kpd/lz0ctwz/iframe HTTP 301
  • https://d1eoo1tco6rr5e.cloudfront.net/86s8kpd/lz0ctwz/iframe

224 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
MDUxLVpYSS0yMzcAAAGWlwzHJZCDqbswoUxZdX70nL30BnYPp572VhPywT5pQTzLEICX5iqTS9Aa_Covm6Xg7V1r-UM=
links.ismgcorp.com/
633 B
1 KB
Document
General
Full URL
https://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGWlwzHJZCDqbswoUxZdX70nL30BnYPp572VhPywT5pQTzLEICX5iqTS9Aa_Covm6Xg7V1r-UM=
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.17.74.206 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src 'self'; img-src 'self';script-src 'self' 'sha256-21+fkPNAehMLUvrwtwCXhliopOjls9tj34/w5NOZqQs=';object-src 'none';form-action 'none';frame-src 'none';style-src 'self'
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

cache-control
private, no-cache, no-store, max-age=0
cf-cache-status
DYNAMIC
cf-ray
8e0d3e446d4dbc01-FRA
content-security-policy
default-src 'self'; img-src 'self';script-src 'self' 'sha256-21+fkPNAehMLUvrwtwCXhliopOjls9tj34/w5NOZqQs=';object-src 'none';form-action 'none';frame-src 'none';style-src 'self'
content-type
text/html;charset=UTF-8
date
Mon, 11 Nov 2024 09:26:53 GMT
referrer-policy
strict-origin
server
cloudflare
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-request-id
ba59613d33c8cb95
Primary Request chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709
www.databreachtoday.com/
391 KB
53 KB
Document
General
Full URL
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Requested by
Host: links.ismgcorp.com
URL: https://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGWlwzHJZCDqbswoUxZdX70nL30BnYPp572VhPywT5pQTzLEICX5iqTS9Aa_Covm6Xg7V1r-UM=
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
df4f173876c05827f416e927bc64d6f707b5366ff75f5dd01310629dc2389e38
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

Referer
https://links.ismgcorp.com/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

alt-svc
h3=":443"; ma=2592000
cache-control
no-store, no-cache, must-revalidate
content-encoding
gzip
content-security-policy
frame-ancestors 'none'
content-type
text/html; charset=UTF-8
date
Mon, 11 Nov 2024 09:26:54 GMT
expires
Thu, 19 Nov 1981 08:52:00 GMT
pragma
no-cache
referrer-policy
strict-origin-when-cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
vary
Accept-Encoding
x-content-type-options
nosniff
x-frame-options
deny
x-xss-protection
1; mode=block
jquery-ui.min.css
www.databreachtoday.com/css-responsive/vendor/
25 KB
5 KB
Stylesheet
General
Full URL
https://www.databreachtoday.com/css-responsive/vendor/jquery-ui.min.css?s=1731317213.9896
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
fc54c09a7a71615ec35a22ed20afa4034588986ed88c3fc184b2c0bc637c33fb
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:54 GMT
content-type
text/css; charset=utf-8
vary
Accept-Encoding
x-frame-options
deny
mediaelementplayer-updated.css
www.databreachtoday.com/css-responsive/vendor/
11 KB
3 KB
Stylesheet
General
Full URL
https://www.databreachtoday.com/css-responsive/vendor/mediaelementplayer-updated.css?s=1731317213.9896
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
1a0bbdba57f90a60fef89419fc940d8eae55c5b0d12ecbadde2beaef32ab2d90
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
alt-svc
h3=":443"; ma=2592000
content-length
2729
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:54 GMT
content-type
text/css; charset=utf-8
vary
Accept-Encoding
x-frame-options
deny
css
fonts.googleapis.com/
57 KB
3 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:802::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
200ea2792715456ea62f7de0ab54444d6f417f183f61ecfb53bbfa78476194f9
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
gzip
x-content-type-options
nosniff
expires
Mon, 11 Nov 2024 09:26:54 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Mon, 11 Nov 2024 09:26:54 GMT
content-type
text/css; charset=utf-8
vary
Sec-Fetch-Dest, Sec-Fetch-Mode, Sec-Fetch-Site
last-modified
Mon, 11 Nov 2024 07:41:58 GMT
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=31536000
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
cross-origin-opener-policy
same-origin-allow-popups
cross-origin-resource-policy
cross-origin
access-control-allow-origin
*
x-xss-protection
0
server
ESF
main.css
www.databreachtoday.com/css-responsive/
232 KB
45 KB
Stylesheet
General
Full URL
https://www.databreachtoday.com/css-responsive/main.css?s=1731317213.9896
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
91283916a6e9695687bb57ed913fe6fae10324ebfcfa06d31209357e56ebc004
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:54 GMT
content-type
text/css; charset=utf-8
vary
Accept-Encoding
x-frame-options
deny
prettyPhoto.css
www.databreachtoday.com/css-responsive/
20 KB
3 KB
Stylesheet
General
Full URL
https://www.databreachtoday.com/css-responsive/prettyPhoto.css?s=1731317213.9896
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
7d5e2f10ede290b4ad0d1bb2861dfacae9754453f352923e85e7d101a7686b00
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
alt-svc
h3=":443"; ma=2592000
content-length
2993
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:54 GMT
content-type
text/css; charset=utf-8
vary
Accept-Encoding
x-frame-options
deny
bis-hdr.desktop.r2.css
www.databreachtoday.com/css-responsive/vendor/
8 KB
2 KB
Stylesheet
General
Full URL
https://www.databreachtoday.com/css-responsive/vendor/bis-hdr.desktop.r2.css?s=1731317213.9896
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
20b9ebf817b8dc640c06e993e5ae1127a6eb6b0c9fc6acbfb288f3b3a82405be
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
alt-svc
h3=":443"; ma=2592000
content-length
1997
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:54 GMT
content-type
text/css; charset=utf-8
vary
Accept-Encoding
x-frame-options
deny
bis-hdr.mobile.r2.css
www.databreachtoday.com/css-responsive/vendor/
9 KB
2 KB
Stylesheet
General
Full URL
https://www.databreachtoday.com/css-responsive/vendor/bis-hdr.mobile.r2.css?s=1731317213.9896
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
59400de556b42dee4aa3e6f7b73676a81e260d35481b6d8d77656ee45ae9484b
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
alt-svc
h3=":443"; ma=2592000
content-length
2183
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:54 GMT
content-type
text/css; charset=utf-8
vary
Accept-Encoding
x-frame-options
deny
font-awesome.min.css
www.databreachtoday.com/css-responsive/vendor/
22 KB
5 KB
Stylesheet
General
Full URL
https://www.databreachtoday.com/css-responsive/vendor/font-awesome.min.css?s=1731317213.9896
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
93f466f6b1a81c848140e51c839a5372034ab22182601e86dd86947ad3a7fe94
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:54 GMT
content-type
text/css; charset=utf-8
vary
Accept-Encoding
x-frame-options
deny
jquery.min.js
www.databreachtoday.com/javascripts-responsive/vendor/
91 KB
34 KB
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/vendor/jquery.min.js?s=1731317213.9896
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
eccabf5cc7613433c3ddc71ff34391ae850d304d3aceb5666868c4947134f3b5
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:54 GMT
content-type
text/javascript; charset=utf-8
vary
Accept-Encoding
x-frame-options
deny
bootstrap.min.js
www.databreachtoday.com/javascripts-responsive/vendor/
35 KB
10 KB
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/vendor/bootstrap.min.js?s=1731317213.9896
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
3fede2d0c0a8c93b0c5d0ab0c38289a5743bb88720255b8298c520d2e3d90939
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:54 GMT
content-type
text/javascript; charset=utf-8
vary
Accept-Encoding
x-frame-options
deny
jquery.validate.min.js
www.databreachtoday.com/javascripts-responsive/vendor/
21 KB
7 KB
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/vendor/jquery.validate.min.js?s=1731317213.9896
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
e51831d751ef667b1f703a47bb05802b681e6a30816f5cce0d56c3552a4eaa31
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:54 GMT
content-type
text/javascript; charset=utf-8
vary
Accept-Encoding
x-frame-options
deny
mediaelement-and-player-updated.min.js
www.databreachtoday.com/javascripts-responsive/vendor/
154 KB
39 KB
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/vendor/mediaelement-and-player-updated.min.js?s=1731317213.9896
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
4e7304371ef9bcaea396e8928a9647f8306c296b9195c8763848d70c7f6f1390
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:54 GMT
content-type
text/javascript; charset=utf-8
vary
Accept-Encoding
x-frame-options
deny
tinymce.min.js
www.databreachtoday.com/javascripts-responsive/vendor/
295 KB
105 KB
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/vendor/tinymce.min.js?s=1731317213.9896
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
247d04c4d14c60a79c16245a74a792a662f9e7adf784d68edd4520a35ec90251
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:54 GMT
content-type
text/javascript; charset=utf-8
vary
Accept-Encoding
x-frame-options
deny
jquery.validate.bootstrap.popover.js
www.databreachtoday.com/javascripts-responsive/vendor/
2 KB
988 B
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/vendor/jquery.validate.bootstrap.popover.js?s=1731317213.9896
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
04d304d7ee49ac157f146382a46f02a666279bd7f29074f50e863b88f2affae9
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
alt-svc
h3=":443"; ma=2592000
content-length
952
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:54 GMT
content-type
text/javascript; charset=utf-8
vary
Accept-Encoding
x-frame-options
deny
jquery.placeholder.js
www.databreachtoday.com/javascripts-responsive/vendor/
2 KB
972 B
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/vendor/jquery.placeholder.js?s=1731317213.9896
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
256a489beea4a14eca458f6e5436758f1fcb8dd34034d3c36dd21b22a5841f3b
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
alt-svc
h3=":443"; ma=2592000
content-length
936
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:54 GMT
content-type
text/javascript; charset=utf-8
vary
Accept-Encoding
x-frame-options
deny
jquery-ui.min.js
www.databreachtoday.com/javascripts-responsive/vendor/
222 KB
63 KB
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/vendor/jquery-ui.min.js?s=1731317213.9896
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
78cf63898c91ce3b95e37bc53e07adba5c2ee705ff28c2dd1dd784173c264ad1
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:54 GMT
content-type
text/javascript; charset=utf-8
vary
Accept-Encoding
x-frame-options
deny
crypt_des.js
www.databreachtoday.com/javascripts-responsive/vendor/
9 KB
3 KB
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/vendor/crypt_des.js?s=1731317213.9896
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
34f6a8e7792bc499cdcfcfae70d35a02766db4471551ec36844c3214357d6163
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
alt-svc
h3=":443"; ma=2592000
content-length
2829
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:54 GMT
content-type
text/javascript; charset=utf-8
vary
Accept-Encoding
x-frame-options
deny
sharethis.js
platform-api.sharethis.com/js/
206 KB
46 KB
Script
General
Full URL
https://platform-api.sharethis.com/js/sharethis.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
3.160.150.71 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-3-160-150-71.fra60.r.cloudfront.net
Software
/
Resource Hash
98d32b00fca86fc6994df33302e051a6ad03461a43ff5797d5b10ace4cf4772f
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Frame-Options SAMEORIGIN

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

strict-transport-security
max-age=31536000; includeSubDomains
cache-control
max-age=600, public
content-encoding
gzip
etag
W/"336d0-g/6wprihOkYe7HpMswOVDodT6lU"
age
336
via
1.1 a5607d37f6322bee208b762f730550a0.cloudfront.net (CloudFront)
x-cache
Hit from cloudfront
x-amz-cf-id
tToGG3oRaZoYDYxjJjLgnc8v8MDldd-sDtGqHkxQpjreqsI8psXvvA==
edge-control
cache-maxage=60m,downstream-ttl=60m
date
Mon, 11 Nov 2024 09:21:19 GMT
content-type
text/javascript; charset=utf-8
vary
Accept-Encoding
x-amz-cf-pop
FRA60-P7
x-frame-options
SAMEORIGIN
headerlogo-dbt.png
www.databreachtoday.com/images-responsive/logos/
6 KB
6 KB
Image
General
Full URL
https://www.databreachtoday.com/images-responsive/logos/headerlogo-dbt.png
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
11f8708cbc1a8d4570bdaafc5838a0fa583962e093540b5474546250da667ae9
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
accept-ranges
bytes
alt-svc
h3=":443"; ma=2592000
content-length
6430
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:54 GMT
content-type
image/png
vary
Accept-Encoding
x-frame-options
deny
ismg-editors-us-election-impact-on-cybersecurity-hipaa-showcase_image-7-a-26775.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
323 KB
324 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/ismg-editors-us-election-impact-on-cybersecurity-hipaa-showcase_image-7-a-26775.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e25ca28452a08647b0c74700c91a3a5ff732aa76a4bcc2e55331848d0d6ed7d7

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=43889
ETag
99b9d754650d6310c7111c76699439fa
X-Timestamp
1731106931.93759
Connection
keep-alive
Expires
Mon, 11 Nov 2024 21:38:23 GMT
Accept-Ranges
bytes
X-Trans-Id
txe11a848d91674b9dab657-00672e9c7edfw1
Content-Length
331030
Date
Mon, 11 Nov 2024 09:26:54 GMT
Last-Modified
Fri, 08 Nov 2024 23:02:12 GMT
Content-Type
image/jpeg
ai-recruitment-tools-prone-to-bias-privacy-issues-showcase_image-9-a-26774.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
52 KB
52 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/ai-recruitment-tools-prone-to-bias-privacy-issues-showcase_image-9-a-26774.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c1c1ab3d80097c02536976f8afd9e30abaa1fafe314176b2e07d4874aaacc307

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=43862
ETag
1b49e604efcdc63cf2030b55cc553199
X-Timestamp
1731105707.21230
Connection
keep-alive
Expires
Mon, 11 Nov 2024 21:37:56 GMT
Accept-Ranges
bytes
X-Trans-Id
tx9ee59d5335d94fd094a28-00672e97badfw1
Content-Length
53128
Date
Mon, 11 Nov 2024 09:26:54 GMT
Last-Modified
Fri, 08 Nov 2024 22:41:48 GMT
Content-Type
image/jpeg
ismg-summit-highlights-growing-third-party-vendor-threats-showcase_image-5-a-26772.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
274 KB
274 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/ismg-summit-highlights-growing-third-party-vendor-threats-showcase_image-5-a-26772.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
057b4020cbf37489f76bbf150b7f532c33333a3f1843e71a70f90fe61524a208

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=43898
ETag
f961365f07032a15f3f707016a03dc74
X-Timestamp
1731105622.85499
Connection
keep-alive
Expires
Mon, 11 Nov 2024 21:38:32 GMT
Accept-Ranges
bytes
X-Trans-Id
txe3f82080d70a4028ae6ab-00672e9682dfw1
Content-Length
280515
Date
Mon, 11 Nov 2024 09:26:54 GMT
Last-Modified
Fri, 08 Nov 2024 22:40:23 GMT
Content-Type
image/jpeg
anthropic-palantir-aws-to-build-ai-for-us-defense-showcase_image-2-a-26773.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
163 KB
163 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/anthropic-palantir-aws-to-build-ai-for-us-defense-showcase_image-2-a-26773.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
11e3c565b6b136d0cb2b8dae553b4deb5c0b0c73b6eefd3ff7e621fa28c2b196

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=37227
ETag
378465fb1ab7edac9013fc40999dfea5
X-Timestamp
1731105036.39717
Connection
keep-alive
Expires
Mon, 11 Nov 2024 19:47:22 GMT
Accept-Ranges
bytes
X-Trans-Id
txb3f6851df7ee41679dd04-00672fdc53dfw1
Content-Length
166596
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Fri, 08 Nov 2024 22:30:37 GMT
Content-Type
image/jpeg
shoring-up-cyber-at-rural-small-hospitals-urgent-showcase_image-7-i-5422.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
97 KB
97 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/shoring-up-cyber-at-rural-small-hospitals-urgent-showcase_image-7-i-5422.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d093326f41d8a1de17d184f609cc746fd3c2d0b0f609591be52dc3a99a20b7dd

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=43887
ETag
231b6dfbacb3cac6cd459e299ddd0339
X-Timestamp
1730134942.55784
Connection
keep-alive
Expires
Mon, 11 Nov 2024 21:38:22 GMT
Accept-Ranges
bytes
X-Trans-Id
tx709818f5476f431aa5ff1-00671fdeafdfw1
Content-Length
99436
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Mon, 28 Oct 2024 17:02:23 GMT
Content-Type
image/jpeg
risks-medical-devices-face-in-ransomware-attacks-showcase_image-8-i-5421.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
90 KB
91 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/risks-medical-devices-face-in-ransomware-attacks-showcase_image-8-i-5421.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
250c0758424c24ff6af837e6b28fff678a4d96a71e6aa0985f39f0e2ca747c7b

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=45717
ETag
11e59693195ffd36b2ca6a844a70dbc8
X-Timestamp
1729729679.65674
Connection
keep-alive
Expires
Mon, 11 Nov 2024 22:08:52 GMT
Accept-Ranges
bytes
X-Trans-Id
txab8bbbb7280640a8936aa-00671a84ebdfw1
Content-Length
92387
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Thu, 24 Oct 2024 00:28:00 GMT
Content-Type
image/jpeg
vetting-ai-vendor-security-in-healthcare-critical-showcase_image-1-i-5417.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
80 KB
80 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vetting-ai-vendor-security-in-healthcare-critical-showcase_image-1-i-5417.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
94e0fd19910914c660b1b1e220bc2bf8a3b77238812a0288822acdcf1ef32582

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=45663
ETag
069c987a3c321958f0e5076e86098669
X-Timestamp
1725995007.87104
Connection
keep-alive
Expires
Mon, 11 Nov 2024 22:07:58 GMT
Accept-Ranges
bytes
X-Trans-Id
txd72b5ea846894770b54f1-00672a0597dfw1
Content-Length
81603
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Tue, 10 Sep 2024 19:03:28 GMT
Content-Type
image/jpeg
identity-security-how-to-reduce-risk-in-manufacturing-showcase_image-6-i-5420.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
46 KB
46 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/identity-security-how-to-reduce-risk-in-manufacturing-showcase_image-6-i-5420.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
9c1f61f060b955d1260934cbaace2853597ad135a771e19e3bd6cd7860aca334

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=44400
ETag
eaaba9458722cece60e9e35ceace93ac
X-Timestamp
1728993097.98908
Connection
keep-alive
Expires
Mon, 11 Nov 2024 21:46:55 GMT
Accept-Ranges
bytes
X-Trans-Id
tx049f36ec876448cba0763-00672e6b5ddfw1
Content-Length
46993
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Tue, 15 Oct 2024 11:51:38 GMT
Content-Type
image/jpeg
combating-cybercrime-what-to-expect-from-trump-presidency-showcase_image-1-p-3759.jpg
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/
280 KB
280 KB
Image
General
Full URL
https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/combating-cybercrime-what-to-expect-from-trump-presidency-showcase_image-1-p-3759.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
08daa10f80d8ef0b8480ed3467205f58f04d68995a3eaf86e78651c2c6a32e87

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=19329
ETag
27d024465b7b0f663352fc754ecf0402
X-Timestamp
1731002709.65730
Connection
keep-alive
Expires
Mon, 11 Nov 2024 14:49:04 GMT
Accept-Ranges
bytes
X-Trans-Id
txbf4b914cb99740b78f913-00672d2222dfw1
Content-Length
286681
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Thu, 07 Nov 2024 18:05:10 GMT
Content-Type
image/jpeg
keep-learning-or-keep-losing-theres-no-finish-line-showcase_image-2-p-3758.jpg
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/
78 KB
79 KB
Image
General
Full URL
https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/keep-learning-or-keep-losing-theres-no-finish-line-showcase_image-2-p-3758.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4edee2d15a4a3a0720acec4833d132ab7af6ccedfc9498eab29f0fdb0fc40c57

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=75071
ETag
c6f3f60bede96c8041a86cd83c9dd641
X-Timestamp
1730914227.34620
Connection
keep-alive
Expires
Tue, 12 Nov 2024 06:18:06 GMT
Accept-Ranges
bytes
X-Trans-Id
tx7fd51e489e7547c5afac3-00672cf43fdfw1
Content-Length
80103
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Wed, 06 Nov 2024 17:30:28 GMT
Content-Type
image/jpeg
10-key-cyber-policy-questions-as-trump-preps-for-presidency-showcase_image-9-p-3757.jpg
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/
227 KB
227 KB
Image
General
Full URL
https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/10-key-cyber-policy-questions-as-trump-preps-for-presidency-showcase_image-9-p-3757.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
cbef5c0780a3820bb47d1d00873101c0a721003fbf1a5b6f576e628cbaa32ee9

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=76459
ETag
15a53e4272f3db9c0baecb6d8fb138fa
X-Timestamp
1730916998.85162
Connection
keep-alive
Expires
Tue, 12 Nov 2024 06:41:14 GMT
Accept-Ranges
bytes
X-Trans-Id
txe63604ff5b75442ea4599-00672bb6a0dfw1
Content-Length
232477
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Wed, 06 Nov 2024 18:16:39 GMT
Content-Type
image/jpeg
driving-real-cyber-risk-reduction-in-healthcare-showcase_image-2-p-3755.jpg
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/
55 KB
55 KB
Image
General
Full URL
https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/driving-real-cyber-risk-reduction-in-healthcare-showcase_image-2-p-3755.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
8fdd19602e1988858c20950b0fe7174a1925d5f3efade72859014b0afe9c4b74

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=55967
ETag
0878a7bc121345f007013973fa2257b6
X-Timestamp
1730744327.19728
Connection
keep-alive
Expires
Tue, 12 Nov 2024 00:59:42 GMT
Accept-Ranges
bytes
X-Trans-Id
tx9a19886a0cc54f5a95b3d-00672a27f0dfw1
Content-Length
55879
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Mon, 04 Nov 2024 18:18:48 GMT
Content-Type
image/jpeg
connectwises-rivelo-aims-to-secure-smbs-msp-platform-image_large-4-a-26770.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
84 KB
85 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/connectwises-rivelo-aims-to-secure-smbs-msp-platform-image_large-4-a-26770.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
66399eeafbe8c30690de1a6a8b3e7fc3f2be1c3a3ea8edefe5ff16caf187e51e

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=43926
ETag
4bb143e657a1c7e6d93298031819349e
X-Timestamp
1731097981.18901
Connection
keep-alive
Expires
Mon, 11 Nov 2024 21:39:01 GMT
Accept-Ranges
bytes
X-Trans-Id
tx31cb83644edc4a699bbdb-00672e84badfw1
Content-Length
86398
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Fri, 08 Nov 2024 20:33:02 GMT
Content-Type
image/jpeg
cyderes-new-ceo-eyes-identity-cybersecurity-convergence-showcase_image-3-a-26765.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
76 KB
76 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/cyderes-new-ceo-eyes-identity-cybersecurity-convergence-showcase_image-3-a-26765.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4a32cc99a8b260cca7866ecc1ceb826656483e1b11383f72cd29f38cad442e10

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=43909
ETag
389fdbdd670b754258472223f7cdcc7e
X-Timestamp
1731085266.08281
Connection
keep-alive
Expires
Mon, 11 Nov 2024 21:38:44 GMT
Accept-Ranges
bytes
X-Trans-Id
tx9b21ee8fc1e34786acff4-00672e6676dfw1
Content-Length
77679
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Fri, 08 Nov 2024 17:01:07 GMT
Content-Type
image/jpeg
assessing-bank-product-risks-to-evolve-kyc-process-showcase_image-9-a-26749.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
89 KB
89 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/assessing-bank-product-risks-to-evolve-kyc-process-showcase_image-9-a-26749.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
243ef3c7b303b16ff79b4fffdf617bceda3b7ae48d33165017941dbda28f2a51

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=43950
ETag
8f7df356027a07388ecc79decc55be16
X-Timestamp
1730973823.73389
Connection
keep-alive
Expires
Mon, 11 Nov 2024 21:39:25 GMT
Accept-Ranges
bytes
X-Trans-Id
txa958cc520a2c4567b7383-00672cf9b4dfw1
Content-Length
90945
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Thu, 07 Nov 2024 10:03:44 GMT
Content-Type
image/jpeg
live-webinar-dark-side-ai-unmasking-its-threats-navigating-shadows-cybersecurity-in-digital-age-showcase_image-2-w-5942.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
58 KB
58 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-dark-side-ai-unmasking-its-threats-navigating-shadows-cybersecurity-in-digital-age-showcase_image-2-w-5942.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
50b01b08aed8a9283fc163f65043cd5ad4947ba1d5670c8f1ae8516958db4420

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=61591
ETag
29f47b326f402440cb874a5e50b33546
X-Timestamp
1730404514.21099
Connection
keep-alive
Expires
Tue, 12 Nov 2024 02:33:26 GMT
Accept-Ranges
bytes
X-Trans-Id
tx821a363415f743d5a9d4a-00672f06cadfw1
Content-Length
59254
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Thu, 31 Oct 2024 19:55:15 GMT
Content-Type
image/jpeg
live-webinar-recon-20-ai-driven-osint-in-hands-cybercriminals-showcase_image-6-w-5939.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
49 KB
49 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-recon-20-ai-driven-osint-in-hands-cybercriminals-showcase_image-6-w-5939.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
1dadbeebc7bcaf20d3ff103ae296df8f1c71680360cdc1c81fd982eabfd0a89a

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=43976
ETag
8942ef74db0660057bc1557f0c511e09
X-Timestamp
1730403869.45396
Connection
keep-alive
Expires
Mon, 11 Nov 2024 21:39:51 GMT
Accept-Ranges
bytes
X-Trans-Id
tx0cd5e203842440abb57e9-00672bed3bdfw1
Content-Length
50130
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Thu, 31 Oct 2024 19:44:30 GMT
Content-Type
image/jpeg
webinar-prisma-access-browser-boosting-security-for-browser-based-work-showcase_image-1-w-5973.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
57 KB
57 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/webinar-prisma-access-browser-boosting-security-for-browser-based-work-showcase_image-1-w-5973.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
2c44dc80bb23cfd60d76addb8444f0f70f435fe736e1b1db1e04805726d0d4f2

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=44471
ETag
ba07c601eaf8f2358a85e9e06f728785
X-Timestamp
1730996361.14513
Connection
keep-alive
Expires
Mon, 11 Nov 2024 21:48:06 GMT
Accept-Ranges
bytes
X-Trans-Id
txb6fa85cead5f4ff4a00ff-00672d4004dfw1
Content-Length
58410
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Thu, 07 Nov 2024 16:19:22 GMT
Content-Type
image/jpeg
overcoming-top-five-challenges-in-operationalizing-threat-intelligence-showcase_image-2-w-5957.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
55 KB
55 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/overcoming-top-five-challenges-in-operationalizing-threat-intelligence-showcase_image-2-w-5957.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
8ed25d12b320a8b2ddd3e7cff3ec5c1f0c2f34d5442e46152b7795f8a74b85d6

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=43927
ETag
3ddc877ec1b535546c03d51e498513f7
X-Timestamp
1730909822.39372
Connection
keep-alive
Expires
Mon, 11 Nov 2024 21:39:02 GMT
Accept-Ranges
bytes
X-Trans-Id
tx80b6dd6fc033420cbfd88-00672cf72ddfw1
Content-Length
56319
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Wed, 06 Nov 2024 16:17:03 GMT
Content-Type
image/jpeg
live-webinar-maximizing-security-investments-part-2-uncovering-hidden-budget-optimizing-cybersecurity-spend-showcase_image-5-w-5886.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
55 KB
56 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-maximizing-security-investments-part-2-uncovering-hidden-budget-optimizing-cybersecurity-spend-showcase_image-5-w-5886.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3052b076468a0d25330ec91497ebc92d1b13176d31b36ef5fa5eae2579f6b2ff

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=67734
ETag
daa9d734f9db2fbf921b13b1a5d5ec3f
X-Timestamp
1728572840.89147
Connection
keep-alive
Expires
Tue, 12 Nov 2024 04:15:49 GMT
Accept-Ranges
bytes
X-Trans-Id
tx85f20af657e24e9c977db-006708fd9ddfw1
Content-Length
56473
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Thu, 10 Oct 2024 15:07:21 GMT
Content-Type
image/jpeg
securing-heart-your-business-role-application-security-in-cyber-defense-showcase_image-2-w-5904.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
55 KB
56 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/securing-heart-your-business-role-application-security-in-cyber-defense-showcase_image-2-w-5904.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
aceb3068cad29aa55b6be2b85b237cf00e537d9d39472a9083004e8010bb0016

