Submitted URL: https://click.email.sans.org/?qs=ce5f2a3aaa0e6fc08e5f3cb17dda05afdb66ffa741f3c6c6da909190b43ba6ea292e2b5056670eb7bf8bf2bbb776...
Effective URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-ko...
Submission: On November 05 via api from HK

Summary

This website contacted 78 IPs in 8 countries across 64 domains to perform 237 HTTP transactions. The main IP is 50.31.169.131, located in Elk Grove Village, United States and belongs to SERVERCENTRAL - Server Central Network, US. The main domain is arstechnica.com.
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on January 16th 2019. Valid for: 2 years.
This is the only time arstechnica.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 136.147.189.155 22606 (EXACT-7)
2 50.31.169.131 23352 (SERVERCEN...)
18 205.234.175.175 30081 (CACHENETW...)
3 2a00:1450:400... 15169 (GOOGLE)
3 13.224.199.29 16509 (AMAZON-02)
4 2.18.234.21 16625 (AKAMAI-AS)
11 2.18.235.40 16625 (AKAMAI-AS)
1 13.225.78.4 16509 (AMAZON-02)
3 13.224.196.51 16509 (AMAZON-02)
2 2606:4700::68... 13335 (CLOUDFLAR...)
3 151.139.128.10 20446 (HIGHWINDS3)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
7 172.217.23.98 15169 (GOOGLE)
2 2.18.234.190 16625 (AKAMAI-AS)
2 3.220.246.137 14618 (AMAZON-AES)
1 143.204.98.108 16509 (AMAZON-02)
1 52.19.1.241 16509 (AMAZON-02)
2 151.101.12.239 54113 (FASTLY)
1 3.10.47.75 16509 (AMAZON-02)
2 54.77.236.71 16509 (AMAZON-02)
4 2a00:1450:400... 15169 (GOOGLE)
1 91.228.74.146 27281 (QUANTCAST)
1 46.228.164.13 56396 (TURN)
3 2a03:2880:f01... 32934 (FACEBOOK)
1 151.101.12.157 54113 (FASTLY)
1 13.225.78.106 16509 (AMAZON-02)
1 35.190.92.63 15169 (GOOGLE)
1 35.165.247.37 16509 (AMAZON-02)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
3 52.1.219.33 14618 (AMAZON-AES)
1 143.204.101.45 16509 (AMAZON-02)
2 152.195.132.202 15133 (EDGECAST)
1 2 172.227.124.249 20940 (AKAMAI-ASN1)
2 4 35.227.248.159 15169 (GOOGLE)
3 2a00:1450:400... 15169 (GOOGLE)
1 2 35.190.59.101 15169 (GOOGLE)
2 35.201.67.47 15169 (GOOGLE)
8 2606:2800:234... 15133 (EDGECAST)
1 34.240.143.140 16509 (AMAZON-02)
1 63.140.41.50 15224 (OMNITURE)
1 1 66.117.28.86 15224 (OMNITURE)
1 178.250.0.130 44788 (ASN-CRITE...)
1 2 52.48.158.117 16509 (AMAZON-02)
1 2600:9000:200... 16509 (AMAZON-02)
10 52.206.158.200 14618 (AMAZON-AES)
5 2606:4700::68... 13335 (CLOUDFLAR...)
7 2.18.232.28 16625 (AKAMAI-AS)
1 2a00:1450:400... 15169 (GOOGLE)
1 2 2a05:f500:11:... 14413 (LINKEDIN)
1 1 2a05:f500:11:... 14413 (LINKEDIN)
1 2600:9000:21f... 16509 (AMAZON-02)
6 10 152.199.21.89 15133 (EDGECAST)
2 69.173.144.143 26667 (RUBICONPR...)
2 2a03:2880:f11... 32934 (FACEBOOK)
1 104.244.42.133 13414 (TWITTER)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2606:4700::68... 13335 (CLOUDFLAR...)
2 91.228.74.147 27281 (QUANTCAST)
2 3.225.242.81 14618 (AMAZON-AES)
2 3.209.40.151 14618 (AMAZON-AES)
2 35.186.226.184 15169 (GOOGLE)
4 104.17.193.78 13335 (CLOUDFLAR...)
1 2606:4700::68... 13335 (CLOUDFLAR...)
21 52.222.168.189 16509 (AMAZON-02)
2 3 104.244.42.136 13414 (TWITTER)
1 2606:2800:134... 15133 (EDGECAST)
1 2606:4700:10:... 13335 (CLOUDFLAR...)
1 34.210.147.177 16509 (AMAZON-02)
2 2 185.33.223.197 29990 (ASN-APPNEXUS)
4 35.167.98.6 16509 (AMAZON-02)
1 1 172.217.23.162 15169 (GOOGLE)
2 2 18.195.155.181 16509 (AMAZON-02)
1 1 37.252.173.62 29990 (ASN-APPNEXUS)
1 151.101.114.2 54113 (FASTLY)
3 2a00:1450:400... 15169 (GOOGLE)
3 52.222.168.123 16509 (AMAZON-02)
1 52.71.111.112 14618 (AMAZON-AES)
1 64.74.236.127 22075 (AS-OUTBRAIN)
1 2a00:1450:400... 15169 (GOOGLE)
3 143.204.101.76 16509 (AMAZON-02)
2 2606:2800:134... 15133 (EDGECAST)
1 172.217.16.130 15169 (GOOGLE)
237 78
Apex Domain
Subdomains
Transfer
28 cloudfront.net
d1z2jf7jlzjs58.cloudfront.net
dwgyu36up6iuz.cloudfront.net
d2c8v52ll5s99u.cloudfront.net
dp8hsntg6do36.cloudfront.net Failed
1 MB
18 arstechnica.net
cdn.arstechnica.net
691 KB
16 condenastdigital.com
pixel.condenastdigital.com
capture.condenastdigital.com
infinityid.condenastdigital.com
4d.condenastdigital.com
wren.condenastdigital.com Failed
20 KB
12 moatads.com
z.moatads.com
mb.moatads.com
px.moatads.com
264 KB
11 twitter.com
platform.twitter.com
syndication.twitter.com
107 KB
10 advertising.com
adserver-us.adtech.advertising.com
6 KB
10 doubleclick.net
securepubads.g.doubleclick