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=75058
ETag
bc16dd19e2c2d811b02694ca226fd0fc
X-Timestamp
1729176464.57176
Connection
keep-alive
Expires
Tue, 12 Nov 2024 06:17:53 GMT
Accept-Ranges
bytes
X-Trans-Id
tx3ba7201afb144e91b3789-0067113b45dfw1
Content-Length
56640
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Thu, 17 Oct 2024 14:47:45 GMT
Content-Type
image/jpeg
webinar-old-school-awareness-training-does-hack-anymore-showcase_image-7-w-5717.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
65 KB
66 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/webinar-old-school-awareness-training-does-hack-anymore-showcase_image-7-w-5717.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6f191221f108edc68f69d87478154d86340588332adf1b308b8dbe32747bca2c

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=67860
ETag
c6bd8659abd7381dd3b7a72569f6fa32
X-Timestamp
1720465299.63432
Connection
keep-alive
Expires
Tue, 12 Nov 2024 04:17:55 GMT
Accept-Ranges
bytes
X-Trans-Id
tx34ff9d67d9ee404f94fdd-006714eb4ddfw1
Content-Length
66884
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Mon, 08 Jul 2024 19:01:40 GMT
Content-Type
image/jpeg
vinay-padegaonkar-large_image-1-a-6912.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
24 KB
24 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/vinay-padegaonkar-large_image-1-a-6912.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7e7a3444709b6476152c274f3deafaa6f238c20d9badd36ce9ec56c67a86a1b9

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=43920
ETag
c082d4c19845f6b635996b171f4a89b1
X-Timestamp
1730775522.67921
Connection
keep-alive
Expires
Mon, 11 Nov 2024 21:38:55 GMT
Accept-Ranges
bytes
X-Trans-Id
tx0d912d9317674f70b3305-0067298c10dfw1
Content-Length
24528
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Tue, 05 Nov 2024 02:58:43 GMT
Content-Type
image/jpeg
sonal-koul-large_image-7-a-6913.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
32 KB
33 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/sonal-koul-large_image-7-a-6913.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
0d31ce3a8d9dab7fdbfe558a366a17360dbf08aa833165561cc88adcac1c1439

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=74356
ETag
dbad3e4ab8eb6ece47f7faf7a94d7931
X-Timestamp
1730775724.06437
Connection
keep-alive
Expires
Tue, 12 Nov 2024 06:06:11 GMT
Accept-Ranges
bytes
X-Trans-Id
tx793d232ca0a4402ba5c1d-00672f3af7dfw1
Content-Length
33153
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Tue, 05 Nov 2024 03:02:05 GMT
Content-Type
image/jpeg
preetham-aj-large_image-3-a-6921.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
23 KB
23 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/preetham-aj-large_image-3-a-6921.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
271a6c991b43138768c29d26d4f7ec6dedd3b767d12be159c17e1b6f5a7f43a9

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=45659
ETag
4958caa4ddbb7f73a679062402e05b96
X-Timestamp
1730886241.83243
Connection
keep-alive
Expires
Mon, 11 Nov 2024 22:07:54 GMT
Accept-Ranges
bytes
X-Trans-Id
tx519a7f9e13d74c7f999f5-00672b3c7bdfw1
Content-Length
23598
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Wed, 06 Nov 2024 09:44:02 GMT
Content-Type
image/jpeg
nihit-rungta-large_image-5-a-6920.png
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
160 KB
160 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/nihit-rungta-large_image-5-a-6920.png
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3e704ddacf1d102fc1e3f395fd9a5b9bbd966270b8e1f10891ef8bb07050c389

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=46713
ETag
fda2aa8a7729d45aa365f4f3ebcccf9e
X-Timestamp
1730885706.85171
Connection
keep-alive
Expires
Mon, 11 Nov 2024 22:25:28 GMT
Accept-Ranges
bytes
X-Trans-Id
tx3764a3f3ce674f30bb50f-0067300307dfw1
Content-Length
163926
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Wed, 06 Nov 2024 09:35:07 GMT
Content-Type
image/png
rethinking-email-security-moving-beyond-legacy-systems-pdf-3-w-14481.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
166 KB
166 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/rethinking-email-security-moving-beyond-legacy-systems-pdf-3-w-14481.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b2b7173f850f45aa27edb061dc95778355068c63e33641178d2f456ee8c48a6a

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=43928
ETag
75f7baea619c6f08300b4a2b7f97bdba
X-Timestamp
1730956535.08573
Connection
keep-alive
Expires
Mon, 11 Nov 2024 21:39:03 GMT
Accept-Ranges
bytes
X-Trans-Id
tx5154a831b0104472bc14a-00672e85f7dfw1
Content-Length
169822
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Thu, 07 Nov 2024 05:15:36 GMT
Content-Type
image/jpeg
outdated-seg-discover-power-behavioral-ai-in-email-security-pdf-9-w-14480.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
226 KB
226 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/outdated-seg-discover-power-behavioral-ai-in-email-security-pdf-9-w-14480.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
732cdd4234056c65e6aab67bdd1952fa2e3b015e15784ab9fb0e207d13b7af53

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=43982
ETag
122c133145f67b80fdd74ab11f1af475
X-Timestamp
1730955702.93486
Connection
keep-alive
Expires
Mon, 11 Nov 2024 21:39:57 GMT
Accept-Ranges
bytes
X-Trans-Id
tx65da2ec2fea4436cbc367-00672e85f7dfw1
Content-Length
231010
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Thu, 07 Nov 2024 05:01:43 GMT
Content-Type
image/jpeg
7-lessons-learned-from-replacing-100-segs-pdf-8-w-14483.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
225 KB
226 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/7-lessons-learned-from-replacing-100-segs-pdf-8-w-14483.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
61c192fb67d7a851d9292ed192287d6d4e7c2f190668524ebf14f4365a69a918

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=43989
ETag
dda45826075c2d5e0a5ff0ba7d5de183
X-Timestamp
1730957176.60146
Connection
keep-alive
Expires
Mon, 11 Nov 2024 21:40:04 GMT
Accept-Ranges
bytes
X-Trans-Id
tx2a15d624647241f698ccd-00672e85f8dfw1
Content-Length
230820
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Thu, 07 Nov 2024 05:26:17 GMT
Content-Type
image/jpeg
report-close-security-gaps-this-top-cnapp-pdf-3-w-13531.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
113 KB
113 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/report-close-security-gaps-this-top-cnapp-pdf-3-w-13531.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
72e62d087a7d3898e71f17aea9ce2bf038b4f2ede8be8ddac7d9a6c337e25115

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=72390
ETag
19ea5c845e6ec6c95a3eac176007c5c5
X-Timestamp
1710158989.81189
Connection
keep-alive
Expires
Tue, 12 Nov 2024 05:33:25 GMT
Accept-Ranges
bytes
X-Trans-Id
txffaa1fd7821249309353e-00672b5416dfw1
Content-Length
115645
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Mon, 11 Mar 2024 12:09:50 GMT
Content-Type
image/jpeg
top-canadian-cyber-threats-expected-in-2020-logo-9-h-102.jpg
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/
76 KB
77 KB
Image
General
Full URL
https://fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/top-canadian-cyber-threats-expected-in-2020-logo-9-h-102.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
eb9ec684a7198fded61e248eaff2d28d0c9f8a15dfee8d9afff66aa6ff200461

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=30295
ETag
69913c61181f1fc9d730d6c8298e55c4
X-Timestamp
1572271064.63410
Connection
keep-alive
Expires
Mon, 11 Nov 2024 17:51:50 GMT
Accept-Ranges
bytes
X-Trans-Id
tx741148ffa2db477287077-00670c0176dfw1
Akamai-Loopback-Request
8096267
Content-Length
78320
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Mon, 28 Oct 2019 13:57:45 GMT
Content-Type
image/jpeg
leveraging-new-technologies-in-fraud-investigations-logo-7-h-101.jpg
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/
197 KB
198 KB
Image
General
Full URL
https://fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/leveraging-new-technologies-in-fraud-investigations-logo-7-h-101.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c70242480ad0a0ecc7c305d659f1fdb3a9cb1eb480927b46f8bd62d33ed0f8b2

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=44405
ETag
e3e068e355cdbfaa15e88b627d7ebc55
X-Timestamp
1571148412.42493
Connection
keep-alive
Expires
Mon, 11 Nov 2024 21:47:00 GMT
Accept-Ranges
bytes
X-Trans-Id
txd0a89f4370424bb7b10d1-006712ee98dfw1
Content-Length
202154
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Tue, 15 Oct 2019 14:06:53 GMT
Content-Type
image/jpeg
collaboration-avoiding-operational-conflicts-taking-on-new-roles-logo-10-h-100.jpg
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/
87 KB
88 KB
Image
General
Full URL
https://fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/collaboration-avoiding-operational-conflicts-taking-on-new-roles-logo-10-h-100.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4c57a77761f2639985b760e69c5bbaffceb6100559dcf3296d3cc96ea6a0d305

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=71985
ETag
36c70127fa172aa8ce8cd235fddf4c97
X-Timestamp
1570023700.81183
Connection
keep-alive
Expires
Tue, 12 Nov 2024 05:26:41 GMT
Accept-Ranges
bytes
X-Trans-Id
tx5b280cd6bc4e4d3a98553-00672f2b13dfw1
Content-Length
89481
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Wed, 02 Oct 2019 13:41:41 GMT
Content-Type
image/jpeg
cybered-magazine-special-healthcare-edition-logo-1-h-99.jpg
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/
75 KB
76 KB
Image
General
Full URL
https://fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/cybered-magazine-special-healthcare-edition-logo-1-h-99.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
369bffbe203ed6d6454c3b45ee0a20f216518f676d7520bc5ed03a87ddc3f2b8

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=71342
ETag
60d462094cfe3458426e91f8ae0a015d
X-Timestamp
1565973399.90545
Connection
keep-alive
Expires
Tue, 12 Nov 2024 05:15:58 GMT
Accept-Ranges
bytes
X-Trans-Id
tx1b3fad901afb40d8b83fe-00672f307fdfw1
Content-Length
76929
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Fri, 16 Aug 2019 16:36:40 GMT
Content-Type
image/jpeg
3-minute-survey-unlock-future-cloud-share-your-insights-today-showcase_image-6-s-135.jpg
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/
61 KB
61 KB
Image
General
Full URL
https://21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/3-minute-survey-unlock-future-cloud-share-your-insights-today-showcase_image-6-s-135.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7caf9fb1d97edb1a1459b0de03b4fa7c78df380d1e19e034e6e857e1f76bbedf

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=74370
ETag
be5f0dd68681a07f959e378c0664599f
X-Timestamp
1728660672.29319
Connection
keep-alive
Expires
Tue, 12 Nov 2024 06:06:25 GMT
Accept-Ranges
bytes
X-Trans-Id
txbb56236bb6274691b4f09-00672d08fcdfw1
Content-Length
62466
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Fri, 11 Oct 2024 15:31:13 GMT
Content-Type
image/jpeg
customized-security-report-in-5-minutes-to-uncover-gaps-in-your-cloud-protection-showcase_image-6-s-134.jpg
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/
61 KB
61 KB
Image
General
Full URL
https://21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/customized-security-report-in-5-minutes-to-uncover-gaps-in-your-cloud-protection-showcase_image-6-s-134.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7caf9fb1d97edb1a1459b0de03b4fa7c78df380d1e19e034e6e857e1f76bbedf

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=44405
ETag
be5f0dd68681a07f959e378c0664599f
X-Timestamp
1728393949.74240
Connection
keep-alive
Expires
Mon, 11 Nov 2024 21:47:00 GMT
Accept-Ranges
bytes
X-Trans-Id
tx5e39578d548a4a288dbce-006708cb9bdfw1
Content-Length
62466
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Tue, 08 Oct 2024 13:25:50 GMT
Content-Type
image/jpeg
cybersecurity-training-research-survey-showcase_image-4-s-133.jpg
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/
81 KB
81 KB
Image
General
Full URL
https://21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/cybersecurity-training-research-survey-showcase_image-4-s-133.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
9868d92483cafd2077c0f23bdded0f15eb319f9302c9ea3817da9d1bdceaa596

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=43937
ETag
14d4aa71c8680401326708935bfefd46
X-Timestamp
1727987124.35211
Connection
keep-alive
Expires
Mon, 11 Nov 2024 21:39:13 GMT
Accept-Ranges
bytes
X-Trans-Id
tx6ee5d05f820b443baf9f9-00670eb021dfw1
Content-Length
82869
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Thu, 03 Oct 2024 20:25:25 GMT
Content-Type
image/jpeg
2nd-annual-generative-ai-study-securing-innovation-showcase_image-10-s-127.jpg
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/
50 KB
50 KB
Image
General
Full URL
https://21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/2nd-annual-generative-ai-study-securing-innovation-showcase_image-10-s-127.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
09dde55cf03210de3f8741e580fb01ca44ca9f8dfc9b9420f4b1cc17a1c4f270

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=68480
ETag
3b0a04257efea592b71aa80b141191a4
X-Timestamp
1719941566.58203
Connection
keep-alive
Expires
Tue, 12 Nov 2024 04:28:16 GMT
Accept-Ranges
bytes
X-Trans-Id
tx77cfa3e216af4b3e86184-0067128e30dfw1
Content-Length
50958
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Tue, 02 Jul 2024 17:32:47 GMT
Content-Type
image/jpeg
forrester-report-the-total-economic-impact-palo-alto-networks-prisma-cloud-pdf-4-w-13226.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
140 KB
140 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/forrester-report-the-total-economic-impact-palo-alto-networks-prisma-cloud-pdf-4-w-13226.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4e95c8276608b935856336e41a09b2c9fc9013d13a7cb97ae92b71334240b2e7

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=55084
ETag
fae246871c8fe205fc3b2a474b9a8a79
X-Timestamp
1704874443.74415
Connection
keep-alive
Expires
Tue, 12 Nov 2024 00:44:59 GMT
Accept-Ranges
bytes
X-Trans-Id
tx6560aa0b106643f385b97-00672c84f9dfw1
Content-Length
143236
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Wed, 10 Jan 2024 08:14:04 GMT
Content-Type
image/jpeg
cybersecurity-summit-mumbai-showcase_image-2-e-435.png
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/
429 KB
430 KB
Image
General
Full URL
https://752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/cybersecurity-summit-mumbai-showcase_image-2-e-435.png
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
f9fbd855aa61bf0e674cc4455041dc2a52c1b4ed8753b1066217f50cbd253737

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=71369
ETag
83c51b8411eed87759b7cbae2efd62df
X-Timestamp
1727096468.55767
Connection
keep-alive
Expires
Tue, 12 Nov 2024 05:16:25 GMT
Accept-Ranges
bytes
X-Trans-Id
txebccee5e27cb4a6cae586-00672f32a0dfw1
Content-Length
439651
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Mon, 23 Sep 2024 13:01:09 GMT
Content-Type
image/png
cs4ca-latam-cyber-summit-imageFile-7-e-419.jpg
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/
56 KB
56 KB
Image
General
Full URL
https://752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/cs4ca-latam-cyber-summit-imageFile-7-e-419.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d128ceb33329aa53e0fa1d860a16f34391a735621a4a88732be00abf05045193

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=39510
ETag
46feca1af998f7d659084994070d3a5c
X-Timestamp
1709318891.93124
Connection
keep-alive
Expires
Mon, 11 Nov 2024 20:25:26 GMT
Accept-Ranges
bytes
X-Trans-Id
txfc9fe499a0784d548e91d-0066cdc579dfw1
Content-Length
57330
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Fri, 01 Mar 2024 18:48:12 GMT
Content-Type
image/jpeg
virtual-iot-ot-security-summit-showcase_image-8-e-437.png
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/
61 KB
62 KB
Image
General
Full URL
https://752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/virtual-iot-ot-security-summit-showcase_image-8-e-437.png
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
41f3a96914bc3b9fabe9cc3e9bd398caaedb855304e3a0dbf20caa7685671df6

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=30754
ETag
b77693fd7b7d4f89174482716996a56b
X-Timestamp
1727767973.49468
Connection
keep-alive
Expires
Mon, 11 Nov 2024 17:59:30 GMT
Accept-Ranges
bytes
X-Trans-Id
txde51f9aec1434c46ab2a3-0066fba7ffdfw1
Content-Length
62667
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Tue, 01 Oct 2024 07:32:54 GMT
Content-Type
image/png
cs4ca-cyber-security-for-critical-assets-mena-summit-showcase_image-5-e-423.jpg
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/
57 KB
57 KB
Image
General
Full URL
https://752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/cs4ca-cyber-security-for-critical-assets-mena-summit-showcase_image-5-e-423.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
8d3c5d3745d81d914406a42405c43f0d9cb66bfe29f3f1f24a0729dae7fc2cc8

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=22902
ETag
a1456f859ca74f7915be1f2c3a3216c5
X-Timestamp
1711364820.08405
Connection
keep-alive
Expires
Mon, 11 Nov 2024 15:48:38 GMT
Accept-Ranges
bytes
X-Trans-Id
txe5d70cf567a243789184a-00672f9b51dfw1
Content-Length
58333
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Mon, 25 Mar 2024 11:07:01 GMT
Content-Type
image/jpeg
manusec-cyber-security-for-manufacturing-europe-summit-showcase_image-10-e-424.jpg
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/
57 KB
58 KB
Image
General
Full URL
https://752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/manusec-cyber-security-for-manufacturing-europe-summit-showcase_image-10-e-424.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7eec79b40363103fe8930508db7a14e4e4c2e2bcd90e97448b487bd50958694b

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=74938
ETag
99c4df34de545f4cabdeefcedfacb4c8
X-Timestamp
1711366585.68352
Connection
keep-alive
Expires
Tue, 12 Nov 2024 06:15:54 GMT
Accept-Ranges
bytes
X-Trans-Id
tx57812262a99b4f2c8bc7c-006706f0b2dfw1
Content-Length
58585
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Mon, 25 Mar 2024 11:36:26 GMT
Content-Type
image/jpeg
empty_menu_image.png
www.databreachtoday.com/images/navigation/generic/
5 KB
5 KB
Image
General
Full URL
https://www.databreachtoday.com/images/navigation/generic/empty_menu_image.png
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
69278fe35261286939e10f3832f461f9bf6addf267ffe0134e26be3d313dbd7d
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
accept-ranges
bytes
alt-svc
h3=":443"; ma=2592000
content-length
5306
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:55 GMT
content-type
image/png
vary
Accept-Encoding
x-frame-options
deny
cybersecurity-insights-from-60-ceos-company-founders-showcase_image-5-a-25927.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
229 KB
230 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/cybersecurity-insights-from-60-ceos-company-founders-showcase_image-5-a-25927.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4e88dcbac59e33817a032b1c1666118c6bdf3d140fe07f6943ae5cf9c4767adc

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=44426
ETag
84d4c8b1dff4d9493d39353ceda35652
X-Timestamp
1722619405.68930
Connection
keep-alive
Expires
Mon, 11 Nov 2024 21:47:22 GMT
Accept-Ranges
bytes
X-Trans-Id
tx9b9af0217d1b469cb3edb-00671a2475dfw1
Content-Length
234903
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Fri, 02 Aug 2024 17:23:26 GMT
Content-Type
image/jpeg
rsa-conference-2024-compendium-150-interviews-more-showcase_image-1-a-25565.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
111 KB
112 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/rsa-conference-2024-compendium-150-interviews-more-showcase_image-1-a-25565.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
76d3bbf6509834b8e39342ef129df55612a7db03356366abb13399b8d389d25a

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=75059
ETag
2516afe1e1bc24f5c811a6b7419b99b9
X-Timestamp
1719245619.06064
Connection
keep-alive
Expires
Tue, 12 Nov 2024 06:17:55 GMT
Accept-Ranges
bytes
X-Trans-Id
txcd0e3f1473054e0d9a7fd-00672d0f22dfw1
Content-Length
113802
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Mon, 24 Jun 2024 16:13:40 GMT
Content-Type
image/jpeg
role-ai-in-cloud-application-security-showcase_image-9-a-25121.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
246 KB
246 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/role-ai-in-cloud-application-security-showcase_image-9-a-25121.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
09fe33d173445cb191aa97d72e66314f324502840aabcfae45ecff13db130f9e

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=73510
ETag
6544d515d201e7775b4382387d34bb09
X-Timestamp
1716299711.39481
Connection
keep-alive
Expires
Tue, 12 Nov 2024 05:52:06 GMT
Accept-Ranges
bytes
X-Trans-Id
tx9add9b80c4cf498192c63-006702cc75dfw1
Content-Length
251475
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Tue, 21 May 2024 13:55:12 GMT
Content-Type
image/jpeg
cyberedboard-profiles-in-leadership-alexander-antukh-showcase_image-1-a-25241.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
137 KB
137 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/cyberedboard-profiles-in-leadership-alexander-antukh-showcase_image-1-a-25241.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
60733e809a9550ba8ad33cd0859a7b66e98564e70fc48f626d6a452ac57b610c

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=43090
ETag
e46f8e962d8e415db5dbe024b656905c
X-Timestamp
1716295209.87527
Connection
keep-alive
Expires
Mon, 11 Nov 2024 21:25:06 GMT
Accept-Ranges
bytes
X-Trans-Id
txa083b23b517e4443b7d43-0067160e0adfw1
Content-Length
140082
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Tue, 21 May 2024 12:40:10 GMT
Content-Type
image/jpeg
infosecurity-europe-2024-latest-insights-on-cybersecurity-showcase_image-3-a-26031.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
327 KB
327 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/infosecurity-europe-2024-latest-insights-on-cybersecurity-showcase_image-3-a-26031.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e38d21eebc8657374beb023fd20aff7fe78c433d34cd95bd002312b6ed851939

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=57756
ETag
c85abb1fa1364189f50879e98db7d79b
X-Timestamp
1723700251.86261
Connection
keep-alive
Expires
Tue, 12 Nov 2024 01:29:32 GMT
Accept-Ranges
bytes
X-Trans-Id
txf78d9473cd6a4d2c95d74-0067198a40dfw1
Content-Length
334729
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Thu, 15 Aug 2024 05:37:32 GMT
Content-Type
image/jpeg
cyberedboard-profiles-in-leadership-don-gibson-showcase_image-2-a-25465.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
187 KB
187 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/cyberedboard-profiles-in-leadership-don-gibson-showcase_image-2-a-25465.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
05f2bd204d6a112236e1cdfc2fbb4fa8f678628bf20d77b00fba7c1cbbb06052

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=49121
ETag
f911af545d40dac86d29cf9072c4dea0
X-Timestamp
1718022565.94152
Connection
keep-alive
Expires
Mon, 11 Nov 2024 23:05:37 GMT
Accept-Ranges
bytes
X-Trans-Id
tx95de68bcf0e147aabc22f-00670ebaffdfw1
Content-Length
191352
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Mon, 10 Jun 2024 12:29:26 GMT
Content-Type
image/jpeg
cloud-security-big-challenge-for-cisos-heres-why-showcase_image-1-a-25575.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
233 KB
233 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/cloud-security-big-challenge-for-cisos-heres-why-showcase_image-1-a-25575.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
fc914abef5985cda118c262ac69b47cac07fbc94d51c5254cb055961590b6a98

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=20499
ETag
3cfbf0be30efc6b56680e178d4a287c1
X-Timestamp
1718884938.29510
Connection
keep-alive
Expires
Mon, 11 Nov 2024 15:08:35 GMT
Accept-Ranges
bytes
X-Trans-Id
txfbb67a7f68764929bf9f1-006717cf92dfw1
Content-Length
238655
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Thu, 20 Jun 2024 12:02:19 GMT
Content-Type
image/jpeg
cyberedboard-profiles-in-leadership-aman-sood-showcase_image-4-a-25498.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
124 KB
125 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/cyberedboard-profiles-in-leadership-aman-sood-showcase_image-4-a-25498.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
ed8f02bdd4fa786645522f9d95a9a151b1e487063d6e8fcbe675ae60d444d8be

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=20392
ETag
61ed6c940a567abdafb5d8440404ea13
X-Timestamp
1718197705.16604
Connection
keep-alive
Expires
Mon, 11 Nov 2024 15:06:48 GMT
Accept-Ranges
bytes
X-Trans-Id
txbc05c2c290b34687b960e-00672e364ddfw1
Content-Length
127371
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Wed, 12 Jun 2024 13:08:26 GMT
Content-Type
image/jpeg
chinese-hackers-use-quad7-botnet-for-credential-theft-showcase_image-1-a-26709.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
207 KB
208 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/chinese-hackers-use-quad7-botnet-for-credential-theft-showcase_image-1-a-26709.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
dc871edd3587ad50b4b0fca6d98e9725ef748045a8bf270023dded6632a4a86d

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=86400
ETag
80e30fb66f97c2d700abdb08d14f0cb0
X-Timestamp
1730497415.87539
Connection
keep-alive
Expires
Tue, 12 Nov 2024 09:26:55 GMT
Accept-Ranges
bytes
X-Trans-Id
tx764675793ade42e286740-006731cddfdfw1
Content-Length
212248
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Fri, 01 Nov 2024 21:43:36 GMT
Content-Type
image/jpeg
akshaya-asokan-largeImage-5-a-2924.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
60 KB
61 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/akshaya-asokan-largeImage-5-a-2924.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e486696aa52a4bad8dd3f1b07486debef1376957624eef0a459b4acf1a5b8225

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=74337
ETag
a814709485c9f168089f5e7d21f6915b
X-Timestamp
1619627393.86942
Connection
keep-alive
Expires
Tue, 12 Nov 2024 06:05:53 GMT
Accept-Ranges
bytes
X-Trans-Id
tx4c2125029c4246099c832-0067319ed5dfw1
Content-Length
61745
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Wed, 28 Apr 2021 16:29:54 GMT
Content-Type
image/jpeg
gartner-market-guide-for-dfir-retainer-services-logo-9-w-14354.png
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
3 KB
4 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/gartner-market-guide-for-dfir-retainer-services-logo-9-w-14354.png
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a11a8fa06898e4e5e08900f4ba4a434456709dd9a2efa3a2c7f6da528520333b

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=77046
ETag
f6f1f96298d3f0a99cb953565f500464
X-Timestamp
1728943779.78356
Connection
keep-alive
Expires
Tue, 12 Nov 2024 06:51:02 GMT
Accept-Ranges
bytes
X-Trans-Id
txd56672d58eee41bfb8356-0067265b41dfw1
Content-Length
3501
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Mon, 14 Oct 2024 22:09:40 GMT
Content-Type
image/png
expert-guide-to-mitigating-ransomware-extortion-attacks-pdf-9-w-14454.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
170 KB
170 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/expert-guide-to-mitigating-ransomware-extortion-attacks-pdf-9-w-14454.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
11d5ec099d51924c413144fa8de9cd10c33c7f98b3d54aafcbc957d067a21553

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=86306
ETag
a6bc2c150c19002539ab47f945df3fab
X-Timestamp
1730781284.73984
Connection
keep-alive
Expires
Tue, 12 Nov 2024 09:25:22 GMT
Accept-Ranges
bytes
X-Trans-Id
txe065d49925374ea6b2a32-006731cdb2dfw1
Content-Length
174016
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Tue, 05 Nov 2024 04:34:45 GMT
Content-Type
image/jpeg
your-salesforce-data-your-responsibility-best-practices-for-data-protection-landing_page_image-4-w-5953.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
53 KB
53 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/your-salesforce-data-your-responsibility-best-practices-for-data-protection-landing_page_image-4-w-5953.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
151f752596b2743a6aaf82d3951434a5cf2f55bc4f33281046ae91085d0ea69f

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=86400
ETag
3d1bac02c746c2f4dcbe363b6eda38a7
X-Timestamp
1730904077.89305
Connection
keep-alive
Expires
Tue, 12 Nov 2024 09:26:56 GMT
Accept-Ranges
bytes
X-Trans-Id
tx342a54bafd0e4426aca26-006731cde0dfw1
Content-Length
54282
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Wed, 06 Nov 2024 14:41:18 GMT
Content-Type
image/jpeg
math-behind-cyber-resilience-stack-three-layered-defense-strategy-landing_page_image-5-w-5949.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
53 KB
54 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/math-behind-cyber-resilience-stack-three-layered-defense-strategy-landing_page_image-5-w-5949.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
54eab3f2718a21f6faa0b825967b34bccb026235c6e503e9fd0046262dd49ae3

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=86357
ETag
ae6e6aea5c9fed22997fcef81207943f
X-Timestamp
1730900349.78634
Connection
keep-alive
Expires
Tue, 12 Nov 2024 09:26:13 GMT
Accept-Ranges
bytes
X-Trans-Id
txe96ba8465b2043cc95b7a-006731cde0dfw1
Content-Length
54460
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Wed, 06 Nov 2024 13:39:10 GMT
Content-Type
image/jpeg
webinar-navigating-evolving-siem-landscape-key-insights-strategic-integrations-landing_page_image-1-w-5960.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
50 KB
51 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/webinar-navigating-evolving-siem-landscape-key-insights-strategic-integrations-landing_page_image-1-w-5960.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
5c6f8ea3267512e80c2e242bdb6e84bac964a6fc20f04df961f0e64e3d0aa49e

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=80933
ETag
415b649c20cb514848962722bf6bd3a5
X-Timestamp
1730995398.13290
Connection
keep-alive
Expires
Tue, 12 Nov 2024 07:55:49 GMT
Accept-Ranges
bytes
X-Trans-Id
tx325028f6451146e5bcc71-00672e94fcdfw1
Content-Length
51420
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Thu, 07 Nov 2024 16:03:19 GMT
Content-Type
image/jpeg
expert-insights-securing-your-cloud-data-across-attack-timeline-landing_page_image-5-w-5951.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
49 KB
50 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/expert-insights-securing-your-cloud-data-across-attack-timeline-landing_page_image-5-w-5951.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
9d0aa4d15c9c1910b26c9d60923c92c4c0fdf5ac57f4d7ab9e6a1777b8193e1e

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=86400
ETag
a528de099d7cfca4b3a7bd91da071dd5
X-Timestamp
1730901791.01901
Connection
keep-alive
Expires
Tue, 12 Nov 2024 09:26:56 GMT
Accept-Ranges
bytes
X-Trans-Id
tx2a57cd2170974696b92bf-006731cde0dfw1
Content-Length
50464
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Wed, 06 Nov 2024 14:03:12 GMT
Content-Type
image/jpeg
defense-in-depth-deep-enough-landing_page_image-1-w-5955.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
51 KB
52 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/defense-in-depth-deep-enough-landing_page_image-1-w-5955.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
39491ed9452b65aaaf9c471fa9d05ccc7701e75f4e7279c1d922b7338578d8f4

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=86369
ETag
f0ff040e50e09e6f4d8387437c052131
X-Timestamp
1730904595.01108
Connection
keep-alive
Expires
Tue, 12 Nov 2024 09:26:25 GMT
Accept-Ranges
bytes
X-Trans-Id
txa2240fc5a5be4c54b5e29-006731cde0dfw1
Content-Length
52669
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Wed, 06 Nov 2024 14:49:56 GMT
Content-Type
image/jpeg
live-webinar-practical-guide-to-achieving-continuous-software-supply-chain-grc-landing_page_image-9-w-5891.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
70 KB
71 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-practical-guide-to-achieving-continuous-software-supply-chain-grc-landing_page_image-9-w-5891.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4ec36d58bf30aa55cacc5e3b8854dd169d72cfde1936a54b1b4dda5e35947c94

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=21408
ETag
acd334a9ec5c40e171b66bf600b2b2b9
X-Timestamp
1728940535.42652
Connection
keep-alive
Expires
Mon, 11 Nov 2024 15:23:44 GMT
Accept-Ranges
bytes
X-Trans-Id
txfd11724c028f4208af6f5-0067210ee9dfw1
Content-Length
72133
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Mon, 14 Oct 2024 21:15:36 GMT
Content-Type
image/jpeg
live-webinar-dark-side-ai-unmasking-its-threats-navigating-shadows-cybersecurity-in-digital-age-landing_page_image-3-w-5942.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
58 KB
58 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-dark-side-ai-unmasking-its-threats-navigating-shadows-cybersecurity-in-digital-age-landing_page_image-3-w-5942.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
50b01b08aed8a9283fc163f65043cd5ad4947ba1d5670c8f1ae8516958db4420

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=30736
ETag
29f47b326f402440cb874a5e50b33546
X-Timestamp
1730404514.27259
Connection
keep-alive
Expires
Mon, 11 Nov 2024 17:59:12 GMT
Accept-Ranges
bytes
X-Trans-Id
tx14134a73a671419888698-00672b7ea1dfw1
Content-Length
59254
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Thu, 31 Oct 2024 19:55:15 GMT
Content-Type
image/jpeg
power-next-generation-sd-wan-app-defined-fabric-pdf-2-w-13312.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
304 KB
304 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/power-next-generation-sd-wan-app-defined-fabric-pdf-2-w-13312.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
df28e1b9dd5d2086390c9acd9e7eda531caa6adaddf69eee22eb63be8b04ce2c

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=79586
ETag
b8a1741b7088da06ee2f73a5387850b9
X-Timestamp
1706562929.67987
Connection
keep-alive
Expires
Tue, 12 Nov 2024 07:33:21 GMT
Accept-Ranges
bytes
X-Trans-Id
txa7e200575c104fce9fdb3-006731b368dfw1
Content-Length
311041
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Mon, 29 Jan 2024 21:15:30 GMT
Content-Type
image/jpeg
cloud-security-compliance-for-dummies-pdf-7-w-13663.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
230 KB
230 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/cloud-security-compliance-for-dummies-pdf-7-w-13663.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
374f540beadd7db75ba91b7f9aaef0250232c3279ee63d1abbf2204a0ca66704

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=86126
ETag
8bdcb3a339547534c51fc71c3e1521f2
X-Timestamp
1713380876.70352
Connection
keep-alive
Expires
Tue, 12 Nov 2024 09:22:21 GMT
Accept-Ranges
bytes
X-Trans-Id
tx19c34b11fcbd43fea8d3f-00673091d6dfw1
Content-Length
235163
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Wed, 17 Apr 2024 19:07:57 GMT
Content-Type
image/jpeg
forrester-wave-cloud-workload-security-q1-2024-logo-7-w-13440.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
92 KB
93 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/forrester-wave-cloud-workload-security-q1-2024-logo-7-w-13440.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b14ba56cb691c727cf5d59011f3494a6caeb0694ec5c8cdbe5361493f58a89c9

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=85764
ETag
f49d018142a8f0f96fa956fd2ad3faff
X-Timestamp
1708325167.65250
Connection
keep-alive
Expires
Tue, 12 Nov 2024 09:16:19 GMT
Accept-Ranges
bytes
X-Trans-Id
tx8111f692cd6943faa789b-00672b4de4dfw1
Content-Length
94400
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Mon, 19 Feb 2024 06:46:08 GMT
Content-Type
image/jpeg
live-webinar-protecting-people-defending-data-in-healthcare-rise-ai-landing_page_image-6-w-5839.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
44 KB
45 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-protecting-people-defending-data-in-healthcare-rise-ai-landing_page_image-6-w-5839.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
573860cbe93b28320024b6b7be1859bb87c236947aa7af25e37af26175c15d9c

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=45919
ETag
b3e2f5bde6a04a0a9f7d3b509734b432
X-Timestamp
1726692666.58636
Connection
keep-alive
Expires
Mon, 11 Nov 2024 22:12:14 GMT
Accept-Ranges
bytes
X-Trans-Id
tx6b47f312acdb4336889db-006715af57dfw1
Content-Length
45235
Date
Mon, 11 Nov 2024 09:26:55 GMT
Last-Modified
Wed, 18 Sep 2024 20:51:07 GMT
Content-Type
image/jpeg
feds-warn-health-sector-array-cyberthreats-image_large-6-a-26771.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
139 KB
139 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/feds-warn-health-sector-array-cyberthreats-image_large-6-a-26771.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
00e3e2eaf38b2711db282bdb1446d4df04ea2c552314731d668abe5853e29f0d

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=44491
ETag
d30b4d2b366d87ad0840f4038495f696
X-Timestamp
1731100045.06329
Connection
keep-alive
Expires
Mon, 11 Nov 2024 21:48:27 GMT
Accept-Ranges
bytes
X-Trans-Id
tx04efb3b199744d1c8c963-00672e860fdfw1
Content-Length
141830
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Fri, 08 Nov 2024 21:07:26 GMT
Content-Type
image/jpeg
how-mega-attacks-are-spotlighting-critical-3rd-party-risks-showcase_image-4-i-5418.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
84 KB
85 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/how-mega-attacks-are-spotlighting-critical-3rd-party-risks-showcase_image-4-i-5418.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
8dbbe6df77ad747ab77786fee3f98e64b8242d32059f1882e2b2489035c4f107

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=31939
ETag
44b0a41ca00cc25d9461b3453e9d960c
X-Timestamp
1725995334.22537
Connection
keep-alive
Expires
Mon, 11 Nov 2024 18:19:15 GMT
Accept-Ranges
bytes
X-Trans-Id
tx578e8d4ad2164484a3053-00672e880edfw1
Content-Length
86494
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Tue, 10 Sep 2024 19:08:55 GMT
Content-Type
image/jpeg
who-will-take-lead-in-setting-healthcare-ai-regs-betsy-hodge-showcase_image-6-i-5415.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
55 KB
55 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/who-will-take-lead-in-setting-healthcare-ai-regs-betsy-hodge-showcase_image-6-i-5415.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
0bf225d89007baa905f895a86688c43f28331d0ff721b8ea0c95abbf8541ebf7

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=82183
ETag
0160cfd427f38cf9d239338c0c569793
X-Timestamp
1725990814.82173
Connection
keep-alive
Expires
Tue, 12 Nov 2024 08:16:39 GMT
Accept-Ranges
bytes
X-Trans-Id
tx53e1dff6dc2046c2ac47f-00672d08cddfw1
Content-Length
56248
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Tue, 10 Sep 2024 17:53:35 GMT
Content-Type
image/jpeg
cyber-insurers-intensifying-scrutiny-healthcare-clients-showcase_image-4-i-5416.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
66 KB
66 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyber-insurers-intensifying-scrutiny-healthcare-clients-showcase_image-4-i-5416.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
5761f1d8e0824488e61c3524ae4b272e61e817b51620dd9f900156f1049e7070

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=24006
ETag
ccbb9b5b1189eafbc7bbaa19a2dc7f5f
X-Timestamp
1725994621.72028
Connection
keep-alive
Expires
Mon, 11 Nov 2024 16:07:02 GMT
Accept-Ranges
bytes
X-Trans-Id
tx0f1db069a4284599898e0-006730da6cdfw1
Content-Length
67533
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Tue, 10 Sep 2024 18:57:02 GMT
Content-Type
image/jpeg
clinical-considerations-when-rebounding-from-ransomware-showcase_image-3-i-5414.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
54 KB
54 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/clinical-considerations-when-rebounding-from-ransomware-showcase_image-3-i-5414.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
fb823b71497f51a2ea4c55aca17149f0d94ebc223de67746c1e95bd0e92a9246

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=82072
ETag
892e3d5a89957047182774b7f92751cc
X-Timestamp
1725989956.24028
Connection
keep-alive
Expires
Tue, 12 Nov 2024 08:14:48 GMT
Accept-Ranges
bytes
X-Trans-Id
tx8dc60e1d461348f6ab553-00670bda7ddfw1
Content-Length
54959
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Tue, 10 Sep 2024 17:39:17 GMT
Content-Type
image/jpeg
eliminating-need-for-stored-credentials-in-healthcare-showcase_image-6-i-5412.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
41 KB
42 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/eliminating-need-for-stored-credentials-in-healthcare-showcase_image-6-i-5412.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7fe5acd22d41cf3aed54500290d9e344c16de9ab8d21b6fd2903b9e45a612ff1

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=24262
ETag
87cc1eea996080f11fceac5346ef73dc
X-Timestamp
1721384663.01075
Connection
keep-alive
Expires
Mon, 11 Nov 2024 16:11:18 GMT
Accept-Ranges
bytes
X-Trans-Id
tx3836c1ce0ce0401392269-006730db48dfw1
Content-Length
42382
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Fri, 19 Jul 2024 10:24:24 GMT
Content-Type
image/jpeg
study-92-healthcare-hit-by-cyberattacks-this-year-embarged-till-5am-et-108-showcase_image-1-i-5419.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
46 KB
47 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/study-92-healthcare-hit-by-cyberattacks-this-year-embarged-till-5am-et-108-showcase_image-1-i-5419.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
19406c49ab3f5a33d5c4c18a2a00c8098f3b92f9f86f4960c495ab058c167e86

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=55149
ETag
0e46a171194667ab59a963d25c096bdd
X-Timestamp
1728318029.70315
Connection
keep-alive
Expires
Tue, 12 Nov 2024 00:46:05 GMT
Accept-Ranges
bytes
X-Trans-Id
tx28561355a15745b7b3cb8-006704f657dfw1
Content-Length
47600
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Mon, 07 Oct 2024 16:20:30 GMT
Content-Type
image/jpeg
logo-ismg-with-text.png
www.databreachtoday.com/images-responsive/
4 KB
4 KB
Image
General
Full URL
https://www.databreachtoday.com/images-responsive/logo-ismg-with-text.png
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
4e2db1bef009e01901b4083a153f1607301428277a76f508e659dc2849cefa04
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
accept-ranges
bytes
alt-svc
h3=":443"; ma=2592000
content-length
4419
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:55 GMT
content-type
image/png
vary
Accept-Encoding
x-frame-options
deny
logo-ismg-print.png
www.databreachtoday.com/images-responsive/
5 KB
5 KB
Image
General
Full URL
https://www.databreachtoday.com/images-responsive/logo-ismg-print.png
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
5133e2e1a213ca44a8adb1f42f103a2d2e495849dfa4d42bf67c04fcc962e577
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
accept-ranges
bytes
alt-svc
h3=":443"; ma=2592000
content-length
5575
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:55 GMT
content-type
image/png
vary
Accept-Encoding
x-frame-options
deny
ondemand-preview-w-255.jpg
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/
56 KB
57 KB
Image
General
Full URL
https://f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/ondemand-preview-w-255.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3059f92e36a564c5cbcedc195f764e3c55c8cf919c84129c5f202870e7026b61

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=117
ETag
7aece0902995efedc289b7c24037434b
X-Timestamp
1373028925.94439
Connection
keep-alive
Expires
Mon, 11 Nov 2024 09:28:53 GMT
Accept-Ranges
bytes
X-Trans-Id
txfd5d93efdf2645c99affa-00673132f4dfw1
Content-Length
57633
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Fri, 05 Jul 2013 12:55:26 GMT
Content-Type
image/jpeg
ron-ross-smallImage-a-558.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
10 KB
11 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/ron-ross-smallImage-a-558.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
9c8bb391a723e088d163b560afa73f709c42a69df5647c4fefce9d16e4226895

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public, max-age=44432
ETag
fac8c56390d084c4f1dfaa9b24a58c33
X-Timestamp
1383311364.81114
Connection
keep-alive
Expires
Mon, 11 Nov 2024 21:47:28 GMT
Accept-Ranges
bytes
X-Trans-Id
txa7ae42eab4254abf8e1e3-00670c0176dfw1
Content-Length
10640
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Fri, 01 Nov 2013 13:09:25 GMT
Content-Type
image/jpeg
main.js
www.databreachtoday.com/javascripts-responsive/
42 KB
10 KB
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/main.js?s=1731317213.9896
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
65aa03b8baf6c12db882c7ff9194eac095cb6107256cc9b05889c368ba2f5e90
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:55 GMT
content-type
text/javascript; charset=utf-8
vary
Accept-Encoding
x-frame-options
deny
media-transcript-navigation.js
www.databreachtoday.com/javascripts-responsive/
26 KB
7 KB
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/media-transcript-navigation.js?s=1731317213.9896
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
ae3c472ff47a96820c1acdf9574b231a88f62a006b84d320eb313af40f32f2db
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:55 GMT
content-type
text/javascript; charset=utf-8
vary
Accept-Encoding
x-frame-options
deny
bis-hdr.r1.js
www.databreachtoday.com/javascripts-responsive/
1 KB
485 B
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/bis-hdr.r1.js?s=1731317213.9896
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
9a13fb5949ace41b41f2baafd0749b4a9e3b98a86082246980d785c0f0e2f494
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
alt-svc
h3=":443"; ma=2592000
content-length
449
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:55 GMT
content-type
text/javascript; charset=utf-8
vary
Accept-Encoding
x-frame-options
deny
jquery.browser.js
www.databreachtoday.com/javascripts-responsive/
2 KB
1 KB
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/jquery.browser.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
0037005ca3e7cad32331724064278a8cfc3915a31eab50eb1e074f97fe9902a6
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
alt-svc
h3=":443"; ma=2592000
content-length
1026
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:55 GMT
content-type
text/javascript; charset=utf-8
vary
Accept-Encoding
x-frame-options
deny
jquery.prettyPhoto.js
www.databreachtoday.com/javascripts-responsive/
23 KB
6 KB
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/jquery.prettyPhoto.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
c4309cf270cbc7d300e797f598b5c2f504d2b59ea5894bd7b9fad38528b2f8ab
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:55 GMT
content-type
text/javascript; charset=utf-8
vary
Accept-Encoding
x-frame-options
deny
ismg-user-ip
worker.ismgcorp.com/
12 B
305 B
XHR
General
Full URL
https://worker.ismgcorp.com/ismg-user-ip
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/javascripts-responsive/vendor/jquery.min.js?s=1731317213.9896
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.130.251.6 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
d7299f53c4e3975280f5d8e9245bb5404f203f29b5313288e32f50e1f2a05ceb
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept
*/*
Referer
https://www.databreachtoday.com/

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
upgrade-insecure-requests
cache-control
no-cache, private
x-content-type-options
nosniff
referrer-policy
no-referrer-when-downgrade
access-control-allow-origin
*
content-length
12
date
Mon, 11 Nov 2024 09:26:56 GMT
x-xss-protection
1; mode=block
content-type
text/html; charset=UTF-8
gpt.js
www.googletagservices.com/tag/js/
107 KB
33 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:813::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7f54b702a52c655d2d90abc398bdb800c377889b6ce1de669386d554a6ff10a8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
etag
828 / 20038 / 31088753 / config-hash: 13843807420987237646
x-content-type-options
nosniff
expires
Mon, 11 Nov 2024 09:26:56 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
date
Mon, 11 Nov 2024 09:26:56 GMT
content-type
text/javascript; charset=UTF-8
vary
Accept-Encoding
content-disposition
attachment; filename="f.txt"
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
access-control-allow-origin
*
content-length
33175
x-xss-protection
0
server
cafe
munchkin.js
munchkin.marketo.net/
1 KB
1 KB
Script
General
Full URL
https://munchkin.marketo.net/munchkin.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/javascripts-responsive/vendor/jquery.min.js?s=1731317213.9896
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.199.214.136 Düsseldorf, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-199-214-136.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
57d030752d740552eb7759a0dd8e487e96ca86b03c0aa53a7e2b1c213ae74f5f

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Content-Encoding
gzip
ETag
"49bb20382072bfb6b798a6f4c6ab8354:1730261707.305765"
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
746
P3P
policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR"
Date
Mon, 11 Nov 2024 09:26:56 GMT
Content-Type
application/x-javascript
Last-Modified
Wed, 30 Oct 2024 04:15:07 GMT
Server
AkamaiNetStorage
Vary
Accept-Encoding
gtm.js
www.googletagmanager.com/
240 KB
80 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-T626NZ
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
23f5e3986e68724ebf506f09f07f5ecebcf4acb57f50a316c7f4608a8850d564
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
report-to
{"group":"coop_reporting","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/scaffolding/ascgcycc:1080:0"}],}
expires
Mon, 11 Nov 2024 09:26:56 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Mon, 11 Nov 2024 09:26:56 GMT
content-type
application/javascript; charset=UTF-8
vary
Accept-Encoding
last-modified
Mon, 11 Nov 2024 09:00:00 GMT
access-control-allow-headers
Cache-Control
strict-transport-security
max-age=31536000; includeSubDomains
cache-control
private, max-age=900
cross-origin-resource-policy
cross-origin
access-control-allow-credentials
true
content-security-policy-report-only
script-src 'none'; form-action 'none'; frame-src 'none'; report-uri https://csp.withgoogle.com/csp/scaffolding/ascgcycc:1080:0
access-control-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to=coop_reporting
content-length
81157
x-xss-protection
0
server
Google Tag Manager
memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
fonts.gstatic.com/s/opensans/v40/
47 KB
47 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v40/memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.186.99 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s06-in-f3.1e100.net
Software
sffe /
Resource Hash
3c4d6a1421c7ddb7e404521fe8c4cd5be5af446d7689cd880be26612eaad3cfa
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Origin
https://www.databreachtoday.com
Referer
https://fonts.googleapis.com/

Response headers

age
410314
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
x-content-type-options
nosniff
expires
Thu, 06 Nov 2025 15:28:21 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Wed, 06 Nov 2024 15:28:21 GMT
last-modified
Thu, 14 Dec 2023 02:08:40 GMT
content-type
font/woff2
cache-control
public, max-age=31536000
timing-allow-origin
*
cross-origin-opener-policy
same-origin; report-to="apps-themes"
cross-origin-resource-policy
cross-origin
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
accept-ranges
bytes
access-control-allow-origin
*
content-length
48236
x-xss-protection
0
server
sffe
fontawesome-webfont.woff
www.databreachtoday.com/css-responsive/fonts/
43 KB
44 KB
Font
General
Full URL
https://www.databreachtoday.com/css-responsive/fonts/fontawesome-webfont.woff?v=4.2.0
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/css-responsive/vendor/font-awesome.min.css?s=1731317213.9896
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
0fd28fece9ebd606b8b071460ebd3fc2ed7bc7a66ef91c8834f11dfacab4a849
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Origin
https://www.databreachtoday.com
Referer
https://www.databreachtoday.com/css-responsive/vendor/font-awesome.min.css?s=1731317213.9896

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
content-encoding
gzip
etag
"d5grodwh97p0ya8-gzip"
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
alt-svc
h3=":443"; ma=2592000
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:55 GMT
content-type
font/woff
last-modified
Fri, 08 Nov 2024 11:39:42 GMT
vary
Accept-Encoding
x-frame-options
deny
memtYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWqWuU6F.woff2
fonts.gstatic.com/s/opensans/v40/
49 KB
49 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v40/memtYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWqWuU6F.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.186.99 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s06-in-f3.1e100.net
Software
sffe /
Resource Hash
0d8601a776b7dc777cd23bc42392d05a43df0d6402328e8913b58811083b513d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Origin
https://www.databreachtoday.com
Referer
https://fonts.googleapis.com/

Response headers

age
409550
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
x-content-type-options
nosniff
expires
Thu, 06 Nov 2025 15:41:05 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Wed, 06 Nov 2024 15:41:05 GMT
last-modified
Thu, 14 Dec 2023 02:10:01 GMT
content-type
font/woff2
cache-control
public, max-age=31536000
timing-allow-origin
*
cross-origin-opener-policy
same-origin; report-to="apps-themes"
cross-origin-resource-policy
cross-origin
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
accept-ranges
bytes
access-control-allow-origin
*
content-length
50296
x-xss-protection
0
server
sffe
ondemand-preview-w-255.mp4
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/
0
0

embed.js
bankinfosecurity.disqus.com/
80 KB
26 KB
Script
General
Full URL
https://bankinfosecurity.disqus.com/embed.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
199.232.196.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
openresty /
Resource Hash
d49a01e9f4f6e7dc8cee984274ae9e4c2c6bbf3a37c671a798573c163eed5c03
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Strict-Transport-Security
max-age=300; includeSubdomains
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
Cache-Control
private, max-age=60
x-service
router
content-encoding
gzip
Age
31
Connection
keep-alive
Cross-Origin-Resource-Policy
cross-origin
Content-Length
26333
Date
Mon, 11 Nov 2024 09:26:56 GMT
content-type
application/javascript; charset=utf-8
Vary
Accept-Encoding
server
openresty
tag.aspx
ml314.com/
38 KB
13 KB
Script
General
Full URL
https://ml314.com/tag.aspx?11102024
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.117.77.79 Kansas City, United States, ASN396982 (GOOGLE-CLOUD-PLATFORM, US),
Reverse DNS
79.77.117.34.bc.googleusercontent.com
Software
UploadServer /
Resource Hash
d0e12af8c4e560fe89643639e0c3ed4dc76125c62adeb2879b761d73dbaecf50

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

x-goog-metageneration
1
x-goog-hash
crc32c=6sDw2Q==, md5=YyYW/xWCXwMKqzORpY7wQg==
content-encoding
br
age
1804
x-goog-stored-content-encoding
identity
x-cache-hit
hit
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
x-goog-stored-content-length
39162
date
Mon, 11 Nov 2024 08:56:52 GMT
last-modified
Wed, 24 Jul 2024 19:30:50 GMT
content-type
application/javascript
vary
Accept-Encoding
x-guploader-uploadid
AHmUCY3xSAjC4wAUOTabhivHK2ZgYAw3PI4lLkEuewYczbzOZyEkD5GpDSG3Fsa4yoqPscQP1V4f3gLk2Q
cache-control
public,max-age=3600
x-goog-storage-class
STANDARD
via
1.1 google
cache-id
FRA
accept-ranges
bytes
x-goog-generation
1721849450340665
content-length
12522
server
UploadServer
642714f45d783b00125f1b86.js
buttons-config.sharethis.com/js/
564 B
1008 B
Script
General
Full URL
https://buttons-config.sharethis.com/js/642714f45d783b00125f1b86.js
Requested by
Host: platform-api.sharethis.com
URL: https://platform-api.sharethis.com/js/sharethis.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:3600:c:abe:f440:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
e7acadbf0974375556c28ad3d2c4b09d6b4f180f85df202922cc06ed526f946e
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

strict-transport-security
max-age=31536000; includeSubDomains
vary
accept-encoding
cache-control
public, max-age=60
etag
"643296975534fd0c8b837a75629dc0b0"
via
1.1 6def1f0ddc805dce17407cce01d5b32c.cloudfront.net (CloudFront)
accept-ranges
bytes
x-cache
RefreshHit from cloudfront
content-length
564
x-amz-cf-id
Hy9U9Rfyyv98av4LvrcGGA-ynN9L7wH4lsH6qzguR6nxybH30TSzmg==
date
Mon, 11 Nov 2024 09:26:58 GMT
content-type
text/javascript
last-modified
Fri, 31 Mar 2023 17:56:01 GMT
server
AmazonS3
x-amz-cf-pop
FRA56-C1
x-amz-server-side-encryption
AES256
log
l.sharethis.com/
0
380 B
Image
General
Full URL
https://l.sharethis.com/log?event=ibl&title=&url=https%3A%2F%2Flinks.ismgcorp.com%2F&fcmp=false&fcmpv2=false&has_segmentio=false&product=inline-share-buttons&publisher=642714f45d783b00125f1b86&account=true&ssb=false&refDomain=links.ismgcorp.com&refQuery=&source=sharethis.js&ts=1731317215778&sop=true&cms=unknown&description=Multiple%20Chinese%20hacking%20groups%20are%20using%20a%20botnet%20named%20for%20a%20TCP%20routing%20port%20number%20to%20conduct%20password%20spraying%20attacks%2C%20warned%20Microsoft%20Thursday.%20The%20Quad7
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.156.183.132 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-35-156-183-132.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains;

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Strict-Transport-Security
max-age=63072000; includeSubDomains;
Access-Control-Max-Age
1728000
Access-Control-Expose-Headers
stid
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Access-Control-Allow-Credentials
true
Access-Control-Allow-Origin
*
Date
Mon, 11 Nov 2024 09:26:56 GMT
Access-Control-Allow-Headers
*
insight.min.js
sjs.bizographics.com/
47 KB
17 KB
Script
General
Full URL
https://sjs.bizographics.com/insight.min.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:3500:10::210:a9a Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
899d1ec3c095342571d3be2091ec6f984d4cc82390d1f61945c391fa035b00d9
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
max-age=27375
content-encoding
gzip
x-cdn
AKAM
x-content-type-options
nosniff
accept-ranges
bytes
content-length
16683
date
Mon, 11 Nov 2024 09:26:56 GMT
last-modified
Mon, 06 May 2024 17:20:18 GMT
content-type
application/javascript;charset=utf-8
vary
Accept-Encoding
x-amz-server-side-encryption
AES256
insight.min.js
snap.licdn.com/li.lms-analytics/
40 KB
14 KB
Script
General
Full URL
https://snap.licdn.com/li.lms-analytics/insight.min.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:3500:10::210:a9a Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
8a27dc7b44ebe886390bfa0a9beeea36ea5a3f37479f0e0836b6c9b80d9b35ed
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
max-age=9268
content-encoding
gzip
x-cdn
AKAM
x-content-type-options
nosniff
accept-ranges
bytes
content-length
14628
date
Mon, 11 Nov 2024 09:26:56 GMT
last-modified
Thu, 22 Aug 2024 10:43:55 GMT
content-type
application/javascript;charset=utf-8
vary
Accept-Encoding
x-amz-server-side-encryption
AES256
6si.min.js
j.6sc.co/
68 KB
19 KB
Script
General
Full URL
https://j.6sc.co/6si.min.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.53.43.58 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a23-53-43-58.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
d5ecf2f6d5b7937dd1aa50165b89193436347d55cb130951d41e028b1f09d3af
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
private, proxy-revalidate, max-age=10800
content-encoding
gzip
etag
"66fb91ae-111bb"
x-content-type-options
nosniff
expires
Mon, 11 Nov 2024 12:26:56 GMT
accept-ranges
bytes
content-length
18819
date
Mon, 11 Nov 2024 09:26:56 GMT
content-type
application/javascript
vary
Accept-Encoding
server
nginx/1.14.0 (Ubuntu)
last-modified
Tue, 01 Oct 2024 06:07:42 GMT
pview
l.sharethis.com/
0
410 B
XHR
General
Full URL
https://l.sharethis.com/pview?event=pview&hostname=www.databreachtoday.com&location=%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709&product=inline-share-buttons&url=https%3A%2F%2Fwww.databreachtoday.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709%3Frf%3D2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog&source=platform&fcmp=false&fcmpv2=false&has_segmentio=false&title=Chinese%20Hackers%20Use%20Quad7%20Botnet%20for%20Credential%20Theft&refDomain=links.ismgcorp.com&cms=unknown&publisher=642714f45d783b00125f1b86&sop=true&version=st_sop.js&lang=en&description=Multiple%20Chinese%20hacking%20groups%20are%20using%20a%20botnet%20named%20for%20a%20TCP%20routing%20port%20number%20to%20conduct%20password%20spraying%20attacks%2C%20warned%20Microsoft%20Thursday.%20The%20Quad7&ua=&ua_mobile=false&ua_full_version_list=&uuid=268ca920-4459-43fb-a29c-4f1a5888b004
Requested by
Host: platform-api.sharethis.com
URL: https://platform-api.sharethis.com/js/sharethis.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.156.183.132 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-35-156-183-132.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains;

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Strict-Transport-Security
max-age=63072000; includeSubDomains;
Access-Control-Max-Age
1728000
Access-Control-Expose-Headers
stid
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Access-Control-Allow-Credentials
true
Access-Control-Allow-Origin
https://www.databreachtoday.com
Date
Mon, 11 Nov 2024 09:26:56 GMT
Access-Control-Allow-Headers
*
ondemand-preview-w-255.mp4
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/
3 MB
0
Media
General
Full URL
https://f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/ondemand-preview-w-255.mp4
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash

Request headers

Referer
https://www.databreachtoday.com/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Range
bytes=0-

Response headers

Cache-Control
public, max-age=819
ETag
e5d65b36cc2f1ee7de6cc53cd6609280
X-Timestamp
1373028995.98411
Connection
keep-alive
Content-Range
bytes 0-10621769/10621770
Expires
Mon, 11 Nov 2024 09:40:35 GMT
Accept-Ranges
bytes
X-Trans-Id
tx7c0569a2535b4a8cba71d-00672d0d4edfw1
Content-Length
10621770
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Fri, 05 Jul 2013 12:56:36 GMT
Content-Type
video/mp4
ajax.php
www.databreachtoday.com/
5 B
85 B
XHR
General
Full URL
https://www.databreachtoday.com/ajax.php?json=notificationCookies&action=getNotifications
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/javascripts-responsive/vendor/jquery.min.js?s=1731317213.9896
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
fcbcf165908dd18a9e49f7ff27810176db8e9f63b4352213741664245224f8aa
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept
*/*

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
no-store, no-cache, must-revalidate
content-encoding
gzip
pragma
no-cache
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
expires
Thu, 19 Nov 1981 08:52:00 GMT
alt-svc
h3=":443"; ma=2592000
content-length
25
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:56 GMT
content-type
text/html; charset=UTF-8
vary
Accept-Encoding
x-frame-options
deny
munchkin.js
munchkin.marketo.net/163/
11 KB
5 KB
Script
General
Full URL
https://munchkin.marketo.net/163/munchkin.js
Requested by
Host: munchkin.marketo.net
URL: https://munchkin.marketo.net/munchkin.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.199.214.136 Düsseldorf, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-199-214-136.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
68cc280ce370c6f1f51a4fc5950103fc38df80a429552c549add04ebd8bd3a23

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
max-age=8640000
Content-Encoding
gzip
ETag
"ea7826f34518d7c2295738f39c7640fa:1672972000.238769"
Connection
keep-alive
Expires
Wed, 19 Feb 2025 09:26:56 GMT
Accept-Ranges
bytes
P3P
policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR", policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR", policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR"
Content-Length
4741
Date
Mon, 11 Nov 2024 09:26:56 GMT
Content-Type
application/x-javascript
Last-Modified
Fri, 06 Jan 2023 02:26:40 GMT
Server
AkamaiNetStorage
Vary
Accept-Encoding
utsync.ashx
ml314.com/
62 B
237 B
Script
General
Full URL
https://ml314.com/utsync.ashx?pub=&adv=&et=0&eid=57819&ct=js&pi=&fp=&clid=&if=0&ps=&cl=&mlt=&data=&&cp=https%3A%2F%2Fwww.databreachtoday.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709%3Frf%3D2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog&pv=1731317216910_2apnudxa8&bl=de-de&cb=1447611&return=&ht=&d=&dc=&si=1731317216910_2apnudxa8&cid=&s=1600x1200&rp=https%3A%2F%2Flinks.ismgcorp.com%2F&v=2.7.4.212
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?11102024
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.117.77.79 Kansas City, United States, ASN396982 (GOOGLE-CLOUD-PLATFORM, US),
Reverse DNS
79.77.117.34.bc.googleusercontent.com
Software
Google Frontend /
Resource Hash
5a1ba6ff6db12f791bbbfc4da3cb389e06f0cd53eede09ef3eb3ceb074089ef1

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
no-cache, no-store, must-revalidate
pragma
no-cache
via
1.1 google
expires
0
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
date
Mon, 11 Nov 2024 09:26:56 GMT
content-type
application/javascript
server
Google Frontend
ud.ashx
in.ml314.com/
20 B
482 B
Script
General
Full URL
https://in.ml314.com/ud.ashx?topiclimit=&cb=11102024&v=2.7.4.212
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?11102024
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.219.124.110 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-3-219-124-110.compute-1.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
d0e4a6372d6fb5ffe9505dbe9e94aee8f1b9b96ec8e5e20684cce8b4c5a88fa7

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Cache-Control
public
X-AspNet-Version
4.0.30319
Content-Encoding
gzip
Connection
keep-alive
Expires
Tue, 12 Nov 2024 09:26:57 GMT
Content-Length
138
Date
Mon, 11 Nov 2024 09:26:57 GMT
Content-Type
application/javascript; charset=utf-8
Vary
Accept-Encoding
Server
Microsoft-IIS/10.0
X-Powered-By
ASP.NET
pubads_impl.js
securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/
488 KB
151 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
172.217.18.2 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s28-in-f2.1e100.net
Software
cafe /
Resource Hash
813ea9537efd135207fbc81d8b3fa560ca8ab7f5ba25534f36442820f043e250
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
etag
8893824018935994055
age
6007
x-content-type-options
nosniff
expires
Tue, 11 Nov 2025 07:46:50 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
date
Mon, 11 Nov 2024 07:46:50 GMT
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
vary
Accept-Encoding
cache-control
public, immutable, max-age=31536000
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
access-control-allow-origin
*
content-length
154585
x-xss-protection
0
server
cafe
ppub_config
securepubads.g.doubleclick.net/pagead/
71 B
78 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/pagead/ppub_config?ippd=www.databreachtoday.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
172.217.18.2 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s28-in-f2.1e100.net
Software
cafe /
Resource Hash
4abd1a4fd9e6f1fa7fd73235df212bc8d003e61e836203034481d5fcc2bdf033
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
private, max-age=3600, stale-while-revalidate=3600
timing-allow-origin
*
content-encoding
br
cross-origin-resource-policy
cross-origin
x-content-type-options
nosniff
expires
Mon, 11 Nov 2024 09:26:57 GMT
access-control-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
content-length
54
date
Mon, 11 Nov 2024 09:26:57 GMT
x-xss-protection
0
content-type
application/json; charset=UTF-8
content-disposition
attachment; filename="f.txt"
server
cafe
visitWebPage
051-zxi-237.mktoresp.com/webevents/
2 B
318 B
Ping
General
Full URL
https://051-zxi-237.mktoresp.com/webevents/visitWebPage?_mchNc=1731317217013&_mchCn=&_mchId=051-ZXI-237&_mchTk=_mch-databreachtoday.com-1731317217007-96064&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog&_mchHo=www.databreachtoday.com&_mchPo=&_mchRu=%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709&_mchPc=https%3A&_mchVr=163&_mchEcid=&_mchHa=&_mchRe=https%3A%2F%2Flinks.ismgcorp.com%2F&_mchQp=rf%3D2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709__-__mkt_tok%3DMDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Requested by
Host: munchkin.marketo.net
URL: https://munchkin.marketo.net/163/munchkin.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.28.147.68 , United States, ASN15224 (OMNITURE, US),
Reverse DNS
Software
nginx/1.20.1 /
Resource Hash
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Transfer-Encoding
chunked
X-Request-Id
00f91007-7b82-487c-a01b-16285e197e30
Content-Encoding
gzip
Connection
keep-alive
Access-Control-Allow-Origin
*
Date
Mon, 11 Nov 2024 09:26:57 GMT
Content-Type
text/plain; charset=UTF-8
Server
nginx/1.20.1
visitWebPage
051-zxi-237.mktoresp.com/webevents/
2 B
318 B
Ping
General
Full URL
https://051-zxi-237.mktoresp.com/webevents/visitWebPage?_mchNc=1731317217013&_mchRu=%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709%3Frf%3D2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709%26amp%3Bmkt_tok%3DMDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog&_mchQp=cat%3D444%26assetID%3D26709%26assetType%3Darticle%26key%3Dchina%26key%3Dtp-link%26key%3Dstorm-0940%26key%3Dmicrosoft%26key%3Dpassword%20spraying%26key%3Dquad7%26key%3D&_mchId=051-ZXI-237&_mchTk=_mch-databreachtoday.com-1731317217007-96064&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog&_mchHo=www.databreachtoday.com&_mchPo=&_mchPc=https%3A&_mchVr=163&_mchEcid=&_mchRe=https%3A%2F%2Flinks.ismgcorp.com%2F
Requested by
Host: munchkin.marketo.net
URL: https://munchkin.marketo.net/163/munchkin.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.28.147.68 , United States, ASN15224 (OMNITURE, US),
Reverse DNS
Software
nginx/1.20.1 /
Resource Hash
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

Transfer-Encoding
chunked
X-Request-Id
d4ee2dc6-fbb3-4408-8cb0-666f446c085a
Content-Encoding
gzip
Connection
keep-alive
Access-Control-Allow-Origin
*
Date
Mon, 11 Nov 2024 09:26:57 GMT
Content-Type
text/plain; charset=UTF-8
Server
nginx/1.20.1
js
www.googletagmanager.com/gtag/
294 KB
101 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=G-XJ8Q4QGGRH&l=dataLayer&cx=c&gtm=45He4b70v6624193za200
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-T626NZ
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
4562f08f3fac7db005f6c2996f1e448d3c43b87b56fcf22a926e8150f389cb73
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
report-to
{"group":"coop_reporting","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/scaffolding/ascgcycc:838:0"}],}
expires
Mon, 11 Nov 2024 09:26:57 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Mon, 11 Nov 2024 09:26:57 GMT
content-type
application/javascript; charset=UTF-8
vary
Accept-Encoding
access-control-allow-headers
Cache-Control
strict-transport-security
max-age=31536000; includeSubDomains
cache-control
private, max-age=900
cross-origin-resource-policy
cross-origin
access-control-allow-credentials
true
content-security-policy-report-only
script-src 'none'; form-action 'none'; frame-src 'none'; report-uri https://csp.withgoogle.com/csp/scaffolding/ascgcycc:838:0
access-control-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to=coop_reporting
content-length
103074
x-xss-protection
0
server
Google Tag Manager
js
www.googletagmanager.com/gtag/
271 KB
95 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=G-P0BJ2JRM5Y&l=dataLayer&cx=c&gtm=45He4b70v6624193za200
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-T626NZ
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
ce480c457384d5a2777d35ede071c69cc10ed4a3d6f591feafb851761ed57ae9
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
report-to
{"group":"coop_reporting","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/scaffolding/ascgcycc:838:0"}],}
expires
Mon, 11 Nov 2024 09:26:57 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Mon, 11 Nov 2024 09:26:57 GMT
content-type
application/javascript; charset=UTF-8
vary
Accept-Encoding
access-control-allow-headers
Cache-Control
strict-transport-security
max-age=31536000; includeSubDomains
cache-control
private, max-age=900
cross-origin-resource-policy
cross-origin
access-control-allow-credentials
true
content-security-policy-report-only
script-src 'none'; form-action 'none'; frame-src 'none'; report-uri https://csp.withgoogle.com/csp/scaffolding/ascgcycc:838:0
access-control-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to=coop_reporting
content-length
97532
x-xss-protection
0
server
Google Tag Manager
6si.min.js
j.6sc.co/
68 KB
0
Script
General
Full URL
https://j.6sc.co/6si.min.js
Requested by
Host: links.ismgcorp.com
URL: https://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGWlwzHJZCDqbswoUxZdX70nL30BnYPp572VhPywT5pQTzLEICX5iqTS9Aa_Covm6Xg7V1r-UM=
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.53.43.58 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a23-53-43-58.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
d5ecf2f6d5b7937dd1aa50165b89193436347d55cb130951d41e028b1f09d3af
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
private, proxy-revalidate, max-age=10800
content-encoding
gzip
etag
"66fb91ae-111bb"
x-content-type-options
nosniff
expires
Mon, 11 Nov 2024 12:26:56 GMT
accept-ranges
bytes
content-length
18819
date
Mon, 11 Nov 2024 09:26:56 GMT
content-type
application/javascript
vary
Accept-Encoding
server
nginx/1.14.0 (Ubuntu)
last-modified
Tue, 01 Oct 2024 06:07:42 GMT
i5wta0dq65
www.clarity.ms/tag/
553 B
809 B
Script
General
Full URL
https://www.clarity.ms/tag/i5wta0dq65
Requested by
Host: links.ismgcorp.com
URL: https://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGWlwzHJZCDqbswoUxZdX70nL30BnYPp572VhPywT5pQTzLEICX5iqTS9Aa_Covm6Xg7V1r-UM=
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2620:1ec:29:1::45 , United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
333c31977d97c03637f01f462d0c3732dbbb101c3f7872d048914a80ce0f75dc

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
no-cache, no-store
request-context
appId=cid-v1:e97341f6-8fff-46a6-9229-fbbfe0892c78
expires
-1
accept-ranges
bytes
x-cache
CONFIG_NOCACHE
content-length
553
date
Mon, 11 Nov 2024 09:26:57 GMT
content-type
application/x-javascript
x-azure-ref
20241111T092657Z-178d4494767zrhs7hC1FRA09g40000000bc0000000008d6n
Bootstrap.js
nexus.ensighten.com/choozle/19322/
57 KB
17 KB
Script
General
Full URL
https://nexus.ensighten.com/choozle/19322/Bootstrap.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-T626NZ
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:2600:2:8f43:5780:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
CloudFront /
Resource Hash
699e4d441a6c069832f33550b732d90d5263edf82da5c2ddffd9236e3910a994

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
gzip
x-amz-version-id
dWqqGWjDkL_dGHn6QVVMgNdXRFOvROzn
etag
W/"013d85c9008da47ef2f3c05fb56902bf"
age
692195
alt-svc
h3=":443"; ma=86400
x-cache
Hit from cloudfront
x-amz-cf-id
hCCFTneHuaJp1v0RrF-4y232eBYR5enLfo5eSo1iUhRnlHLsfK6kDw==
date
Sun, 03 Nov 2024 09:10:23 GMT
content-type
application/javascript; charset=utf-8
vary
accept-encoding
last-modified
Wed, 16 Oct 2024 17:22:03 GMT
x-amz-replication-status
COMPLETED
cache-control
max-age=300
via
1.1 14b10bd09a0531ef477d0a404ca26900.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA56-C1
server
CloudFront
x-amz-server-side-encryption
AES256
/
disqus.com/embed/comments/ Frame 8A38
0
0
Document
General
Full URL
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709&t_d=Chinese%20Hackers%20Use%20Quad7%20Botnet%20for%20Credential%20Theft&t_t=Chinese%20Hackers%20Use%20Quad7%20Botnet%20for%20Credential%20Theft&s_o=default
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
151.101.192.134 San Francisco, United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ https://com-disqus.netmng.com:* 'unsafe-inline' https://referrer.disqus.com/juggler/ https://connect.facebook.net/en_US/sdk.js https://cdn.syndication.twimg.com/tweets.json https://apis.google.com https://www.google.com/recaptcha/ https://cf.ignitionone.com:* https://disqus.com
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.databreachtoday.com/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

Age
0
Cache-Control
stale-if-error=3600, s-stalewhilerevalidate=3600, stale-while-revalidate=30, no-cache, must-revalidate, public, s-maxage=5
Connection
keep-alive
Content-Encoding
gzip
Content-Length
2938
Content-Security-Policy
script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ https://com-disqus.netmng.com:* 'unsafe-inline' https://referrer.disqus.com/juggler/ https://connect.facebook.net/en_US/sdk.js https://cdn.syndication.twimg.com/tweets.json https://apis.google.com https://www.google.com/recaptcha/ https://cf.ignitionone.com:* https://disqus.com
Content-Type
text/html; charset=utf-8
Cross-Origin-Resource-Policy
cross-origin
Date
Mon, 11 Nov 2024 09:26:57 GMT
ETag
W/"lounge:view:10366110630.8c2c10c311d8b9d980f4febf6922a401.2"
Last-Modified
Thu, 07 Nov 2024 07:12:51 GMT
Link
<https://c.disquscdn.com>;rel=preconnect,<https://c.disquscdn.com>;rel=dns-prefetch
Referrer-Policy
no-referrer-when-downgrade
Server
nginx
Strict-Transport-Security
max-age=300; includeSubdomains
Timing-Allow-Origin
*
Vary
Accept-Encoding
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
attribution_trigger
px.ads.linkedin.com/
2 B
812 B
XHR
General
Full URL
https://px.ads.linkedin.com/attribution_trigger?pid=749%2C2330930&time=1731317217078&url=https%3A%2F%2Fwww.databreachtoday.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709%3Frf%3D2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Requested by
Host: sjs.bizographics.com
URL: https://sjs.bizographics.com/insight.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:21::14 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept
*
Referer
https://www.databreachtoday.com/

Response headers

x-li-pop
afd-prod-lva1-x
content-encoding
gzip
x-fs-uuid
0006269fb3c064b422861b7caf4cb936
x-msedge-ref
Ref A: 874B37D7D2FC4D73A2075B66FAAF860D Ref B: FRAEDGE1207 Ref C: 2024-11-11T09:26:57Z
x-li-fabric
prod-lva1
x-restli-protocol-version
1.0.0
access-control-allow-methods
GET, OPTIONS
x-li-uuid
AAYmn7PAZLQihht8r0y5Ng==
x-li-proto
http/2
access-control-allow-origin
*
x-cache
CONFIG_NOCACHE
date
Mon, 11 Nov 2024 09:26:57 GMT
content-type
application/json
access-control-allow-headers
*
collect
px4.ads.linkedin.com/
Redirect Chain
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749%2C2330930&time=1731317217078&url=https%3A%2F%2Fwww.databreachtoday.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709%3Frf%3D...
  • https://px4.ads.linkedin.com/collect?v=2&fmt=js&pid=749%2C2330930&time=1731317217078&url=https%3A%2F%2Fwww.databreachtoday.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709%3Frf%3...
0
266 B
Image
General
Full URL
https://px4.ads.linkedin.com/collect?v=2&fmt=js&pid=749%2C2330930&time=1731317217078&url=https%3A%2F%2Fwww.databreachtoday.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709%3Frf%3D2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog&e_ipv6=AQJl0CP9k7O92wAAAZMajDl5-FizHhFSnPQdhBk7vueHwXv4_gSvTHVMzlwnDShbtA
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Server
13.107.42.14 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

linkedin-action
1
x-li-pop
afd-prod-lva1-x
x-msedge-ref
Ref A: 36FC720DD9884F10978DE717E57A1692 Ref B: DUS30EDGE0822 Ref C: 2024-11-11T09:26:57Z
x-li-fabric
prod-lva1
x-li-uuid
AAYmn7PD9RMu1Vp8QHwlPw==
x-li-proto
http/2
x-cache
CONFIG_NOCACHE
content-length
0
date
Mon, 11 Nov 2024 09:26:57 GMT
content-type
application/javascript

Redirect headers

linkedin-action
1
x-li-pop
afd-prod-lva1-x
nel
{"report_to":"network-errors","max_age":1296000,"success_fraction":0.00066,"failure_fraction":1,"include_subdomains":true}
location
https://px4.ads.linkedin.com/collect?v=2&fmt=js&pid=749%2C2330930&time=1731317217078&url=https%3A%2F%2Fwww.databreachtoday.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709%3Frf%3D2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog&e_ipv6=AQJl0CP9k7O92wAAAZMajDl5-FizHhFSnPQdhBk7vueHwXv4_gSvTHVMzlwnDShbtA
x-msedge-ref
Ref A: 90CEC69F66904AE5A7BA06D75A380308 Ref B: FRAEDGE1611 Ref C: 2024-11-11T09:26:57Z
x-li-fabric
prod-lva1
report-to
{"group":"network-errors","max_age":2592000,"endpoints":[{"url":"https://www.linkedin.com/li/rep"}],"include_subdomains":true}
x-li-uuid
AAYmn7PAZinDFYX1HD/t/Q==
x-li-proto
http/2
x-cache
CONFIG_NOCACHE
content-length
0
date
Mon, 11 Nov 2024 09:26:57 GMT
/
px.ads.linkedin.com/wa/
0
446 B
XHR
General
Full URL
https://px.ads.linkedin.com/wa/
Requested by
Host: snap.licdn.com
URL: https://snap.licdn.com/li.lms-analytics/insight.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:21::14 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.databreachtoday.com/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept
*
Content-Type
text/plain;charset=UTF-8

Response headers

linkedin-action
1
x-li-pop
afd-prod-lva1-x
x-msedge-ref
Ref A: CD710A8E12BB40F187FC59B1A84299B5 Ref B: FRAEDGE1611 Ref C: 2024-11-11T09:26:57Z
x-li-fabric
prod-lva1
access-control-allow-credentials
true
x-li-uuid
AAYmn7PAZqBOGBMOH+tkvg==
x-li-proto
http/2
access-control-allow-origin
https://www.databreachtoday.com
x-cache
CONFIG_NOCACHE
date
Mon, 11 Nov 2024 09:26:57 GMT
vary
Origin
/
c.6sc.co/
7 B
199 B
XHR
General
Full URL
https://c.6sc.co/
Requested by
Host: j.6sc.co
URL: https://j.6sc.co/6si.min.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.53.43.58 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a23-53-43-58.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
fe04a9dc88d3f3be8d4f6bc63a9a80f45a4c6d8460e7551dab849457c091920a

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

access-control-max-age
86400
access-control-allow-credentials
true
access-control-allow-methods
GET,POST
access-control-allow-origin
https://www.databreachtoday.com
content-length
7
date
Mon, 11 Nov 2024 09:26:57 GMT
content-type
text/html
access-control-allow-headers
*
/
ipv6.6sc.co/
15 B
307 B
XHR
General
Full URL
https://ipv6.6sc.co/
Requested by
Host: j.6sc.co
URL: https://j.6sc.co/6si.min.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:ab00::214:8e41 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
f281567c4e314b11e8eabe1856b5e6e10ac02b559e3f2282a057357f0fff682b

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
max-age=0, no-cache, no-store
pragma
no-cache
6si-ipv6
2a01:4a0:2b::10
expires
Mon, 11 Nov 2024 09:26:57 GMT
server-timing
cdn-cache; desc=HIT, edge; dur=1, ak_p; desc="1731317217154_34901565_88528416_27_1008_15_460_219";dur=1
access-control-allow-origin
https://www.databreachtoday.com
content-length
15
date
Mon, 11 Nov 2024 09:26:57 GMT
content-type
text/html
vary
Origin
img.gif
b.6sc.co/v1/beacon/
43 B
257 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=null&visitor=2ce20ce2-b3aa-4e36-8ed5-67be431fd4b2&session=ba8c746b-71c4-4aa2-8c13-372387c4f08d&event=a_pageload&q=%7B%22pageLoadTime%22%3A%22Mon%2C%2011%20Nov%202024%2009%3A26%3A57%20GMT%22%7D&isIframe=false&m=%7B%22description%22%3A%22Multiple%20Chinese%20hacking%20groups%20are%20using%20a%20botnet%20named%20for%20a%20TCP%20routing%20port%20number%20to%20conduct%20password%20spraying%20attacks%2C%20warned%20Microsoft%20Thursday.%20The%20Quad7%22%2C%22keywords%22%3A%22China%2C%20TP-Link%2C%20Storm-0940%2C%20Microsoft%2C%20Password%20Spraying%2C%20Quad7%22%2C%22title%22%3A%22Chinese%20Hackers%20Use%20Quad7%20Botnet%20for%20Credential%20Theft%22%7D&cb=&r=https%3A%2F%2Flinks.ismgcorp.com%2F&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.databreachtoday.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709%3Frf%3D2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog&pageViewId=f1be2eac-4559-4234-844e-86f1e2d23646&v=1.1.29
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.53.43.58 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a23-53-43-58.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
max-age=0, no-cache, no-store
etag
"63f020a0-2b"
pragma
no-cache
x-content-type-options
nosniff
expires
Mon, 11 Nov 2024 09:26:57 GMT
accept-ranges
bytes
content-length
43
date
Mon, 11 Nov 2024 09:26:57 GMT
content-type
image/gif
last-modified
Sat, 18 Feb 2023 00:49:36 GMT
server
nginx/1.14.0 (Ubuntu)
img.gif
b.6sc.co/v1/beacon/
43 B
257 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=null&visitor=2ce20ce2-b3aa-4e36-8ed5-67be431fd4b2&session=ba8c746b-71c4-4aa2-8c13-372387c4f08d&event=ni%3AasyncSettingsAudit&q=%7B%22settings%22%3A%22%5B%7B%5C%22name%5C%22%3A%5C%22enableEventTracking%5C%22%2C%5C%22value%5C%22%3A%5C%22true%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Mon%2C%2011%20Nov%202024%2009%3A26%3A57%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%220%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22setToken%5C%22%2C%5C%22value%5C%22%3A%5C%228cde4267f2ac828e1ae5d1fbcd5ef992%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Mon%2C%2011%20Nov%202024%2009%3A26%3A57%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%220%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22setEndpoint%5C%22%2C%5C%22value%5C%22%3A%5C%22b.6sc.co%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Mon%2C%2011%20Nov%202024%2009%3A26%3A57%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%220%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22enableEventTracking%5C%22%2C%5C%22value%5C%22%3A%5C%22true%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Mon%2C%2011%20Nov%202024%2009%3A26%3A57%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%220%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22setToken%5C%22%2C%5C%22value%5C%22%3A%5C%228cde4267f2ac828e1ae5d1fbcd5ef992%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Mon%2C%2011%20Nov%202024%2009%3A26%3A57%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%220%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22setEndpoint%5C%22%2C%5C%22value%5C%22%3A%5C%22b.6sc.co%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Mon%2C%2011%20Nov%202024%2009%3A26%3A57%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%220%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22setEpsilonKey%5C%22%2C%5C%22value%5C%22%3A%5C%227207ef3e32cb3a527876a3e90b6bf51dbd9d9339%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Mon%2C%2011%20Nov%202024%2009%3A26%3A57%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%220%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22enableCompanyDetails%5C%22%2C%5C%22value%5C%22%3A%5C%22%5Btrue%2Cnull%2C3%5D%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Mon%2C%2011%20Nov%202024%2009%3A26%3A57%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%220%5C%22%7D%5D%22%7D&isIframe=false&m=%7B%22description%22%3A%22Multiple%20Chinese%20hacking%20groups%20are%20using%20a%20botnet%20named%20for%20a%20TCP%20routing%20port%20number%20to%20conduct%20password%20spraying%20attacks%2C%20warned%20Microsoft%20Thursday.%20The%20Quad7%22%2C%22keywords%22%3A%22China%2C%20TP-Link%2C%20Storm-0940%2C%20Microsoft%2C%20Password%20Spraying%2C%20Quad7%22%2C%22title%22%3A%22Chinese%20Hackers%20Use%20Quad7%20Botnet%20for%20Credential%20Theft%22%7D&cb=&r=https%3A%2F%2Flinks.ismgcorp.com%2F&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.databreachtoday.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709%3Frf%3D2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog&pageViewId=f1be2eac-4559-4234-844e-86f1e2d23646&v=1.1.29
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.53.43.58 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a23-53-43-58.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
max-age=0, no-cache, no-store
etag
"615ccf10-2b"
pragma
no-cache
x-content-type-options
nosniff
expires
Mon, 11 Nov 2024 09:26:57 GMT
accept-ranges
bytes
content-length
43
date
Mon, 11 Nov 2024 09:26:57 GMT
content-type
image/gif
last-modified
Tue, 05 Oct 2021 22:17:52 GMT
server
nginx/1.14.0 (Ubuntu)
ads
pagead2.googlesyndication.com/gampad/
592 KB
54 KB
Fetch
General
Full URL
https://pagead2.googlesyndication.com/gampad/ads?pvsid=708489405045722&correlator=272757674961324&eid=31088753%2C95345836&output=ldjh&gdfp_req=1&vrg=202411070101&ptt=17&impl=fifs&iu_parts=4444691%2CDBT_TOP_728x90%2CDBT_MID_RB_300x250%2CDBT_MID_RB_2_300x250%2CDBT_MID_RB_3_300x250%2CDBT_MID_RB_300x600%2CDBT_MID_L_180x150%2CDBT_MID_R_180x150%2CDBT_MID2_L_180x150%2CDBT_MID2_R_180x150%2CDBT_TEXT_1%2CDBT_TEXT_2%2CDBT_BOTTOM_728x90%2CDBT_MID_728x90%2CDBT_Interstitial%2CDBT_TOP_320x50%2CDBT_BOTTOM_320x50%2CDBT_MID_320x50%2CDBT_CAT_LOGO&enc_prev_ius=%2F0%2F1%2C%2F0%2F2%2C%2F0%2F3%2C%2F0%2F4%2C%2F0%2F5%2C%2F0%2F6%2C%2F0%2F7%2C%2F0%2F8%2C%2F0%2F9%2C%2F0%2F10%2C%2F0%2F11%2C%2F0%2F12%2C%2F0%2F13%2C%2F0%2F14%2C%2F0%2F15%2C%2F0%2F16%2C%2F0%2F17%2C%2F0%2F18&prev_iu_szs=728x90%2C300x250%2C300x250%2C300x250%2C300x600%2C180x150%2C180x150%2C180x150%2C180x150%2C280x70%2C280x70%2C728x90%2C728x90%2C640x480%2C320x50%2C320x50%2C320x50%2C216x54&ifi=1&sfv=1-0-40&sc=1&abxe=1&dt=1731317217240&lmt=1731317217&adxs=615%2C1025%2C1025%2C-9%2C1010%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C15%2C-9%2C-12245933%2C-12245933%2C-12245933%2C-9%2C-12245933&adys=71%2C594%2C1914%2C-9%2C1849%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C3359%2C-9%2C-12245933%2C-12245933%2C-12245933%2C-9%2C-12245933&biw=1600&bih=1200&scr_x=0&scr_y=0&btvi=0%7C0%7C1%7C-1%7C2%7C-1%7C-1%7C-1%7C-1%7C-1%7C-1%7C3%7C-1%7C-1%7C-1%7C-1%7C-1%7C-1&ucis=1%7C2%7C3%7C4%7C5%7C6%7C7%7C8%7C9%7Ca%7Cb%7Cc%7Cd%7Ce%7Cf%7Cg%7Ch%7Ci&oid=2&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&u_tz=60&dmc=8&bc=31&nvt=1&uach=WyIiLCIiLCIiLCIiLCIiLG51bGwsMCxudWxsLCIiLG51bGwsMF0.&url=https%3A%2F%2Fwww.databreachtoday.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709%3Frf%3D2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog&ref=https%3A%2F%2Flinks.ismgcorp.com%2F&vis=1&psz=800x1%7C360x0%7C360x0%7C0x-1%7C390x0%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C1600x1%7C0x-1%7C0x-1%7C0x0%7C0x0%7C0x-1%7C780x2990&msz=770x0%7C360x1%7C360x1%7C0x-1%7C390x1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C1570x0%7C0x-1%7C0x-1%7C0x0%7C0x0%7C0x-1%7C236x36&fws=0%2C0%2C0%2C2%2C0%2C2%2C2%2C2%2C2%2C2%2C2%2C0%2C2%2C644%2C128%2C128%2C2%2C128&ohw=0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C1600%2C0%2C0%2C0%2C0&td=1&tan=7c5ead2d-c97e-458a-b8f8-0836d460fad2%2C7c5ead2d-c97e-458a-b8f8-0836d460fad3%2C7c5ead2d-c97e-458a-b8f8-0836d460fad4%2C7c5ead2d-c97e-458a-b8f8-0836d460fad5%2C7c5ead2d-c97e-458a-b8f8-0836d460fad6%2C7c5ead2d-c97e-458a-b8f8-0836d460fad7%2C7c5ead2d-c97e-458a-b8f8-0836d460fad8%2C7c5ead2d-c97e-458a-b8f8-0836d460fad9%2C7c5ead2d-c97e-458a-b8f8-0836d460fada%2C7c5ead2d-c97e-458a-b8f8-0836d460fadb%2C7c5ead2d-c97e-458a-b8f8-0836d460fadc%2C7c5ead2d-c97e-458a-b8f8-0836d460fadd%2C7c5ead2d-c97e-458a-b8f8-0836d460fade%2C7c5ead2d-c97e-458a-b8f8-0836d460fadf%2C7c5ead2d-c97e-458a-b8f8-0836d460fae0%2C7c5ead2d-c97e-458a-b8f8-0836d460fae1%2C7c5ead2d-c97e-458a-b8f8-0836d460fae2%2C7c5ead2d-c97e-458a-b8f8-0836d460fae3&tdf=2&topics=5&tps=5&htps=5&nt=1&psd=WzE1LFtdLG51bGwsM10.&dlt=1731317214505&idt=2644&cust_params=category%3D%255B444%255D%26gated%3Dn&adks=3278784386%2C2977291722%2C3327481402%2C2602068264%2C993613247%2C3432865064%2C1680696679%2C2506343038%2C2484848859%2C1900808572%2C392546858%2C1235722975%2C288851561%2C1097209948%2C2986446788%2C3173543903%2C3361737753%2C1845465306&frm=20
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
f9d2d995d8cc6e44a7f8c7c578aaa115646296bd993508536bcaced0350e5593
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
google-lineitem-id
6785882778,6785882778,6785882778,6737143817,6785882778,-2,-2,-2,-2,-2,-2,6785882778,6809784464,6832283674,-2,-2,-2,-2
x-content-type-options
nosniff
google-mediationtag-id
-2
google-mediationgroup-id
-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2
expires
Fri, 01 Jan 1990 00:00:00 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
date
Mon, 11 Nov 2024 09:26:57 GMT
content-type
text/plain; charset=UTF-8
google-creative-id
138489686232,138489686307,138489932609,138490683504,138489932606,-2,-2,-2,-2,-2,-2,138489932744,138494052277,138496475147,-2,-2,-2,-2
cache-control
no-cache, must-revalidate
timing-allow-origin
*
pragma
no-cache
cross-origin-resource-policy
cross-origin
access-control-allow-credentials
true
access-control-allow-origin
https://www.databreachtoday.com
content-length
55493
x-xss-protection
0
server
cafe
container.html
9709a20d219a1608138fbdc6c139f766.safeframe.googlesyndication.com/safeframe/1-0-40/html/ Frame B54D
0
0
Document
General
Full URL
https://9709a20d219a1608138fbdc6c139f766.safeframe.googlesyndication.com/safeframe/1-0-40/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

accept-ranges
bytes
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
cache-control
private, max-age=300
content-encoding
br
content-length
2653
content-type
text/html
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
cross-origin-resource-policy
cross-origin
date
Mon, 11 Nov 2024 09:26:57 GMT
expires
Mon, 11 Nov 2024 09:26:57 GMT
last-modified
Thu, 03 Nov 2022 19:10:08 GMT
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
server
sffe
timing-allow-origin
*
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
details
eps.6sc.co/v3/company/
754 B
667 B
XHR
General
Full URL
https://eps.6sc.co/v3/company/details
Requested by
Host: j.6sc.co
URL: https://j.6sc.co/6si.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.83.231.3 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
afe865822f884bb48.awsglobalaccelerator.com
Software
/
Resource Hash
95f1916df4e321ecbd4c830561bb218f34b7490eeef0153a1b541c0d3202f9b5

Request headers

Authorization
Token 7207ef3e32cb3a527876a3e90b6bf51dbd9d9339
X-6s-CustomID
WebTag1.0 8cde4267f2ac828e1ae5d1fbcd5ef992
Referer
https://www.databreachtoday.com/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

access-control-expose-headers
X-6si-Region
timing-allow-origin
https://6sense.com
content-encoding
gzip
x-6si-region
access-control-allow-credentials
true
access-control-allow-origin
https://www.databreachtoday.com
content-length
402
date
Mon, 11 Nov 2024 09:26:57 GMT
content-type
application/json
vary
Origin, Accept-Encoding
collect
region1.google-analytics.com/g/
0
0
Fetch
General
Full URL
https://region1.google-analytics.com/g/collect?v=2&tid=G-XJ8Q4QGGRH&gtm=45je4b70v886765778z86624193za200zb6624193&_p=1731317215361&gcd=13l3l3l2l1l1&npa=1&dma_cps=syphamo&dma=1&tag_exp=101823848~101925629&cid=1035659389.1731317217&ul=de-de&sr=1600x1200&uaa=&uab=&uafvl=&uamb=0&uam=&uap=&uapv=&uaw=0&are=1&frm=0&pscdl=noapi&_s=1&sid=1731317217&sct=1&seg=0&dl=https%3A%2F%2Fwww.databreachtoday.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709%3Frf%3D2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog&dr=https%3A%2F%2Flinks.ismgcorp.com%2F&dt=Chinese%20Hackers%20Use%20Quad7%20Botnet%20for%20Credential%20Theft&en=page_view&_fv=1&_nsi=1&_ss=1&ep.asset_type=article26709&ep.asset_categories=444&ep.asset_keywords_1=China%2C%20TP-Link%2C%20Storm-0940%2C%20Microsoft%2C%20Password%20Spraying%2C%20Quad7&ep.asset_keywords_2=&ep.asset_keywords_3=&ep.asset_keywords_4=&ep.asset_keywords_5=&ep.asset_keywords_6=&ep.asset_keywords_7=&ep.asset_keywords_8=&ep.asset_keywords_9=&ep.asset_keywords_10=&tfd=3759
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=G-XJ8Q4QGGRH&l=dataLayer&cx=c&gtm=45He4b70v6624193za200
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4860:4802:34::36 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
no-cache, no-store, must-revalidate
pragma
no-cache
cross-origin-resource-policy
cross-origin
access-control-allow-credentials
true
content-security-policy-report-only
script-src 'none'; form-action 'none'; frame-src 'none'; report-uri https://csp.withgoogle.com/csp/scaffolding/ascnsrsggc:86:0
report-to
{"group":"coop_reporting","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/scaffolding/ascnsrsggc:86:0"}],}
expires
Fri, 01 Jan 1990 00:00:00 GMT
access-control-allow-origin
https://www.databreachtoday.com
cross-origin-opener-policy-report-only
same-origin; report-to=coop_reporting
content-length
0
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Mon, 11 Nov 2024 09:26:57 GMT
content-type
text/plain
server
Golfe2
collect
region1.google-analytics.com/g/
0
0
Fetch
General
Full URL
https://region1.google-analytics.com/g/collect?v=2&tid=G-P0BJ2JRM5Y&gtm=45je4b70v9122993204z86624193za200zb6624193&_p=1731317215361&gcd=13l3l3l2l1l1&npa=1&dma_cps=syphamo&dma=1&tag_exp=101823848~101925629&cid=1035659389.1731317217&ul=de-de&sr=1600x1200&uaa=&uab=&uafvl=&uamb=0&uam=&uap=&uapv=&uaw=0&are=1&frm=0&pscdl=noapi&_s=1&sid=1731317217&sct=1&seg=0&dl=https%3A%2F%2Fwww.databreachtoday.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709%3Frf%3D2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog&dr=https%3A%2F%2Flinks.ismgcorp.com%2F&dt=Chinese%20Hackers%20Use%20Quad7%20Botnet%20for%20Credential%20Theft&en=page_view&_fv=1&_ss=1&tfd=3788
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=G-P0BJ2JRM5Y&l=dataLayer&cx=c&gtm=45He4b70v6624193za200
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4860:4802:34::36 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
no-cache, no-store, must-revalidate
pragma
no-cache
cross-origin-resource-policy
cross-origin
access-control-allow-credentials
true
content-security-policy-report-only
script-src 'none'; form-action 'none'; frame-src 'none'; report-uri https://csp.withgoogle.com/csp/scaffolding/ascnsrsggc:86:0
report-to
{"group":"coop_reporting","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/scaffolding/ascnsrsggc:86:0"}],}
expires
Fri, 01 Jan 1990 00:00:00 GMT
access-control-allow-origin
https://www.databreachtoday.com
cross-origin-opener-policy-report-only
same-origin; report-to=coop_reporting
content-length
0
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Mon, 11 Nov 2024 09:26:57 GMT
content-type
text/plain
server
Golfe2
facebook.svg
platform-cdn.sharethis.com/img/
301 B
744 B
Image
General
Full URL
https://platform-cdn.sharethis.com/img/facebook.svg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2156:5800:1d:85c3:6640:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
768d97ec0916217ae82c70aeda3a61b9b0dab344edc4a3240a4f7cd94af00307
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

etag
"c6e9be45643e197ce1db1d7e24a99adc"
age
440156
x-cache
Hit from cloudfront
x-amz-cf-id
Gthig7-1seVh52ujBn26KeYtl7oTRyZICAqpBZ8r8q-jfQhNqu4TZg==
date
Wed, 06 Nov 2024 07:11:02 GMT
content-type
image/svg+xml
vary
accept-encoding
last-modified
Thu, 10 Oct 2019 01:20:12 GMT
strict-transport-security
max-age=31536000; includeSubDomains
cache-control
public, max-age=2592000
via
1.1 e6d97713eb9b65f883e0f86b833878dc.cloudfront.net (CloudFront)
accept-ranges
bytes
content-length
301
x-amz-cf-pop
FRA50-C1
server
AmazonS3
x-amz-server-side-encryption
AES256
twitter.svg
platform-cdn.sharethis.com/img/
368 B
779 B
Image
General
Full URL
https://platform-cdn.sharethis.com/img/twitter.svg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2156:5800:1d:85c3:6640:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
76ffdc5337cd5a509f15d70767b85a793aead82975d0d86912e1607e963c9aed
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

strict-transport-security
max-age=31536000; includeSubDomains
vary
accept-encoding
etag
"2deb3d5121d475d195577a70b0a91a0c"
age
263
via
1.1 e6d97713eb9b65f883e0f86b833878dc.cloudfront.net (CloudFront)
accept-ranges
bytes
x-cache
Hit from cloudfront
content-length
368
x-amz-cf-id
SQEA_elVM_d9sx-epzOw0D02F4bINAv0eUE7mXAWqOesJbjJJuU2kA==
date
Mon, 11 Nov 2024 09:22:35 GMT
content-type
image/svg+xml
last-modified
Fri, 15 Sep 2023 16:58:49 GMT
server
AmazonS3
x-amz-cf-pop
FRA50-C1
x-amz-server-side-encryption
AES256
linkedin.svg
platform-cdn.sharethis.com/img/
456 B
900 B
Image
General
Full URL
https://platform-cdn.sharethis.com/img/linkedin.svg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2156:5800:1d:85c3:6640:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
cb8c2b19fd9b56c41db14bd71b5c0616c1ba4e99b08c8e75084cf695f74b7120
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

etag
"fa43b4ede18498b114fc7185993f6da7"
age
2002915
x-cache
Hit from cloudfront
x-amz-cf-id
Gb0O6ZBXY4zQWrKeFYLW5QaVo56G4oi6lds4yxKKeyfDIOfJIhzDtQ==
date
Sat, 19 Oct 2024 05:05:03 GMT
content-type
image/svg+xml
vary
Accept-Encoding
last-modified
Thu, 10 Oct 2019 01:20:12 GMT
strict-transport-security
max-age=31536000; includeSubDomains
cache-control
public, max-age=2592000
via
1.1 e6d97713eb9b65f883e0f86b833878dc.cloudfront.net (CloudFront)
accept-ranges
bytes
content-length
456
x-amz-cf-pop
FRA50-C1
server
AmazonS3
x-amz-server-side-encryption
AES256
/
c.6sc.co/
7 B
199 B
XHR
General
Full URL
https://c.6sc.co/
Requested by
Host: j.6sc.co
URL: https://j.6sc.co/6si.min.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.53.43.58 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a23-53-43-58.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
fe04a9dc88d3f3be8d4f6bc63a9a80f45a4c6d8460e7551dab849457c091920a

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

access-control-max-age
86400
access-control-allow-credentials
true
access-control-allow-methods
GET,POST
access-control-allow-origin
https://www.databreachtoday.com
content-length
7
date
Mon, 11 Nov 2024 09:26:57 GMT
content-type
text/html
access-control-allow-headers
*
/
ipv6.6sc.co/
15 B
305 B
XHR
General
Full URL
https://ipv6.6sc.co/
Requested by
Host: j.6sc.co
URL: https://j.6sc.co/6si.min.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:ab00::214:8e41 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
f281567c4e314b11e8eabe1856b5e6e10ac02b559e3f2282a057357f0fff682b

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
max-age=0, no-cache, no-store
pragma
no-cache
6si-ipv6
2a01:4a0:2b::10
expires
Mon, 11 Nov 2024 09:26:57 GMT
server-timing
cdn-cache; desc=HIT, edge; dur=1, ak_p; desc="1731317217703_34901565_88528501_25_936_16_0_219";dur=1
access-control-allow-origin
https://www.databreachtoday.com
content-length
15
date
Mon, 11 Nov 2024 09:26:57 GMT
content-type
text/html
vary
Origin
details
eps.6sc.co/v3/company/ Frame
0
0
Preflight
General
Full URL
https://eps.6sc.co/v3/company/details
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.83.231.3 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
afe865822f884bb48.awsglobalaccelerator.com
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Headers
authorization,x-6s-customid
Access-Control-Request-Method
GET
Origin
https://www.databreachtoday.com
Sec-Fetch-Mode
cors
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

access-control-allow-credentials
true
access-control-allow-headers
authorization,x-6s-customid
access-control-allow-methods
OPTIONS,GET
access-control-allow-origin
https://www.databreachtoday.com
access-control-expose-headers
X-6si-Region
access-control-max-age
1800
content-length
0
date
Mon, 11 Nov 2024 09:26:57 GMT
timing-allow-origin
https://6sense.com
x-6si-region
serverComponent.php
nexus.ensighten.com/choozle/19322/
486 B
817 B
Script
General
Full URL
https://nexus.ensighten.com/choozle/19322/serverComponent.php?namespace=Bootstrapper&staticJsPath=nexus.ensighten.com/choozle/19322/code/&publishedOn=Wed%20Oct%2016%2017:21:53%20GMT%202024&ClientID=923&PageID=https%3A%2F%2Fwww.databreachtoday.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709%3Frf%3D2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Requested by
Host: nexus.ensighten.com
URL: https://nexus.ensighten.com/choozle/19322/Bootstrap.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:2600:2:8f43:5780:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
CloudFront /
Resource Hash
74193dcb08e3476f62c6bcdaad890bfa8c11e7cd978306de5c0ae3a7964afc39

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
no-cache, no-store
via
1.1 14b10bd09a0531ef477d0a404ca26900.cloudfront.net (CloudFront)
expires
Mon, 11 Nov 2024 09:26:56 GMT
alt-svc
h3=":443"; ma=86400
x-cache
Miss from cloudfront
content-length
486
x-amz-cf-id
wQH9Agyej0jefGRr3huOlUYxnROThu53p1a9f54JW-xuCPGyGu1SUQ==
date
Mon, 11 Nov 2024 09:26:57 GMT
content-type
text/javascript
x-amz-cf-pop
FRA56-C1
server
CloudFront
623f33741352c768077746bc172bfcb2.js
nexus.ensighten.com/choozle/19322/code/
583 B
1 KB
Script
General
Full URL
https://nexus.ensighten.com/choozle/19322/code/623f33741352c768077746bc172bfcb2.js?conditionId0=4958059&conditionId1=4958060
Requested by
Host: nexus.ensighten.com
URL: https://nexus.ensighten.com/choozle/19322/Bootstrap.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:2600:2:8f43:5780:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
CloudFront /
Resource Hash
9a78701f6e49e71ab4a15f85c515418a37fb8e7e179b2686faa795765a402bac

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

etag
"bd833dd44a422db4eabf82aebcec5ae6"
x-amz-version-id
zJtKrIqnT_4.uuMaVvZe_JAIV7PikZ.I
age
5756726
alt-svc
h3=":443"; ma=86400
x-cache
Hit from cloudfront
x-amz-cf-id
oo7wy4yITN32k6XRNfef3d6Kyiu_F9z1z11zOCmyigMJ2KygMr0poQ==
date
Thu, 05 Sep 2024 18:21:32 GMT
content-type
application/javascript; charset=utf-8
last-modified
Thu, 09 May 2024 16:01:15 GMT
x-amz-replication-status
COMPLETED
cache-control
max-age=315360000
via
1.1 14b10bd09a0531ef477d0a404ca26900.cloudfront.net (CloudFront)
accept-ranges
bytes
content-length
583
x-amz-cf-pop
FRA56-C1
server
CloudFront
x-amz-server-side-encryption
AES256
40c8679203dd9dec345291ae588c2bcf.js
nexus.ensighten.com/choozle/19322/code/
3 KB
1 KB
Script
General
Full URL
https://nexus.ensighten.com/choozle/19322/code/40c8679203dd9dec345291ae588c2bcf.js?conditionId0=421905
Requested by
Host: nexus.ensighten.com
URL: https://nexus.ensighten.com/choozle/19322/Bootstrap.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:2600:2:8f43:5780:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
CloudFront /
Resource Hash
55d1c842ceae117300fd3220131eb6c306ba65da20d3e5da96d56353946b6c4e

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
x-amz-version-id
nJuwHo1XhOqEmJPw8mwltc93FrgbMJvg
etag
W/"92d1995a36998595c802de1b8ee7697f"
age
1323847
alt-svc
h3=":443"; ma=86400
x-cache
Hit from cloudfront
x-amz-cf-id
zmuXHVxXKgO45TjR6KN-OvFzRcwA7lrC8Br8kTrIxwhJQFVgc5UZcA==
date
Sun, 27 Oct 2024 01:42:50 GMT
content-type
application/javascript; charset=utf-8
vary
Accept-Encoding
last-modified
Thu, 09 May 2024 16:01:13 GMT
x-amz-replication-status
COMPLETED
cache-control
max-age=315360000
via
1.1 14b10bd09a0531ef477d0a404ca26900.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA56-C1
server
CloudFront
x-amz-server-side-encryption
AES256
bbe0d6a760367a2eb312fc9f7f9d12d6.js
nexus.ensighten.com/choozle/19322/code/
673 B
1 KB
Script
General
Full URL
https://nexus.ensighten.com/choozle/19322/code/bbe0d6a760367a2eb312fc9f7f9d12d6.js?conditionId0=4965894
Requested by
Host: nexus.ensighten.com
URL: https://nexus.ensighten.com/choozle/19322/Bootstrap.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:2600:2:8f43:5780:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
CloudFront /
Resource Hash
7476a5809072e3ccb17275323d51b72b6a016b38fe21b9837a968fb2706766b2

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

etag
"8b5b7871f22fe6cf905577f33f5b54d3"
x-amz-version-id
wmZB.mNMOo40ioC7nXH3_vOdiR2br0r_
age
2853454
alt-svc
h3=":443"; ma=86400
x-cache
Hit from cloudfront
x-amz-cf-id
z_eanGmKMSLiAXyMC1NyxvDeY5GjMTs33Q6HoW93OksH190GSiR1KQ==
date
Wed, 09 Oct 2024 08:49:23 GMT
content-type
application/javascript; charset=utf-8
last-modified
Wed, 09 Oct 2024 08:36:52 GMT
x-amz-replication-status
COMPLETED
cache-control
max-age=315360000
via
1.1 14b10bd09a0531ef477d0a404ca26900.cloudfront.net (CloudFront)
accept-ranges
bytes
content-length
673
x-amz-cf-pop
FRA56-C1
server
CloudFront
x-amz-server-side-encryption
AES256
img.gif
b.6sc.co/v1/beacon/
43 B
257 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=null&visitor=2ce20ce2-b3aa-4e36-8ed5-67be431fd4b2&session=ba8c746b-71c4-4aa2-8c13-372387c4f08d&event=ipv6&q=%7B%22address%22%3A%222a01%3A4a0%3A2b%3A%3A10%22%7D&isIframe=false&m=%7B%22description%22%3A%22Multiple%20Chinese%20hacking%20groups%20are%20using%20a%20botnet%20named%20for%20a%20TCP%20routing%20port%20number%20to%20conduct%20password%20spraying%20attacks%2C%20warned%20Microsoft%20Thursday.%20The%20Quad7%22%2C%22keywords%22%3A%22China%2C%20TP-Link%2C%20Storm-0940%2C%20Microsoft%2C%20Password%20Spraying%2C%20Quad7%22%2C%22title%22%3A%22Chinese%20Hackers%20Use%20Quad7%20Botnet%20for%20Credential%20Theft%22%7D&cb=&r=https%3A%2F%2Flinks.ismgcorp.com%2F&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.databreachtoday.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709%3Frf%3D2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog&pageViewId=f1be2eac-4559-4234-844e-86f1e2d23646&ipv6=2a01%3A4a0%3A2b%3A%3A10&v=1.1.29
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.53.43.58 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a23-53-43-58.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
max-age=0, no-cache, no-store
etag
"615ccf10-2b"
pragma
no-cache
x-content-type-options
nosniff
expires
Mon, 11 Nov 2024 09:26:57 GMT
accept-ranges
bytes
content-length
43
date
Mon, 11 Nov 2024 09:26:57 GMT
content-type
image/gif
last-modified
Tue, 05 Oct 2021 22:17:52 GMT
server
nginx/1.14.0 (Ubuntu)
clarity.js
www.clarity.ms/s/0.7.49/
64 KB
27 KB
Script
General
Full URL
https://www.clarity.ms/s/0.7.49/clarity.js
Requested by
Host: www.clarity.ms
URL: https://www.clarity.ms/tag/i5wta0dq65
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2620:1ec:29:1::45 , United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
09fa04e84d7038cc32f19bedcba454b9e637a35f4de496e8ec9148c47550f0fc

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

x-azure-ref
20241111T092657Z-178d4494767zrhs7hC1FRA09g40000000bc0000000008d6z
cache-control
public, max-age=86400
x-ms-version
2018-03-28
content-encoding
br
etag
W/"0x8DCF3CA14C9A428"
x-fd-int-roxy-purgeid
51562430
x-ms-request-id
3092fbed-601e-0050-0551-26ec8b000000
access-control-allow-origin
*
x-cache
TCP_HIT
date
Mon, 11 Nov 2024 09:26:57 GMT
content-type
application/javascript;charset=utf-8
vary
Accept-Encoding
last-modified
Thu, 24 Oct 2024 01:20:43 GMT
view
pagead2.googlesyndication.com/pcs/ Frame 9C67
0
0
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/view?xai=AKAOjstzIvOfe9kQnRalB6CYV_5Sm7KDi8-VfFf6ADare3K9IEkjF_PWxnOyxEEn5PWwQWSSMyn0lYEjpIr3yDfitj7WmkywSvziOeSEYyHKQREkorYkcezXlRXs9hW5flv8vwWpvSlIdIn7a7uO4XNSjkbne-MEreRGMEKHXBD01ScJ-caS0hLm12aY6JNFG0rGfFFxvbxmz3HRs1mo8Ra-_hd03PyR8ztmBq59z7EzwabAwCaL-cBI5CzUyjtFvdBYmYEXbpNIKwEKVKhkEqbwfZ2EjDO7VuRZVAnUXjuQKV-D_2DJHeNVVOdwr22aBHnyd7N55MBjY5zMUebb4dlXgjwp7F7WSW8uHXGsRMigMJe1rejZrJEx091iSE6siths6vgLL7OGlxf9MbZ3LOzJCMZkEg&sig=Cg0ArKJSzBv1lT3v38ZoEAE&uach_m=%5BUACH%5D&adurl=
Requested by
Host: links.ismgcorp.com
URL: https://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGWlwzHJZCDqbswoUxZdX70nL30BnYPp572VhPywT5pQTzLEICX5iqTS9Aa_Covm6Xg7V1r-UM=
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
private
timing-allow-origin
*
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-WoW64
cross-origin-resource-policy
cross-origin
x-content-type-options
nosniff
access-control-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-length
0
date
Mon, 11 Nov 2024 09:26:58 GMT
x-xss-protection
0
content-type
image/gif
server
cafe
abg_lite_fy2021.js
pagead2.googlesyndication.com/pagead/js/r20241106/r20110914/ Frame 9C67
23 KB
9 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20241106/r20110914/abg_lite_fy2021.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
250210a531956f2cb9ba81de8405e3b4bfdbc9b70d26ba260b547885f866ec1d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
etag
11581923691383104463
age
64179
x-content-type-options
nosniff
expires
Sun, 24 Nov 2024 15:37:19 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
date
Sun, 10 Nov 2024 15:37:19 GMT
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
vary
Accept-Encoding
cache-control
public, max-age=1209600
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
access-control-allow-origin
*
content-length
9052
x-xss-protection
0
server
cafe
window_focus_fy2021.js
pagead2.googlesyndication.com/pagead/js/r20241106/r20110914/client/ Frame 9C67
3 KB
1 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20241106/r20110914/client/window_focus_fy2021.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
944a37f694b55de268a0bf52dbae4e12f12c4ae09ee5c8d213ba05075c2865dd
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
etag
6567774568227038691
age
64179
x-content-type-options
nosniff
expires
Sun, 24 Nov 2024 15:37:19 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
date
Sun, 10 Nov 2024 15:37:19 GMT
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
vary
Accept-Encoding
cache-control
public, max-age=1209600
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
access-control-allow-origin
*
content-length
1234
x-xss-protection
0
server
cafe
ufs_web_display.js
pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ Frame 9C67
221 KB
69 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
0661eecdc8f9a86cbeab346d02d85524cfad9fa7e159eb9b10bdf5f58ffe86f1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
etag
2824544460440785254
age
1484
x-content-type-options
nosniff
expires
Mon, 11 Nov 2024 10:02:14 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
date
Mon, 11 Nov 2024 09:02:14 GMT
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=ISO-8859-1
vary
Accept-Encoding
cache-control
public, max-age=3600, stale-while-revalidate=3600
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
content-length
70393
x-xss-protection
0
server
cafe
932521598635159046
tpc.googlesyndication.com/simgad/ Frame 9C67
107 KB
107 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/932521598635159046
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
8dbca1d866693b3afb10bb00a8d747eb6d360d1eccf921fa0f5b440120407b2b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

age
407576
report-to
{"group":"content-ads-owners","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/content-ads-owners"}]}
x-content-type-options
nosniff
expires
Thu, 06 Nov 2025 16:14:02 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
allow-fenced-frame-automatic-beacons
true
date
Wed, 06 Nov 2024 16:14:02 GMT
last-modified
Thu, 19 Sep 2024 19:13:04 GMT
content-type
image/png
cache-control
public, max-age=31536000
timing-allow-origin
*
x-dns-prefetch-control
off
cross-origin-resource-policy
cross-origin
accept-ranges
bytes
access-control-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="content-ads-owners"
content-length
109125
x-xss-protection
0
server
sffe
view
pagead2.googlesyndication.com/pcs/ Frame A766
0
0
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/view?xai=AKAOjstdWLfAncpkgoolvJIc61P-RqOHMcv2anm19G07b06gqJSD6DH0TQ_p0YTunXqZ7Zus1fFxCNeXp-Ta9hdIsT-cJGSXAlYQtY4nwN7Z3FAWGm7VbqaHLSHL3I1QTmQ3A72uf6aWtuO4dAr-yaBKc3LSiOkGXNMKyPeFpAymB16plPOMA8d61tU5x9K7fVRPPHvw9-S39E5PeKIozjKGyQI7s0cOkmqG4aCa1ypEHmIhPZtALweqebOlRpWi8eGTkBIXuZi67Ku5DhsjXf8Tgyi8kaXUI4_RjT8MeNTq_19FeK6Xhfjh6HX21PmImfqluhm_fQXPp1cXaLfPvAaIFcEN0TYONFxsySOz6w2ogn3VrRGHfTp9aUt9Pw_21HLMDAVC3BZ6CjX4oSNID_Rmq7SoSBHHRKo&sig=Cg0ArKJSzGxXQI7w3HwbEAE&uach_m=%5BUACH%5D&adurl=
Requested by
Host: links.ismgcorp.com
URL: https://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGWlwzHJZCDqbswoUxZdX70nL30BnYPp572VhPywT5pQTzLEICX5iqTS9Aa_Covm6Xg7V1r-UM=
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
private
timing-allow-origin
*
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-WoW64
cross-origin-resource-policy
cross-origin
x-content-type-options
nosniff
access-control-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-length
0
date
Mon, 11 Nov 2024 09:26:58 GMT
x-xss-protection
0
content-type
image/gif
server
cafe
abg_lite_fy2021.js
pagead2.googlesyndication.com/pagead/js/r20241106/r20110914/ Frame A766
23 KB
0
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20241106/r20110914/abg_lite_fy2021.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
250210a531956f2cb9ba81de8405e3b4bfdbc9b70d26ba260b547885f866ec1d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
etag
11581923691383104463
age
64179
x-content-type-options
nosniff
expires
Sun, 24 Nov 2024 15:37:19 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
date
Sun, 10 Nov 2024 15:37:19 GMT
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
vary
Accept-Encoding
cache-control
public, max-age=1209600
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
access-control-allow-origin
*
content-length
9052
x-xss-protection
0
server
cafe
window_focus_fy2021.js
pagead2.googlesyndication.com/pagead/js/r20241106/r20110914/client/ Frame A766
3 KB
0
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20241106/r20110914/client/window_focus_fy2021.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
944a37f694b55de268a0bf52dbae4e12f12c4ae09ee5c8d213ba05075c2865dd
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
etag
6567774568227038691
age
64179
x-content-type-options
nosniff
expires
Sun, 24 Nov 2024 15:37:19 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
date
Sun, 10 Nov 2024 15:37:19 GMT
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
vary
Accept-Encoding
cache-control
public, max-age=1209600
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
access-control-allow-origin
*
content-length
1234
x-xss-protection
0
server
cafe
ufs_web_display.js
pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ Frame A766
221 KB
0
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
0661eecdc8f9a86cbeab346d02d85524cfad9fa7e159eb9b10bdf5f58ffe86f1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
etag
2824544460440785254
age
1484
x-content-type-options
nosniff
expires
Mon, 11 Nov 2024 10:02:14 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
date
Mon, 11 Nov 2024 09:02:14 GMT
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=ISO-8859-1
vary
Accept-Encoding
cache-control
public, max-age=3600, stale-while-revalidate=3600
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
content-length
70393
x-xss-protection
0
server
cafe
1598612667430282218
tpc.googlesyndication.com/simgad/ Frame A766
96 KB
96 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/1598612667430282218
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7331dad942555c6aa6c8cc0b0a1ae247cd404540c766bd19152bf46d2a3d09cf
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

age
478489
report-to
{"group":"content-ads-owners","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/content-ads-owners"}]}
x-content-type-options
nosniff
expires
Wed, 05 Nov 2025 20:32:09 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
allow-fenced-frame-automatic-beacons
true
date
Tue, 05 Nov 2024 20:32:09 GMT
last-modified
Thu, 19 Sep 2024 19:13:04 GMT
content-type
image/png
cache-control
public, max-age=31536000
timing-allow-origin
*
x-dns-prefetch-control
off
cross-origin-resource-policy
cross-origin
accept-ranges
bytes
access-control-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="content-ads-owners"
content-length
98426
x-xss-protection
0
server
sffe
view
pagead2.googlesyndication.com/pcs/ Frame 515C
0
0
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/view?xai=AKAOjsv5QCXqhF1R2orIRoMVDMXVihg7FYdLQk6_kqjVmVyHU_H2-fYR-Sv7xbXJbouoDUv7Pciqg3BknaRAK_fKfi1mN-CSkSxK4l3vT5xw-E7Tdo3UkSxXFu4tuygbNj3fQldmPXMYbUVI1CC7akRi419VTbyvmfX27J6EpvUTiFcukYxfCB5Km0H9TAwe34VJaw1oE_w6nUvgwe2EYg9kuMsOE2njrWxd1PVsCpyICmzJ4C062V8GgZnR7DMkH5yr9BvKi3Ni6KhpwoiBwO7gLriV3nTPhg9Nz7-K6-bDHmNu_OaYIxHWCc_VVL15Qb59OpOBXFwPMmVkMJdlVUo-xeCWQFeMCgebJEesyr8dLFh_kwVAyPSoTw6zG10S8XpTQ8F8oZQzuOCsoBBP8gjJG-Rf_2o_rmEllQ&sig=Cg0ArKJSzGwfrrU98ZuLEAE&uach_m=%5BUACH%5D&adurl=
Requested by
Host: links.ismgcorp.com
URL: https://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGWlwzHJZCDqbswoUxZdX70nL30BnYPp572VhPywT5pQTzLEICX5iqTS9Aa_Covm6Xg7V1r-UM=
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
private
timing-allow-origin
*
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-WoW64
cross-origin-resource-policy
cross-origin
x-content-type-options
nosniff
access-control-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-length
0
date
Mon, 11 Nov 2024 09:26:58 GMT
x-xss-protection
0
content-type
image/gif
server
cafe
1598612667430282218
tpc.googlesyndication.com/simgad/ Frame 515C
96 KB
0
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/1598612667430282218
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7331dad942555c6aa6c8cc0b0a1ae247cd404540c766bd19152bf46d2a3d09cf
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

age
478489
report-to
{"group":"content-ads-owners","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/content-ads-owners"}]}
x-content-type-options
nosniff
expires
Wed, 05 Nov 2025 20:32:09 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
allow-fenced-frame-automatic-beacons
true
date
Tue, 05 Nov 2024 20:32:09 GMT
last-modified
Thu, 19 Sep 2024 19:13:04 GMT
content-type
image/png
cache-control
public, max-age=31536000
timing-allow-origin
*
x-dns-prefetch-control
off
cross-origin-resource-policy
cross-origin
accept-ranges
bytes
access-control-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="content-ads-owners"
content-length
98426
x-xss-protection
0
server
sffe
abg_lite_fy2021.js
pagead2.googlesyndication.com/pagead/js/r20241106/r20110914/ Frame 515C
23 KB
0
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20241106/r20110914/abg_lite_fy2021.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
250210a531956f2cb9ba81de8405e3b4bfdbc9b70d26ba260b547885f866ec1d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
etag
11581923691383104463
age
64179
x-content-type-options
nosniff
expires
Sun, 24 Nov 2024 15:37:19 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
date
Sun, 10 Nov 2024 15:37:19 GMT
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
vary
Accept-Encoding
cache-control
public, max-age=1209600
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
access-control-allow-origin
*
content-length
9052
x-xss-protection
0
server
cafe
window_focus_fy2021.js
pagead2.googlesyndication.com/pagead/js/r20241106/r20110914/client/ Frame 515C
3 KB
0
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20241106/r20110914/client/window_focus_fy2021.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
944a37f694b55de268a0bf52dbae4e12f12c4ae09ee5c8d213ba05075c2865dd
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
etag
6567774568227038691
age
64179
x-content-type-options
nosniff
expires
Sun, 24 Nov 2024 15:37:19 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
date
Sun, 10 Nov 2024 15:37:19 GMT
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
vary
Accept-Encoding
cache-control
public, max-age=1209600
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
access-control-allow-origin
*
content-length
1234
x-xss-protection
0
server
cafe
ufs_web_display.js
pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ Frame 515C
221 KB
0
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
0661eecdc8f9a86cbeab346d02d85524cfad9fa7e159eb9b10bdf5f58ffe86f1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
etag
2824544460440785254
age
1484
x-content-type-options
nosniff
expires
Mon, 11 Nov 2024 10:02:14 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
date
Mon, 11 Nov 2024 09:02:14 GMT
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=ISO-8859-1
vary
Accept-Encoding
cache-control
public, max-age=3600, stale-while-revalidate=3600
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
content-length
70393
x-xss-protection
0
server
cafe
view
pagead2.googlesyndication.com/pcs/ Frame B039
0
0
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/view?xai=AKAOjsu8PYjoYnViohxvkVeHGwokZ4RRbvq4UIfc_-Zb0wXMvGm5Rhw53fturdo8VAVQ8vtKol_-nTc5NJWTAV2VpBJk5o3raR-_-tMpZ1L0lVETK639EFMP_3LWS0ex5PhYcgWmM2CIKnfs2YY1FkUpfd8JUQTqO8dC9ur5t2Am5FcWs7uSbKZBpIMWP_b--VQpvXB07Ik4n2avOhu4-UkqupEjK7tlM7sZAwTapcidEMS1US40xxow3mwtR1YdT2PDreK-NSY1SBG4PNRNFRLiWtHUy4Anbq93GUTdDamPjX6MH70jQrXOTRxu7uFw5wftox7Fqp9tcX-MW3i259FBKmPAN4teHAVA2UY6ycVhfy2L_riVzvCXeTscKu2St7pmVmuAJrV6WrBmIp3k7vmyvEcVdqLQxrw&sig=Cg0ArKJSzDY8MvH4z_FTEAE&uach_m=%5BUACH%5D&adurl=
Requested by
Host: links.ismgcorp.com
URL: https://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGWlwzHJZCDqbswoUxZdX70nL30BnYPp572VhPywT5pQTzLEICX5iqTS9Aa_Covm6Xg7V1r-UM=
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
private
timing-allow-origin
*
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-WoW64
cross-origin-resource-policy
cross-origin
x-content-type-options
nosniff
access-control-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-length
0
date
Mon, 11 Nov 2024 09:26:58 GMT
x-xss-protection
0
content-type
image/gif
server
cafe
abg_lite_fy2021.js
pagead2.googlesyndication.com/pagead/js/r20241106/r20110914/ Frame B039
23 KB
0
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20241106/r20110914/abg_lite_fy2021.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
250210a531956f2cb9ba81de8405e3b4bfdbc9b70d26ba260b547885f866ec1d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
etag
11581923691383104463
age
64179
x-content-type-options
nosniff
expires
Sun, 24 Nov 2024 15:37:19 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
date
Sun, 10 Nov 2024 15:37:19 GMT
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
vary
Accept-Encoding
cache-control
public, max-age=1209600
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
access-control-allow-origin
*
content-length
9052
x-xss-protection
0
server
cafe
window_focus_fy2021.js
pagead2.googlesyndication.com/pagead/js/r20241106/r20110914/client/ Frame B039
3 KB
0
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20241106/r20110914/client/window_focus_fy2021.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
944a37f694b55de268a0bf52dbae4e12f12c4ae09ee5c8d213ba05075c2865dd
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
etag
6567774568227038691
age
64179
x-content-type-options
nosniff
expires
Sun, 24 Nov 2024 15:37:19 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
date
Sun, 10 Nov 2024 15:37:19 GMT
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
vary
Accept-Encoding
cache-control
public, max-age=1209600
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
access-control-allow-origin
*
content-length
1234
x-xss-protection
0
server
cafe
ufs_web_display.js
pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ Frame B039
221 KB
0
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
0661eecdc8f9a86cbeab346d02d85524cfad9fa7e159eb9b10bdf5f58ffe86f1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
etag
2824544460440785254
age
1484
x-content-type-options
nosniff
expires
Mon, 11 Nov 2024 10:02:14 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
date
Mon, 11 Nov 2024 09:02:14 GMT
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=ISO-8859-1
vary
Accept-Encoding
cache-control
public, max-age=3600, stale-while-revalidate=3600
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
content-length
70393
x-xss-protection
0
server
cafe
10330838720937533003
tpc.googlesyndication.com/simgad/ Frame B039
200 KB
200 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/10330838720937533003
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5a31084263db73d7aa0d19cbb0f34418f572dbe9bafebaed68604c95a26133dc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

age
448428
report-to
{"group":"content-ads-owners","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/content-ads-owners"}]}
x-content-type-options
nosniff
expires
Thu, 06 Nov 2025 04:53:10 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
allow-fenced-frame-automatic-beacons
true
date
Wed, 06 Nov 2024 04:53:10 GMT
last-modified
Thu, 19 Sep 2024 19:13:04 GMT
content-type
image/png
cache-control
public, max-age=31536000
timing-allow-origin
*
x-dns-prefetch-control
off
cross-origin-resource-policy
cross-origin
accept-ranges
bytes
access-control-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="content-ads-owners"
content-length
204396
x-xss-protection
0
server
sffe
view
pagead2.googlesyndication.com/pcs/ Frame 5AE2
0
0
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/view?xai=AKAOjss4d_NeWH-EYOD2imI-M3o7V-p2crjFxIEseSb4gBDKAVLId-TvZc85VPl0K7A2KSKrUKGE0A8is56wcAMLQ4pPBV3SpZnWTV76mAARoatCZFhQlb4lc7GrlJsBr9LOLUk39pXUgOCcGSz70WZPYIfpQMcUCVH2OLSqwlF-S08A8Vi-yDw7XZ6u9U-kcb5okSnSs3a4mWcUZUgV4mmo27yHLzRs0U_4J1Msbf9q9ea_OP88eRQqjtaMN99aUiM1c1eHhAIfluypz3GmAZ_7I_u3gG-j6lM2hgQNTopxYkRq1OJYIEjaqpiaQnKGzLFCwoy6RKMF9gjzcqJRxwMdFhUuSPipOaGKhXpXq4pta15oaqz9Xj8qVEbN1q4FtRciP-NofvRlXCiQhuACUK4TS5J6Aw&sig=Cg0ArKJSzJB6C43_Zl1eEAE&uach_m=%5BUACH%5D&adurl=
Requested by
Host: links.ismgcorp.com
URL: https://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGWlwzHJZCDqbswoUxZdX70nL30BnYPp572VhPywT5pQTzLEICX5iqTS9Aa_Covm6Xg7V1r-UM=
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
private
timing-allow-origin
*
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-WoW64
cross-origin-resource-policy
cross-origin
x-content-type-options
nosniff
access-control-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-length
0
date
Mon, 11 Nov 2024 09:26:58 GMT
x-xss-protection
0
content-type
image/gif
server
cafe
abg_lite_fy2021.js
pagead2.googlesyndication.com/pagead/js/r20241106/r20110914/ Frame 5AE2
23 KB
0
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20241106/r20110914/abg_lite_fy2021.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
250210a531956f2cb9ba81de8405e3b4bfdbc9b70d26ba260b547885f866ec1d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
etag
11581923691383104463
age
64179
x-content-type-options
nosniff
expires
Sun, 24 Nov 2024 15:37:19 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
date
Sun, 10 Nov 2024 15:37:19 GMT
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
vary
Accept-Encoding
cache-control
public, max-age=1209600
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
access-control-allow-origin
*
content-length
9052
x-xss-protection
0
server
cafe
window_focus_fy2021.js
pagead2.googlesyndication.com/pagead/js/r20241106/r20110914/client/ Frame 5AE2
3 KB
0
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20241106/r20110914/client/window_focus_fy2021.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
944a37f694b55de268a0bf52dbae4e12f12c4ae09ee5c8d213ba05075c2865dd
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
etag
6567774568227038691
age
64179
x-content-type-options
nosniff
expires
Sun, 24 Nov 2024 15:37:19 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
date
Sun, 10 Nov 2024 15:37:19 GMT
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
vary
Accept-Encoding
cache-control
public, max-age=1209600
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
access-control-allow-origin
*
content-length
1234
x-xss-protection
0
server
cafe
ufs_web_display.js
pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ Frame 5AE2
221 KB
0
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
0661eecdc8f9a86cbeab346d02d85524cfad9fa7e159eb9b10bdf5f58ffe86f1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
etag
2824544460440785254
age
1484
x-content-type-options
nosniff
expires
Mon, 11 Nov 2024 10:02:14 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
date
Mon, 11 Nov 2024 09:02:14 GMT
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=ISO-8859-1
vary
Accept-Encoding
cache-control
public, max-age=3600, stale-while-revalidate=3600
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
content-length
70393
x-xss-protection
0
server
cafe
10407205192919947344
tpc.googlesyndication.com/simgad/ Frame 5AE2
57 KB
57 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/10407205192919947344
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
3ad1e48816000916837a5dfc518496be63d1a1c3780334b0cf979f6867534f4e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

age
210313
report-to
{"group":"content-ads-owners","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/content-ads-owners"}]}
x-content-type-options
nosniff
expires
Sat, 08 Nov 2025 23:01:45 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
allow-fenced-frame-automatic-beacons
true
date
Fri, 08 Nov 2024 23:01:45 GMT
last-modified
Fri, 08 Nov 2024 14:49:21 GMT
content-type
image/jpeg
cache-control
public, max-age=31536000
timing-allow-origin
*
x-dns-prefetch-control
off
cross-origin-resource-policy
cross-origin
accept-ranges
bytes
access-control-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="content-ads-owners"
content-length
58505
x-xss-protection
0
server
sffe
truncated
/ Frame 9C67
211 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5b85a45f619bdc8cef41254b4b37b1f3a805ad8f9e5c03f5cdc4b76fc2e4588d

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png
truncated
/ Frame A766
210 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
36f4184b2208f062609fc70e11bc4702c6927f14134afeab87594428d9678ad3

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png
truncated
/ Frame 515C
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7feff5203c8ccae3d59feda3c5a63375dde75aa24ad46b8b8e4e4b3793825214

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png
truncated
/ Frame B039
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
09d96000c36377585e3f6e3632073b21e7cc0a64a2caeb01b51a783bd374d29b

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png
view
pagead2.googlesyndication.com/pcs/ Frame 9B21
0
0
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/view?xai=AKAOjsvr0Gl1oCBpPMyui_bTYrZn7R5PkhZDsxFYy8Y_6pPsdam-9WumDDsSAfUiewludlFBjthMRhraWbUzd7DXN0rcqRs1oxnTUb1gKFUsQqZ1TCoi-jNqrdPyjKI9WN9UcRBzGJjEe-x8B1MWW9ZRZ79qXqn-soQg51NGz_CXdCj7_N6ZphxqOjWvxi1_Yw2sF8APfAqY_gY9JUE5LkwXCoOBi2KNnL5Gjt1hGBut7dFTjK6huk93cUvV8g0Ah4RmE7LtWpDgZpgpiS9EPp4-tW3Feq2IoZeRDyrEa8OgHjtoL5up5MhiPc2g_isYnPjhB3cOnoy1VwuvMFS2cE1vrNnbcXjRXxxNSYQ9ViEoTODz1fO6g1gDCS97jbzOc8ZRrJZE39BTpmfxzY9Z_aSrB2hXGs_fGA&sig=Cg0ArKJSzGwR2bcVmhHgEAE&uach_m=%5BUACH%5D&adurl=
Requested by
Host: links.ismgcorp.com
URL: https://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGWlwzHJZCDqbswoUxZdX70nL30BnYPp572VhPywT5pQTzLEICX5iqTS9Aa_Covm6Xg7V1r-UM=
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
private
timing-allow-origin
*
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-WoW64
cross-origin-resource-policy
cross-origin
x-content-type-options
nosniff
access-control-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-length
0
date
Mon, 11 Nov 2024 09:26:58 GMT
x-xss-protection
0
content-type
image/gif
server
cafe
932521598635159046
tpc.googlesyndication.com/simgad/ Frame 9B21
107 KB
0
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/932521598635159046
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
8dbca1d866693b3afb10bb00a8d747eb6d360d1eccf921fa0f5b440120407b2b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

age
407576
report-to
{"group":"content-ads-owners","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/content-ads-owners"}]}
x-content-type-options
nosniff
expires
Thu, 06 Nov 2025 16:14:02 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
allow-fenced-frame-automatic-beacons
true
date
Wed, 06 Nov 2024 16:14:02 GMT
last-modified
Thu, 19 Sep 2024 19:13:04 GMT
content-type
image/png
cache-control
public, max-age=31536000
timing-allow-origin
*
x-dns-prefetch-control
off
cross-origin-resource-policy
cross-origin
accept-ranges
bytes
access-control-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="content-ads-owners"
content-length
109125
x-xss-protection
0
server
sffe
abg_lite_fy2021.js
pagead2.googlesyndication.com/pagead/js/r20241106/r20110914/ Frame 9B21
23 KB
0
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20241106/r20110914/abg_lite_fy2021.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
250210a531956f2cb9ba81de8405e3b4bfdbc9b70d26ba260b547885f866ec1d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
etag
11581923691383104463
age
64179
x-content-type-options
nosniff
expires
Sun, 24 Nov 2024 15:37:19 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
date
Sun, 10 Nov 2024 15:37:19 GMT
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
vary
Accept-Encoding
cache-control
public, max-age=1209600
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
access-control-allow-origin
*
content-length
9052
x-xss-protection
0
server
cafe
window_focus_fy2021.js
pagead2.googlesyndication.com/pagead/js/r20241106/r20110914/client/ Frame 9B21
3 KB
0
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20241106/r20110914/client/window_focus_fy2021.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
944a37f694b55de268a0bf52dbae4e12f12c4ae09ee5c8d213ba05075c2865dd
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
etag
6567774568227038691
age
64179
x-content-type-options
nosniff
expires
Sun, 24 Nov 2024 15:37:19 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
date
Sun, 10 Nov 2024 15:37:19 GMT
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
vary
Accept-Encoding
cache-control
public, max-age=1209600
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
access-control-allow-origin
*
content-length
1234
x-xss-protection
0
server
cafe
ufs_web_display.js
pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ Frame 9B21
221 KB
0
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
0661eecdc8f9a86cbeab346d02d85524cfad9fa7e159eb9b10bdf5f58ffe86f1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
br
etag
2824544460440785254
age
1484
x-content-type-options
nosniff
expires
Mon, 11 Nov 2024 10:02:14 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
date
Mon, 11 Nov 2024 09:02:14 GMT
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=ISO-8859-1
vary
Accept-Encoding
cache-control
public, max-age=3600, stale-while-revalidate=3600
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
content-length
70393
x-xss-protection
0
server
cafe
ajax.php
www.databreachtoday.com/
43 B
216 B
XHR
General
Full URL
https://www.databreachtoday.com/ajax.php?json=marketoContactIdentification
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/javascripts-responsive/vendor/jquery.min.js?s=1731317213.9896
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
bd1aa3ff8e7caf0711aae65b19aa39611db7925dec5f16a67ccedce2cf468175
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept
application/json, text/javascript, */*; q=0.01

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
no-store, no-cache, must-revalidate
content-encoding
gzip
pragma
no-cache
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
expires
Thu, 19 Nov 1981 08:52:00 GMT
alt-svc
h3=":443"; ma=2592000
content-length
63
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:59 GMT
content-type
text/html; charset=UTF-8
vary
Accept-Encoding
x-frame-options
deny
iframe
d1eoo1tco6rr5e.cloudfront.net/86s8kpd/lz0ctwz/ Frame 37C7
Redirect Chain
  • https://insight.adsrvr.org/tags/86s8kpd/lz0ctwz/iframe
  • https://d1eoo1tco6rr5e.cloudfront.net/86s8kpd/lz0ctwz/iframe
0
0
Document
General
Full URL
https://d1eoo1tco6rr5e.cloudfront.net/86s8kpd/lz0ctwz/iframe
Requested by
Host: nexus.ensighten.com
URL: https://nexus.ensighten.com/choozle/19322/code/bbe0d6a760367a2eb312fc9f7f9d12d6.js?conditionId0=4965894
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.225.83.200 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-225-83-200.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://www.databreachtoday.com/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

Accept-Ranges
bytes
Age
25057
Cache-Control
max-age=86400
Connection
keep-alive
Content-Length
137
Content-Type
text/html
Date
Mon, 11 Nov 2024 02:29:22 GMT
ETag
"06be5ab7d86c75a29d677cc95813dde9"
Last-Modified
Wed, 09 Oct 2024 08:33:29 GMT
Server
AmazonS3
Via
1.1 f8fe53d5464b299529d281799da8de30.cloudfront.net (CloudFront)
X-Amz-Cf-Id
opYJxgRSBB51baXBwQBfaX9AmkHU5cbKVHo0pa6Hw2n1E738I4qJnw==
X-Amz-Cf-Pop
FRA2-C2
X-Cache
Hit from cloudfront
x-amz-server-side-encryption
AES256

Redirect headers

content-length
0
date
Mon, 11 Nov 2024 09:26:58 GMT
location
https://d1eoo1tco6rr5e.cloudfront.net/86s8kpd/lz0ctwz/iframe
truncated
/ Frame 9B21
213 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
793b0bd02f6e1aefdc798ce319cd207b4eef2126a4f89863ecfeaac04417d3d0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png
img.gif
b.6sc.co/v1/beacon/
43 B
258 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=null&visitor=2ce20ce2-b3aa-4e36-8ed5-67be431fd4b2&session=ba8c746b-71c4-4aa2-8c13-372387c4f08d&event=active_time_track&q=%7B%22currentTime%22%3A%22Mon%2C%2011%20Nov%202024%2009%3A26%3A58%20GMT%22%2C%22lastTrackTime%22%3A%22Mon%2C%2011%20Nov%202024%2009%3A26%3A57%20GMT%22%2C%22timeSpent%22%3A%221142%22%2C%22totalTimeSpent%22%3A%221142%22%7D&isIframe=false&m=%7B%22description%22%3A%22Multiple%20Chinese%20hacking%20groups%20are%20using%20a%20botnet%20named%20for%20a%20TCP%20routing%20port%20number%20to%20conduct%20password%20spraying%20attacks%2C%20warned%20Microsoft%20Thursday.%20The%20Quad7%22%2C%22keywords%22%3A%22China%2C%20TP-Link%2C%20Storm-0940%2C%20Microsoft%2C%20Password%20Spraying%2C%20Quad7%22%2C%22title%22%3A%22Chinese%20Hackers%20Use%20Quad7%20Botnet%20for%20Credential%20Theft%22%7D&cb=&r=https%3A%2F%2Flinks.ismgcorp.com%2F&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.databreachtoday.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709%3Frf%3D2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog&pageViewId=f1be2eac-4559-4234-844e-86f1e2d23646&ipv6=2a01%3A4a0%3A2b%3A%3A10&v=1.1.29
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.53.43.58 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a23-53-43-58.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
max-age=0, no-cache, no-store
etag
"60bb2e15-2b"
pragma
no-cache
x-content-type-options
nosniff
expires
Mon, 11 Nov 2024 09:26:58 GMT
accept-ranges
bytes
content-length
43
date
Mon, 11 Nov 2024 09:26:58 GMT
content-type
image/gif
last-modified
Sat, 05 Jun 2021 07:56:05 GMT
server
nginx/1.14.0 (Ubuntu)
gen_204
pagead2.googlesyndication.com/pagead/ Frame 5AE2
0
0
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=av-js&type=reach&proto=CAlgAWgD
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
no-cache, must-revalidate
timing-allow-origin
*
pragma
no-cache
cross-origin-resource-policy
cross-origin
x-content-type-options
nosniff
expires
Fri, 01 Jan 1990 00:00:00 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-length
0
date
Mon, 11 Nov 2024 09:26:58 GMT
x-xss-protection
0
content-type
image/gif
server
cafe
view
pagead2.googlesyndication.com/pcs/ Frame A766
0
0
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/view?xai=AKAOjsumzh9MFPgtGa-_NLZtFvMEcyy9LtJGYGjvvaiD4PwRaSoU4pGucozVURq8v8UUO1WZ5TvtZP0ikI6696W_NoW57p6o4DRtJ7AJvv8v3zu2nnThSKTb3N-XY60gIySnyVnkxtcvrHSgq3KYa9Ny4ppBeDaYfemC4S-Of68LCo4QbIiLJ7AlnfcYt4Tz7vjsjJYvHjk517QvY4Do7Lmy2ty0EexCNT8j34t_a2PlI2t2uEcnbOD45uWcJTgrkT_WB-np35mXYDn_8-KcB2OrfNYQfdC7248lafmcEPiC5suEQe98VHo-qxYnnvji6rrFDks29rRkYShqBUdbHpslGUC98bwnQ12iOYCr26oq0mGgPIAvtolDdCUSRto0m4JwVNt2netX5ha3JBZSTl4inxVHYEpQJQSl2w&sig=Cg0ArKJSzA6sX2H2q6ogEAE&uach_m=%5BUACH%5D&adurl=
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
private
timing-allow-origin
*
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-WoW64
cross-origin-resource-policy
cross-origin
x-content-type-options
nosniff
access-control-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-length
0
date
Mon, 11 Nov 2024 09:26:58 GMT
x-xss-protection
0
content-type
image/gif
server
cafe
gen_204
pagead2.googlesyndication.com/pagead/ Frame A766
0
0
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=av-js&type=reach&proto=CAlgAWgD
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
no-cache, must-revalidate
timing-allow-origin
*
pragma
no-cache
cross-origin-resource-policy
cross-origin
x-content-type-options
nosniff
expires
Fri, 01 Jan 1990 00:00:00 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-length
0
date
Mon, 11 Nov 2024 09:26:58 GMT
x-xss-protection
0
content-type
image/gif
server
cafe
view
pagead2.googlesyndication.com/pcs/ Frame B039
0
0
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/view?xai=AKAOjss6jscqDbDFPK87-pqquxUTloUMGwJ5bBg9HHyxh9JXw4vJ0vROrkAKXJTp-OS_lBfO6K2wauDDs-lZFJajHBy4fbQ5v9DeyGvzCtGYrAnPRIHWlNdaaHMlyxpF_pIeSeKRL6GPgFEKvm6YQisOqhjLjqrSI4nS_Yhxh9qk8dtmy4s2LwywnnKuxnEiOYSho3b7jvZ_BQQ_C6YMyEA6b2E6v-T5pP0_i06XUmLU4m3thD7wxgjxzsBd1S49O1-4eSlFXjHmNa2k4cf3786pRXfhdXKc-d4Sapy2qA2tw6qCG13thLXL0cFDQuffXNn8GIV95cOV6NLFGIt1Rj8aNwZrdhpVTUXnpIY2gQnPEaR2zZBuCWAKRhhxccLnk9s0y24eqHhOze6zDj4WUVPQtQQdeb3Jega4Xg&sig=Cg0ArKJSzHhiRmA0Tm5bEAE&uach_m=%5BUACH%5D&adurl=
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
private
timing-allow-origin
*
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-WoW64
cross-origin-resource-policy
cross-origin
x-content-type-options
nosniff
access-control-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-length
0
date
Mon, 11 Nov 2024 09:26:58 GMT
x-xss-protection
0
content-type
image/gif
server
cafe
gen_204
pagead2.googlesyndication.com/pagead/ Frame B039
0
0
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=av-js&type=reach&proto=CAlgAWgD
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
no-cache, must-revalidate
timing-allow-origin
*
pragma
no-cache
cross-origin-resource-policy
cross-origin
x-content-type-options
nosniff
expires
Fri, 01 Jan 1990 00:00:00 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-length
0
date
Mon, 11 Nov 2024 09:26:58 GMT
x-xss-protection
0
content-type
image/gif
server
cafe
view
pagead2.googlesyndication.com/pcs/ Frame 515C
0
0
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/view?xai=AKAOjsuf9j3BN_AxyrkEigoSqDcr0ZNCjx4q6elBN4-PegBqNrcG-lbns_5JmR_xKE9OH4pAYWahSR51Q3GScQL8VRABkkik_aYLwSGQpyS_8S0fPzClWh5Z89Y9q14Gx_764PfywXU7H_ARZmrAyFnG3VnZa_IK9Yiuj4tb1ruuZNeH4eBvoks0ubFiwzIKnjln-BxYGHSwF51SVaYZTZ9hsO1OgXIvaRHXEc_X-OSCcyLk3bCER7lWG2Lr8sfCyTnYv1olO9taBqlmYWE92O-nYiMYs7R3OnwDBSrNErcyyVaSH_83p4DVSEqbXumYXH0XzN6h4g3SbeuqHh09Zs3eQXZJfkUeBD8txo5bz1w-odNvgnQBaB65k6xk88SCv1z9gpMTLKQH6fPlBSmUSk1VEjdQ_bvFdao7uwdC&sig=Cg0ArKJSzCpDmQHqjs4XEAE&uach_m=%5BUACH%5D&adurl=
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
private
timing-allow-origin
*
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-WoW64
cross-origin-resource-policy
cross-origin
x-content-type-options
nosniff
access-control-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-length
0
date
Mon, 11 Nov 2024 09:26:58 GMT
x-xss-protection
0
content-type
image/gif
server
cafe
gen_204
pagead2.googlesyndication.com/pagead/ Frame 515C
0
0
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=av-js&type=reach&proto=CAlgAWgD
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
no-cache, must-revalidate
timing-allow-origin
*
pragma
no-cache
cross-origin-resource-policy
cross-origin
x-content-type-options
nosniff
expires
Fri, 01 Jan 1990 00:00:00 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-length
0
date
Mon, 11 Nov 2024 09:26:58 GMT
x-xss-protection
0
content-type
image/gif
server
cafe
view
pagead2.googlesyndication.com/pcs/ Frame 9C67
0
0
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/view?xai=AKAOjssnQwVFf4upgtT2-8_-CvUOH1zYYDKbB_ox-voX0qo0Xaebq_0BXSubhmP2k1yPr40L0lONKoCVUQS5w57aBwt-i4e2C1bQrzOQfBjIsAsPWs3tKoiAi0FwwgT2ErpS3otLBK8YHk7_ThWU-5KA3gYRFOguQsuHHPwnau9YB4Uz7hEJ7a6NMxnue2cSPTF4KT1Tppw6JLfW5ofyxnyYqwN9cxdz9wD4Nw4LxfFvQG4Za22fZSxBwXpReMJFkxiHCdFyAXNble2Yj4Eup3QftSPy2vR5eo5tgWp_jBd_nJbXZzsr1oMK8BarghSSVn78eNfTMe-ySlUYDQ7mQZInMjqoccXsPp6qLH3Gg_DU9476rMLsUG-JO5pxOLffxD-3K2bKXy30uKMb79acz-DhZyMEXHRc&sig=Cg0ArKJSzN9gdhCBF9a3EAE&uach_m=%5BUACH%5D&adurl=
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
private
timing-allow-origin
*
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-WoW64
cross-origin-resource-policy
cross-origin
x-content-type-options
nosniff
access-control-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-length
0
date
Mon, 11 Nov 2024 09:26:58 GMT
x-xss-protection
0
content-type
image/gif
server
cafe
gen_204
pagead2.googlesyndication.com/pagead/ Frame 9C67
0
0
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=av-js&type=reach&proto=CAlgAWgD
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
no-cache, must-revalidate
timing-allow-origin
*
pragma
no-cache
cross-origin-resource-policy
cross-origin
x-content-type-options
nosniff
expires
Fri, 01 Jan 1990 00:00:00 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-length
0
date
Mon, 11 Nov 2024 09:26:58 GMT
x-xss-protection
0
content-type
image/gif
server
cafe
view
pagead2.googlesyndication.com/pcs/ Frame 9B21
0
0
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/view?xai=AKAOjsszv-QMmM7tajqKIL4Df3TCnUNgWpoIykgVKaDn7kuGF2PXofhOdhzimV6Xoe1osIYOIK1bv3gqQEeF89R-EvJM94iX2maknubWeh6a7kcd4XYVVh9SNsoZ5fsnzTuV0S4xx75YfYh89345-Evn6ub4cmrHDY9DoNDAWR-3WKKGzLjxFsWWplQhMFlwgila1TU3pmYgO5Z1Co0Jd2iigi3mtBvGe-L86OFbELTuoj0HbtE5Khwp-1-SOV8_J_AkXoQzU2mx_jDCpxT9dshJ6DGN1EzN96sSNZxLYyza1sJbdWp4vs0kVP0PPAvhrwAKwHEsBVSd0JLNwhR9er1BrwWhLothJOXlDziIpAZ7qDCIy3qEAuQfXDkfx4GMWDprCotbbzVncC8zoTq9Ys8VFKcEmzU6FL5S&sig=Cg0ArKJSzK2LrVwxZBnSEAE&uach_m=%5BUACH%5D&adurl=
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
private
timing-allow-origin
*
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-WoW64
cross-origin-resource-policy
cross-origin
x-content-type-options
nosniff
access-control-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-length
0
date
Mon, 11 Nov 2024 09:26:58 GMT
x-xss-protection
0
content-type
image/gif
server
cafe
gen_204
pagead2.googlesyndication.com/pagead/ Frame 9B21
0
0
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=av-js&type=reach&proto=CAlgAWgD
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
no-cache, must-revalidate
timing-allow-origin
*
pragma
no-cache
cross-origin-resource-policy
cross-origin
x-content-type-options
nosniff
expires
Fri, 01 Jan 1990 00:00:00 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-length
0
date
Mon, 11 Nov 2024 09:26:58 GMT
x-xss-protection
0
content-type
image/gif
server
cafe
collect
s.clarity.ms/
0
287 B
XHR
General
Full URL
https://s.clarity.ms/collect
Requested by
Host: www.clarity.ms
URL: https://www.clarity.ms/s/0.7.49/clarity.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.96.124.68 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept
application/x-clarity-gzip
Referer
https://www.databreachtoday.com/

Response headers

Request-Context
appId=cid-v1:b1d896b3-bec7-448b-b764-240152e813e8
Access-Control-Allow-Origin
https://www.databreachtoday.com
Date
Mon, 11 Nov 2024 09:26:58 GMT
Vary
Origin
Server
nginx
Connection
keep-alive
Access-Control-Allow-Credentials
true
view
pagead2.googlesyndication.com/pcs/ Frame 5AE2
0
0
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/view?xai=AKAOjstsibw9-Kg7Lu5sSvJlNIquWWxVaXCCset47qDMd0QMwaJVjCASjbTmXHQuxMA-YS_e2h7JCqQ_zHI8kbjDJufEoQy66oTr_05Ch0CjkiK_soeZrNc-s9YPvXMifhJvSHv47rkJrp6-L-2RaeWWr9MngNL8e6fTNiaPKCswF7jdUvQXjMg4UqramzmU2GwHT4L09XiDaKf9gppuw8DVVCQAcQMrR4aHRbME7MYhFlv5TDKSbOORzwTyx5hCz6HPinAiyjt2K1aVKt7tGPE68ulRwl4rwkIZHORBLn5D0ku-ol4TGfgFocgRKGPixwJsWwIFtEQbxJCneRcOvt29uGGa8wpLxKlZK4WJOr9VQX4IL8-rNoIhQ9_gLE0TrRmhKbzlIUymtKeDlsQ0VAHvHWtZt5Sb&sig=Cg0ArKJSzNkjd3uSlkKWEAE&uach_m=%5BUACH%5D&uach=WyIiLCIiLCIiLCIiLCIiLG51bGwsMCxudWxsLCIiLG51bGwsMF0%3D&adurl=
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
private
timing-allow-origin
*
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-WoW64
cross-origin-resource-policy
cross-origin
x-content-type-options
nosniff
access-control-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-length
0
date
Mon, 11 Nov 2024 09:26:58 GMT
x-xss-protection
0
content-type
image/gif
server
cafe
bis-hdr.desktop.r2.js
www.databreachtoday.com/javascripts-responsive/
2 KB
652 B
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/bis-hdr.desktop.r2.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
56d67bff3c0d11af3f7b09d825eca83408c0017d7c34a03678f0f9433a97819d
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
alt-svc
h3=":443"; ma=2592000
content-length
593
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:58 GMT
content-type
text/javascript; charset=utf-8
vary
Accept-Encoding
x-frame-options
deny
sodar
pagead2.googlesyndication.com/getconfig/
17 KB
13 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=m202411070101&st=env
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
98e2fd6fba5b0aeddba8db7b75debcab516aedcf7aa14a4f61d2b1a7b3a19380
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

timing-allow-origin
*
content-encoding
br
cross-origin-resource-policy
cross-origin
x-content-type-options
nosniff
access-control-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-length
12793
date
Mon, 11 Nov 2024 09:26:58 GMT
x-xss-protection
0
content-type
application/json; charset=UTF-8
content-disposition
attachment; filename="f.txt"
server
cafe
truncated
/ Frame 5AE2
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
92cdec2addeabc24c0130d6581b7c464a054384173cc3a8a53e20cb0d9b95de2

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png
favicon_DBT.ico
www.databreachtoday.com/images/favicons/
894 B
731 B
Other
General
Full URL
https://www.databreachtoday.com/images/favicons/favicon_DBT.ico
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
/
Resource Hash
33040968931c3f2bf321b07022823a59fe29690b217b9d445d5dc58746ce191b
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-security-policy
frame-ancestors 'none'
cache-control
max-age=86400, private, must-revalidate
content-encoding
gzip
referrer-policy
strict-origin-when-cross-origin
x-content-type-options
nosniff
alt-svc
h3=":443"; ma=2592000
content-length
677
x-xss-protection
1; mode=block
date
Mon, 11 Nov 2024 09:26:58 GMT
content-type
image/vnd.microsoft.icon
vary
Accept-Encoding
x-frame-options
deny
sodar2.js
tpc.googlesyndication.com/sodar/
18 KB
7 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/pagead/managed/js/gpt/m202411070101/pubads_impl.js?cb=31088753
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
ff3de130872fe0fb5b770dfa2bc9f0daf8ab320403a34a60d089436f08d24f99
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

content-encoding
gzip
etag
"1727224258380615"
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
x-content-type-options
nosniff
expires
Mon, 11 Nov 2024 09:26:58 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Mon, 11 Nov 2024 09:26:58 GMT
content-type
text/javascript
vary
Accept-Encoding
cache-control
private, max-age=3000
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
cross-origin-resource-policy
cross-origin
accept-ranges
bytes
content-length
6445
x-xss-protection
0
server
sffe
runner.html
tpc.googlesyndication.com/sodar/sodar2/232/ Frame C19E
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/232/runner.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

accept-ranges
bytes
age
2778
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
cache-control
public, max-age=3000
content-encoding
gzip
content-length
5005
content-type
text/html
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
cross-origin-resource-policy
cross-origin
date
Mon, 11 Nov 2024 08:40:40 GMT
expires
Mon, 11 Nov 2024 09:30:40 GMT
last-modified
Mon, 23 Sep 2024 18:12:21 GMT
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
server
sffe
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
img.gif
b.6sc.co/v1/beacon/
43 B
258 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=null&visitor=2ce20ce2-b3aa-4e36-8ed5-67be431fd4b2&session=ba8c746b-71c4-4aa2-8c13-372387c4f08d&event=active_time_track&q=%7B%22currentTime%22%3A%22Mon%2C%2011%20Nov%202024%2009%3A26%3A59%20GMT%22%2C%22lastTrackTime%22%3A%22Mon%2C%2011%20Nov%202024%2009%3A26%3A58%20GMT%22%2C%22timeSpent%22%3A%221001%22%2C%22totalTimeSpent%22%3A%222143%22%7D&isIframe=false&m=%7B%22description%22%3A%22Multiple%20Chinese%20hacking%20groups%20are%20using%20a%20botnet%20named%20for%20a%20TCP%20routing%20port%20number%20to%20conduct%20password%20spraying%20attacks%2C%20warned%20Microsoft%20Thursday.%20The%20Quad7%22%2C%22keywords%22%3A%22China%2C%20TP-Link%2C%20Storm-0940%2C%20Microsoft%2C%20Password%20Spraying%2C%20Quad7%22%2C%22title%22%3A%22Chinese%20Hackers%20Use%20Quad7%20Botnet%20for%20Credential%20Theft%22%7D&cb=&r=https%3A%2F%2Flinks.ismgcorp.com%2F&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.databreachtoday.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709%3Frf%3D2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog&pageViewId=f1be2eac-4559-4234-844e-86f1e2d23646&ipv6=2a01%3A4a0%3A2b%3A%3A10&v=1.1.29
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.53.43.58 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a23-53-43-58.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
max-age=0, no-cache, no-store
etag
"63f02dad-2b"
pragma
no-cache
x-content-type-options
nosniff
expires
Mon, 11 Nov 2024 09:26:59 GMT
accept-ranges
bytes
content-length
43
date
Mon, 11 Nov 2024 09:26:59 GMT
content-type
image/gif
last-modified
Sat, 18 Feb 2023 01:45:17 GMT
server
nginx/1.14.0 (Ubuntu)
activeview
pagead2.googlesyndication.com/pcs/ Frame A766
42 B
65 B
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsuGqDlPLSPbCaxpop_9MVZvIZjr4pK9G-ZXUCLFWeZUex4elFaQCeGcNprphsIETIoifg_ZB9SrY0-AtUqfkbp21T9__btzW78pm2Sa5RuklacstOZK5XPfIz96bH1_qRnRlpk0amguj9lX9G8y6eX1xaxA5YNRb5buwK3lzoHwCOm36dItqkuCJnWf0GFg64qdBkOgjlA&sig=Cg0ArKJSzN2S6ySECwV7EAE&id=lidar2&mcvt=1000&p=594,1040,844,1340&tm=1041.1000003814697&tu=40.69999980926514&mtos=1000,1000,1000,1000,1000&tos=1000,0,0,0,0&v=20241030&bin=7&avms=nio&bs=1600,1200&mc=1&vu=1&app=0&itpl=3&adk=2977291722&rs=4&la=0&cr=0&uach=WyIiLCIiLCIiLCIiLCIiLG51bGwsMCxudWxsLCIiLG51bGwsMF0%3D&vs=4&r=v&co=2725001800&rst=1731317218008&rpt=309&isd=0&lsd=0&met=mue&wmsd=0&pbe=0&fle=0&vae=0&spb=0&sfl=0&ffslot=0&reach=8&io2=0
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
no-cache, must-revalidate
timing-allow-origin
*
pragma
no-cache
cross-origin-resource-policy
cross-origin
access-control-allow-credentials
true
x-content-type-options
nosniff
expires
Fri, 01 Jan 1990 00:00:00 GMT
access-control-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-length
42
date
Mon, 11 Nov 2024 09:26:59 GMT
x-xss-protection
0
content-type
image/gif
server
cafe
collect
s.clarity.ms/
0
287 B
XHR
General
Full URL
https://s.clarity.ms/collect
Requested by
Host: www.clarity.ms
URL: https://www.clarity.ms/s/0.7.49/clarity.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.96.124.68 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept
application/x-clarity-gzip
Referer
https://www.databreachtoday.com/

Response headers

Request-Context
appId=cid-v1:b1d896b3-bec7-448b-b764-240152e813e8
Access-Control-Allow-Origin
https://www.databreachtoday.com
Date
Mon, 11 Nov 2024 09:26:59 GMT
Vary
Origin
Server
nginx
Connection
keep-alive
Access-Control-Allow-Credentials
true
activeview
pagead2.googlesyndication.com/pcs/ Frame 9C67
42 B
65 B
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjstHL3ebqFSE-w3g01vb8fqE_owpZ5HbveMirssPTXDPIiOq9ix4I2jATOeHuxZR6t68REbY9jmfK92etn4VxC7exWB9M7V9iaP9MQBy-J9tzSrNfCVCdDymGuIhSGRXfXCe8ziPrum4C2pUOHTCwZrvpCzArs9gBH1_lUkQh8kRrbP1rjvYJulB3PsGPo9utwtbUxrTG9o&sig=Cg0ArKJSzPAkvk0qJC5XEAE&id=lidar2&mcvt=1000&p=71,636,161,1364&tm=1049&tu=49.19999980926514&mtos=1000,1000,1000,1000,1000&tos=1000,0,0,0,0&v=20241030&bin=7&avms=nio&bs=1600,1200&mc=1&vu=1&app=0&itpl=3&adk=3278784386&rs=4&la=0&cr=0&uach=WyIiLCIiLCIiLCIiLCIiLG51bGwsMCxudWxsLCIiLG51bGwsMF0%3D&vs=4&r=v&co=2725001800&rst=1731317217989&rpt=427&isd=0&lsd=0&met=mue&wmsd=0&pbe=0&fle=0&vae=0&spb=0&sfl=0&ffslot=0&reach=8&io2=0
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
no-cache, must-revalidate
timing-allow-origin
*
pragma
no-cache
cross-origin-resource-policy
cross-origin
access-control-allow-credentials
true
x-content-type-options
nosniff
expires
Fri, 01 Jan 1990 00:00:00 GMT
access-control-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-length
42
date
Mon, 11 Nov 2024 09:26:59 GMT
x-xss-protection
0
content-type
image/gif
server
cafe
sodar
pagead2.googlesyndication.com/pagead/
0
0

activeview
pagead2.googlesyndication.com/pcs/ Frame 5AE2
42 B
65 B
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsuLDQQlAHhTk_u8Nsr9XZgaitlCmar7BwVAYzzMBrVPBBl0P_zMUDRY9DAYtn48o_ZHBrZDFA7RZj1W-gfw2VfN5eaelZSImZgeUxbq9DtYilrFVG6aj0GTOVDA_7g6IQuDVE0lR9toH7yFKmGwEwPkq80KTTCDHN49LUwIr7e4Zi_VW4oHYjAWkVKuZdD_R_f1uAcqgaM&sig=Cg0ArKJSzK_7q_y64Q49EAE&id=lidar2&mcvt=1000&p=0,0,480,640&tm=1364&tu=364.5&mtos=1000,1000,1000,1000,1000&tos=1000,0,0,0,0&v=20241030&bin=7&avms=nio&bs=1600,1200&mc=1&vu=1&app=0&itpl=3&adk=1097209948&rs=4&la=1&cr=0&uach=WyIiLCIiLCIiLCIiLCIiLG51bGwsMCxudWxsLCIiLG51bGwsMF0%3D&vs=4&r=v&co=2725001800&rst=1731317218069&rpt=470&isd=0&lsd=0&met=mue&wmsd=0&pbe=0&fle=0&vae=0&spb=0&sfl=0&ffslot=0&reach=8&io2=0
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/managed/js/activeview/current/ufs_web_display.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.74.194 Plainview, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s02-in-f2.1e100.net
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
no-cache, must-revalidate
timing-allow-origin
*
pragma
no-cache
cross-origin-resource-policy
cross-origin
access-control-allow-credentials
true
x-content-type-options
nosniff
expires
Fri, 01 Jan 1990 00:00:00 GMT
access-control-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-length
42
date
Mon, 11 Nov 2024 09:26:59 GMT
x-xss-protection
0
content-type
image/gif
server
cafe
img.gif
b.6sc.co/v1/beacon/
43 B
257 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=null&visitor=2ce20ce2-b3aa-4e36-8ed5-67be431fd4b2&session=ba8c746b-71c4-4aa2-8c13-372387c4f08d&event=active_time_track&q=%7B%22currentTime%22%3A%22Mon%2C%2011%20Nov%202024%2009%3A27%3A00%20GMT%22%2C%22lastTrackTime%22%3A%22Mon%2C%2011%20Nov%202024%2009%3A26%3A59%20GMT%22%2C%22timeSpent%22%3A%221008%22%2C%22totalTimeSpent%22%3A%223151%22%7D&isIframe=false&m=%7B%22description%22%3A%22Multiple%20Chinese%20hacking%20groups%20are%20using%20a%20botnet%20named%20for%20a%20TCP%20routing%20port%20number%20to%20conduct%20password%20spraying%20attacks%2C%20warned%20Microsoft%20Thursday.%20The%20Quad7%22%2C%22keywords%22%3A%22China%2C%20TP-Link%2C%20Storm-0940%2C%20Microsoft%2C%20Password%20Spraying%2C%20Quad7%22%2C%22title%22%3A%22Chinese%20Hackers%20Use%20Quad7%20Botnet%20for%20Credential%20Theft%22%7D&cb=&r=https%3A%2F%2Flinks.ismgcorp.com%2F&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.databreachtoday.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709%3Frf%3D2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog&pageViewId=f1be2eac-4559-4234-844e-86f1e2d23646&ipv6=2a01%3A4a0%3A2b%3A%3A10&v=1.1.29
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.53.43.58 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a23-53-43-58.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
max-age=0, no-cache, no-store
etag
"63f020a0-2b"
pragma
no-cache
x-content-type-options
nosniff
expires
Mon, 11 Nov 2024 09:27:00 GMT
accept-ranges
bytes
content-length
43
date
Mon, 11 Nov 2024 09:27:00 GMT
content-type
image/gif
last-modified
Sat, 18 Feb 2023 00:49:36 GMT
server
nginx/1.14.0 (Ubuntu)
img.gif
b.6sc.co/v1/beacon/
43 B
257 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=null&visitor=2ce20ce2-b3aa-4e36-8ed5-67be431fd4b2&session=ba8c746b-71c4-4aa2-8c13-372387c4f08d&event=active_time_track&q=%7B%22currentTime%22%3A%22Mon%2C%2011%20Nov%202024%2009%3A27%3A01%20GMT%22%2C%22lastTrackTime%22%3A%22Mon%2C%2011%20Nov%202024%2009%3A27%3A00%20GMT%22%2C%22timeSpent%22%3A%221003%22%2C%22totalTimeSpent%22%3A%224154%22%7D&isIframe=false&m=%7B%22description%22%3A%22Multiple%20Chinese%20hacking%20groups%20are%20using%20a%20botnet%20named%20for%20a%20TCP%20routing%20port%20number%20to%20conduct%20password%20spraying%20attacks%2C%20warned%20Microsoft%20Thursday.%20The%20Quad7%22%2C%22keywords%22%3A%22China%2C%20TP-Link%2C%20Storm-0940%2C%20Microsoft%2C%20Password%20Spraying%2C%20Quad7%22%2C%22title%22%3A%22Chinese%20Hackers%20Use%20Quad7%20Botnet%20for%20Credential%20Theft%22%7D&cb=&r=https%3A%2F%2Flinks.ismgcorp.com%2F&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.databreachtoday.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709%3Frf%3D2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog&pageViewId=f1be2eac-4559-4234-844e-86f1e2d23646&ipv6=2a01%3A4a0%3A2b%3A%3A10&v=1.1.29
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.53.43.58 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a23-53-43-58.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
max-age=0, no-cache, no-store
etag
"63f020a0-2b"
pragma
no-cache
x-content-type-options
nosniff
expires
Mon, 11 Nov 2024 09:27:01 GMT
accept-ranges
bytes
content-length
43
date
Mon, 11 Nov 2024 09:27:01 GMT
content-type
image/gif
last-modified
Sat, 18 Feb 2023 00:49:36 GMT
server
nginx/1.14.0 (Ubuntu)
collect
s.clarity.ms/
0
287 B
XHR
General
Full URL
https://s.clarity.ms/collect
Requested by
Host: www.clarity.ms
URL: https://www.clarity.ms/s/0.7.49/clarity.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.96.124.68 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept
application/x-clarity-gzip
Referer
https://www.databreachtoday.com/

Response headers

Request-Context
appId=cid-v1:b1d896b3-bec7-448b-b764-240152e813e8
Access-Control-Allow-Origin
https://www.databreachtoday.com
Date
Mon, 11 Nov 2024 09:27:01 GMT
Vary
Origin
Server
nginx
Connection
keep-alive
Access-Control-Allow-Credentials
true
img.gif
b.6sc.co/v1/beacon/
43 B
257 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=null&visitor=2ce20ce2-b3aa-4e36-8ed5-67be431fd4b2&session=ba8c746b-71c4-4aa2-8c13-372387c4f08d&event=active_time_track&q=%7B%22currentTime%22%3A%22Mon%2C%2011%20Nov%202024%2009%3A27%3A02%20GMT%22%2C%22lastTrackTime%22%3A%22Mon%2C%2011%20Nov%202024%2009%3A27%3A01%20GMT%22%2C%22timeSpent%22%3A%221000%22%2C%22totalTimeSpent%22%3A%225154%22%7D&isIframe=false&m=%7B%22description%22%3A%22Multiple%20Chinese%20hacking%20groups%20are%20using%20a%20botnet%20named%20for%20a%20TCP%20routing%20port%20number%20to%20conduct%20password%20spraying%20attacks%2C%20warned%20Microsoft%20Thursday.%20The%20Quad7%22%2C%22keywords%22%3A%22China%2C%20TP-Link%2C%20Storm-0940%2C%20Microsoft%2C%20Password%20Spraying%2C%20Quad7%22%2C%22title%22%3A%22Chinese%20Hackers%20Use%20Quad7%20Botnet%20for%20Credential%20Theft%22%7D&cb=&r=https%3A%2F%2Flinks.ismgcorp.com%2F&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.databreachtoday.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709%3Frf%3D2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog&pageViewId=f1be2eac-4559-4234-844e-86f1e2d23646&ipv6=2a01%3A4a0%3A2b%3A%3A10&v=1.1.29
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.53.43.58 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a23-53-43-58.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
max-age=0, no-cache, no-store
etag
"5e502810-2b"
pragma
no-cache
x-content-type-options
nosniff
expires
Mon, 11 Nov 2024 09:27:02 GMT
accept-ranges
bytes
content-length
43
date
Mon, 11 Nov 2024 09:27:02 GMT
content-type
image/gif
last-modified
Fri, 21 Feb 2020 18:57:20 GMT
server
nginx/1.14.0 (Ubuntu)
collect
region1.google-analytics.com/g/
0
0
Fetch
General
Full URL
https://region1.google-analytics.com/g/collect?v=2&tid=G-XJ8Q4QGGRH&gtm=45je4b70v886765778z86624193za200zb6624193&_p=1731317215361&gcd=13l3l3l2l1l1&npa=1&dma_cps=syphamo&dma=1&tag_exp=101823848~101925629&cid=1035659389.1731317217&ul=de-de&sr=1600x1200&uaa=&uab=&uafvl=&uamb=0&uam=&uap=&uapv=&uaw=0&are=1&frm=0&pscdl=noapi&_s=2&sid=1731317217&sct=1&seg=0&dl=https%3A%2F%2Fwww.databreachtoday.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709%3Frf%3D2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog&dr=https%3A%2F%2Flinks.ismgcorp.com%2F&dt=Chinese%20Hackers%20Use%20Quad7%20Botnet%20for%20Credential%20Theft&en=6sense&ep.asset_type=article26709&ep.asset_categories=444&ep.asset_keywords_1=China%2C%20TP-Link%2C%20Storm-0940%2C%20Microsoft%2C%20Password%20Spraying%2C%20Quad7&ep.asset_keywords_2=&ep.asset_keywords_3=&ep.asset_keywords_4=&ep.asset_keywords_5=&ep.asset_keywords_6=&ep.asset_keywords_7=&ep.asset_keywords_8=&ep.asset_keywords_9=&ep.asset_keywords_10=&_et=456&up.company_name_6s=&up.confidence_6s=NA&up.naics_6s=&up.domain_6s=&tfd=9218
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=G-XJ8Q4QGGRH&l=dataLayer&cx=c&gtm=45He4b70v6624193za200
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4860:4802:34::36 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
no-cache, no-store, must-revalidate
pragma
no-cache
cross-origin-resource-policy
cross-origin
access-control-allow-credentials
true
content-security-policy-report-only
script-src 'none'; form-action 'none'; frame-src 'none'; report-uri https://csp.withgoogle.com/csp/scaffolding/ascnsrsggc:86:0
report-to
{"group":"coop_reporting","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/scaffolding/ascnsrsggc:86:0"}],}
expires
Fri, 01 Jan 1990 00:00:00 GMT
access-control-allow-origin
https://www.databreachtoday.com
cross-origin-opener-policy-report-only
same-origin; report-to=coop_reporting
content-length
0
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Mon, 11 Nov 2024 09:27:02 GMT
content-type
text/plain
server
Golfe2
img.gif
b.6sc.co/v1/beacon/
43 B
258 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=null&visitor=2ce20ce2-b3aa-4e36-8ed5-67be431fd4b2&session=ba8c746b-71c4-4aa2-8c13-372387c4f08d&event=active_time_track&q=%7B%22currentTime%22%3A%22Mon%2C%2011%20Nov%202024%2009%3A27%3A03%20GMT%22%2C%22lastTrackTime%22%3A%22Mon%2C%2011%20Nov%202024%2009%3A27%3A02%20GMT%22%2C%22timeSpent%22%3A%221000%22%2C%22totalTimeSpent%22%3A%226154%22%7D&isIframe=false&m=%7B%22description%22%3A%22Multiple%20Chinese%20hacking%20groups%20are%20using%20a%20botnet%20named%20for%20a%20TCP%20routing%20port%20number%20to%20conduct%20password%20spraying%20attacks%2C%20warned%20Microsoft%20Thursday.%20The%20Quad7%22%2C%22keywords%22%3A%22China%2C%20TP-Link%2C%20Storm-0940%2C%20Microsoft%2C%20Password%20Spraying%2C%20Quad7%22%2C%22title%22%3A%22Chinese%20Hackers%20Use%20Quad7%20Botnet%20for%20Credential%20Theft%22%7D&cb=&r=https%3A%2F%2Flinks.ismgcorp.com%2F&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.databreachtoday.com%2Fchinese-hackers-use-quad7-botnet-for-credential-theft-a-26709%3Frf%3D2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog&pageViewId=f1be2eac-4559-4234-844e-86f1e2d23646&ipv6=2a01%3A4a0%3A2b%3A%3A10&v=1.1.29
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.53.43.58 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a23-53-43-58.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.databreachtoday.com/

Response headers

cache-control
max-age=0, no-cache, no-store
etag
"60bb2e15-2b"
pragma
no-cache
x-content-type-options
nosniff
expires
Mon, 11 Nov 2024 09:27:03 GMT
accept-ranges
bytes
content-length
43
date
Mon, 11 Nov 2024 09:27:03 GMT
content-type
image/gif
last-modified
Sat, 05 Jun 2021 07:56:05 GMT
server
nginx/1.14.0 (Ubuntu)
ondemand-preview-w-255.mp4
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/
1 MB
0
Media
General
Full URL
https://f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/ondemand-preview-w-255.mp4
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.209.23.77 Vienna, Austria, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-209-23-77.deploy.static.akamaitechnologies.com
Software
/
Resource Hash

Request headers

Referer
https://www.databreachtoday.com/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Range
bytes=3652652-

Response headers

Cache-Control
public, max-age=819
ETag
e5d65b36cc2f1ee7de6cc53cd6609280
X-Timestamp
1373028995.98411
Content-Range
bytes 3652652-10621769/10621770
Expires
Mon, 11 Nov 2024 09:40:35 GMT
Accept-Ranges
bytes
X-Trans-Id
tx7c0569a2535b4a8cba71d-00672d0d4edfw1
Content-Length
6969118
Date
Mon, 11 Nov 2024 09:26:56 GMT
Last-Modified
Fri, 05 Jul 2013 12:56:36 GMT
Content-Type
video/mp4

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
URL
https://f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/ondemand-preview-w-255.mp4
Domain
pagead2.googlesyndication.com
URL
https://pagead2.googlesyndication.com/pagead/sodar?id=sodar2&v=232&t=2&li=gpt_m202411070101&jk=708489405045722&bg=!a2ilaCfNAAYQZ9WPMGc7ADQBe5WfOPeQ3KlP7M07lhc-U_bgMlFtrn8Fu6QXM0-YMldSvk7MQiUX2jKCEfGE3fXnSNrrAgAAAFJSAAAAA2gBB34ANlTGn7A_HU6YkwMb7aW2PiDRggNSky_QI4_wcXYUx2vmEr4EQga1MDdZkrwo6SI8cRaz8271igoAUU9NyvIE0q7Qs552MLdXGmO1Rfb3AzYYbfeKN6VZY0-CCRB_m2ohgMxbV0y7LxwvGBmgwtBZAu1Jk9jHK3mam4QFBjQ9U8MP3wNXP-TCJvSsSJkCkr9Eik1wJfDmNrg-Yf6e3zdgV5x2HyGoJLj9OBRIeglCQdRJX7cX20O2Yb7EGQy7V4-4WuHb1mexLwpzbZrZHmtO4P5LMLwbBKib3et6T1CjlzauahDS7OzT1IGsjQiljGJXUPh0keocIcYgq8XlxuMkQXQ4YcCSxy94ZiF7vutXYPy2HDUd3HYCfPWiWMTTsNEbhQrpX6OMBT1NP7mOY9xpjLZuwUq8CNBsqMylqF1bGda38iV4Z3X-TObUbz7sH46R2nVVwbKHjZpYsPKLnIQgHwSTQAYgbEg3T0C5Xn9soPSlVJWf-ugEN3B7IrGlF4XF8pnehG3nwwaEYqzlo3CEVjEp301U1E_oub3ntmST5YH02MKiTIEWcf4KpAV6P69qndVHeou0eR7xoaqsDgZBOTJVkG8C2pi3JbZDAzR2J3zMkaNhSgujfpLXta0G2mZwS564eK089Et1pMq6INZVuCumXYmwXe58t45WkYWDE0BMxRLhxyMP76mV0af2ntOjwJ8sglyjNAGswLeKY1OQsCSj4u5mZM3RMQ_zaq-zMGb3NsZfO86Eza488DxT_yag0T0T5lfKpbw-uZJLM2ghwdecFv_jjTB_M1tFi1GYmmp6XcQ8FY3a03YR6MegtaLbkgGWRlgOLy9f5NRpMrQszge9qcIs3hLFtJdqdCCWnQ6qw8PX-I1-jGLAQGh_iM4woxz3I9PSOnX233GRsifSQxwnmqE0V9_lfYC585kje0q_ro7JqUAhi83RMxP53QMfxA2ueKOBBcQcbV0W2W9ddAwXoDCldM5DGCBmMR1WOQ5s8XXraIYB3h7esS4a-RGVc62ZSFMC9vlydE9PJz9qT5rwTDvtJRp-ENN0-BfEdfc

Verdicts & Comments Add Verdict or Comment

155 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| 1 object| 2 object| 3 object| 4 object| 5 object| 6 object| 7 object| 8 object| 9 function| $ function| jQuery object| jQuery1910833111599672143 object| mejs function| MediaElement object| HtmlMediaElement function| onYouTubePlayerAPIReady function| DefaultPlayer function| MediaElementPlayer number| mce-data-1icd8oc27 object| tinyMCE object| tinymce function| des function| des_createKeys function| stringToHex function| hexToString function| readCookie function| disqus_config object| googletag object| dataLayer function| importScript function| cleanExistingScript function| refreshJavascript string| base_url string| base_url_auto string| ssl_base string| services_url string| includes_url object| video_intro object| audio_data boolean| article_page number| videoAskLoginTime object| identified_user_data object| gaKeywords string| gaCategories number| videoGA4EventTime1 number| videoGA4EventTime3 string| current_page string| session_id object| login_reload_pages object| scrollTopPages object| all_states object| all_countries_with_states string| __family__ number| ENTER_KEY string| caption_speakers function| closeCookieTerms function| uncheckGroupInputs function| submitFormPopup function| setMembershipPrices function| updatePriceBox function| forgotPassword function| generateHash2w function| login function| register function| pagination function| scrollTO function| showAlert function| assetPrequalSubmit function| addToBriefcase function| toggleDdlsByValue function| populateStates function| registerFormShowErrors function| recordLead function| initAudio function| initVideos function| initVideoScrolling function| resizeVideoPlayer function| removePlayerFromSidebar function| togglePrePostTime function| jumpSlide function| initVideoEvents function| URLToObj function| timedPopUpCount function| initAutoPopups function| initAJAXpopups function| checkClassicPopupPrequalErrors function| submitPopupAction function| saveToMyJobs function| initEmailSubscriptionsValidation function| emailSubscriptionsUncheckAll function| showPopupOnDemand function| sendAssetEmail function| displayChallengeText function| runStrikesOnMKTLeadIdentification function| mediaMetadataNavigation number| width function| isMobile boolean| isDesktop function| addClassToMenuItem function| addClassToDropDown function| removeClassFromMenuItem function| removeClassFromDropDown function| clearDropDowns function| showDropDown function| hideDropDown function| showDropDown2 function| hideDropDown2 string| disqus_shortname string| disqus_url object| _ml object| st object| __stdos__ boolean| tpcCookiesEnabledStatus function| __sharethis__docReady object| __sharethis__ object| ua_fields string| _bizo_data_partner_id string| _linkedin_partner_id object| _linkedin_data_partner_ids function| lintrk object| _6si number| top_banner_display_interval object| jQBrowser boolean| doresize object| scroll_pos string| url function| mktoMunchkinFunction object| Munchkin function| mktoMunchkin object| DISQUS object| ggeac object| google_tag_data object| google_js_reporting_queue object| google_tag_manager object| MunchkinTracker function| processEpsilonData string| epsilonName boolean| enabled function| callback number| version function| clarity boolean| _already_called_lintrk object| ORIBILI object| google_reactive_ads_global_state number| google_unique_id boolean| _storagePopulated function| onYouTubeIframeAPIReady object| gaGlobal object| ensBootstraps object| Bootstrapper object| GoogleGcLKhOms function| showSearch function| hideSearch object| google_image_requests

23 Cookies

Domain/Path Name / Value
.links.ismgcorp.com/ Name: __cf_bm
Value: hKIKhduBffPg7p3AyWvssDo4AEBjDkoAYgfA_K9cY40-1731317213-1.0.1.1-1m8O9tURns1dCAMWJ0MSSAPafiDW1q4MEEEiMXkkMFCkF1wqWXobBN20d5BjmqkIqdZEs_lVlNDOnmJGwpsNew
www.databreachtoday.com/ Name: PHPSESSID
Value: a8ob13ira8jlieupflnnuuvucp
www.databreachtoday.com/ Name: _advert
Value: false
www.databreachtoday.com/ Name: visitorip
Value: 10.187.187.9
.databreachtoday.com/ Name: _mkto_trk
Value: id:051-ZXI-237&token:_mch-databreachtoday.com-1731317217007-96064
www.databreachtoday.com/ Name: _gd_visitor
Value: 2ce20ce2-b3aa-4e36-8ed5-67be431fd4b2
www.databreachtoday.com/ Name: _gd_session
Value: ba8c746b-71c4-4aa2-8c13-372387c4f08d
.databreachtoday.com/ Name: _ga
Value: GA1.1.1035659389.1731317217
.databreachtoday.com/ Name: _ga_P0BJ2JRM5Y
Value: GS1.1.1731317217.1.0.1731317217.0.0.0
www.databreachtoday.com/ Name: 57942
Value:
www.databreachtoday.com/ Name: 58312
Value:
www.databreachtoday.com/ Name: 58313
Value:
www.databreachtoday.com/ Name: 59942
Value:
www.databreachtoday.com/ Name: 57928
Value:
www.databreachtoday.com/ Name: 58306
Value:
www.databreachtoday.com/ Name: 59941
Value:
www.databreachtoday.com/ Name: 57927
Value:
www.databreachtoday.com/ Name: 57941
Value:
www.databreachtoday.com/ Name: 58305
Value:
.linkedin.com/ Name: lidc
Value: "b=VGST09:s=V:r=V:a=V:p=V:g=3039:u=1:x=1:i=1731317217:t=1731403617:v=2:sig=AQEV4dBYMVR5Wlae5pmfWSpZPPHndWf5"
.linkedin.com/ Name: bcookie
Value: "v=2&74392538-e775-4a96-85c4-6a83b38bfc0e"
.linkedin.com/ Name: li_gc
Value: MTswOzE3MzEzMTcyMTc7MjswMjEg5ZLotVxamT7dlKyD//yxZ1Ew+hsWmWAB8Cvvvct0sg==
.databreachtoday.com/ Name: _ga_XJ8Q4QGGRH
Value: GS1.1.1731317217.1.0.1731317217.0.0.0

19 Console Messages

Source Level URL
Text
recommendation warning URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Message:
[DOM] Found 2 elements with non-unique id #asset_url: (More info: https://goo.gl/9p2vKq) %o %o
recommendation warning URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Message:
[DOM] Found 2 elements with non-unique id #chk_stp1-1: (More info: https://goo.gl/9p2vKq) %o %o
recommendation warning URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Message:
[DOM] Found 2 elements with non-unique id #chk_stp1-2: (More info: https://goo.gl/9p2vKq) %o %o
recommendation warning URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Message:
[DOM] Found 2 elements with non-unique id #chk_stp1-3: (More info: https://goo.gl/9p2vKq) %o %o
recommendation warning URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Message:
[DOM] Found 2 elements with non-unique id #newsletter-pop-under-txt-other-job-function: (More info: https://goo.gl/9p2vKq) %o %o
recommendation warning URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Message:
[DOM] Found 2 elements with non-unique id #newsletter-pop-under-txt-other-title-level: (More info: https://goo.gl/9p2vKq) %o %o
recommendation warning URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Message:
[DOM] Found 2 elements with non-unique id #pop_CAIS_enews1: (More info: https://goo.gl/9p2vKq) %o %o
recommendation warning URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Message:
[DOM] Found 2 elements with non-unique id #pop_DBT_enews1: (More info: https://goo.gl/9p2vKq) %o %o
recommendation warning URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Message:
[DOM] Found 2 elements with non-unique id #pop_IR_enews1: (More info: https://goo.gl/9p2vKq) %o %o
recommendation warning URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Message:
[DOM] Found 2 elements with non-unique id #registration-select-country: (More info: https://goo.gl/9p2vKq) %o %o
recommendation warning URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Message:
[DOM] Found 3 elements with non-unique id #registration-select-job-function: (More info: https://goo.gl/9p2vKq) %o %o %o
recommendation warning URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Message:
[DOM] Found 3 elements with non-unique id #registration-select-title-level: (More info: https://goo.gl/9p2vKq) %o %o %o
recommendation warning URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Message:
[DOM] Found 3 elements with non-unique id #registration-text-phone: (More info: https://goo.gl/9p2vKq) %o %o %o
recommendation warning URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Message:
[DOM] Found 2 elements with non-unique id #registration-txt-company: (More info: https://goo.gl/9p2vKq) %o %o
recommendation warning URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Message:
[DOM] Found 2 elements with non-unique id #registration-txt-email: (More info: https://goo.gl/9p2vKq) %o %o
recommendation warning URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Message:
[DOM] Found 3 elements with non-unique id #request-share-txt-email: (More info: https://goo.gl/9p2vKq) %o %o %o
recommendation warning URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Message:
[DOM] Found 3 elements with non-unique id #request-share-txt-first-name: (More info: https://goo.gl/9p2vKq) %o %o %o
recommendation verbose URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "current-password"): (More info: https://goo.gl/9p2vKq) %o
recommendation verbose URL: https://www.databreachtoday.com/chinese-hackers-use-quad7-botnet-for-credential-theft-a-26709?rf=2024-11-04_ENEWS_ACQ_DBT__Slot3_ART26709&mkt_tok=MDUxLVpYSS0yMzcAAAGWlwzHJSHze6NziWIBIAidwaKvqG71Aw4u_ATaKWpYPThRBDzvlefXTsVyi7c-LqM9z3dt1wGedNR4OW00_Ln-HY02z-5BA3VL5dV3sklzOrjcafYyog
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "current-password"): (More info: https://goo.gl/9p2vKq) %o

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src 'self'; img-src 'self';script-src 'self' 'sha256-21+fkPNAehMLUvrwtwCXhliopOjls9tj34/w5NOZqQs=';object-src 'none';form-action 'none';frame-src 'none';style-src 'self'
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com
051-zxi-237.mktoresp.com
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com
9709a20d219a1608138fbdc6c139f766.safeframe.googlesyndication.com
b.6sc.co
bankinfosecurity.disqus.com
buttons-config.sharethis.com
c.6sc.co
d1eoo1tco6rr5e.cloudfront.net
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com
disqus.com
eps.6sc.co
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com
fonts.googleapis.com
fonts.gstatic.com
in.ml314.com
insight.adsrvr.org
ipv6.6sc.co
j.6sc.co
l.sharethis.com
links.ismgcorp.com
ml314.com
munchkin.marketo.net
nexus.ensighten.com
pagead2.googlesyndication.com
platform-api.sharethis.com
platform-cdn.sharethis.com
px.ads.linkedin.com
px4.ads.linkedin.com
region1.google-analytics.com
s.clarity.ms
securepubads.g.doubleclick.net
sjs.bizographics.com
snap.licdn.com
tpc.googlesyndication.com
worker.ismgcorp.com
www.clarity.ms
www.databreachtoday.com
www.googletagmanager.com
www.googletagservices.com
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
pagead2.googlesyndication.com
104.130.251.6
104.17.74.206
13.107.42.14
13.225.83.200
142.250.186.99
142.250.74.194
151.101.192.134
172.217.18.2
192.28.147.68
199.232.196.134
2001:4860:4802:34::36
23.199.214.136
23.209.23.77
23.53.43.58
23.96.124.68
2600:9000:206f:2600:2:8f43:5780:93a1
2600:9000:206f:3600:c:abe:f440:93a1
2600:9000:2156:5800:1d:85c3:6640:93a1
2620:1ec:21::14
2620:1ec:29:1::45
2a00:1450:4001:802::200a
2a00:1450:4001:80f::2001
2a00:1450:4001:810::2008
2a00:1450:4001:813::2002
2a00:1450:4001:82b::2001
2a02:26f0:3500:10::210:a9a
2a02:26f0:ab00::214:8e41
3.160.150.71
3.219.124.110
34.117.77.79
35.156.183.132
35.71.131.137
50.56.167.254
99.83.231.3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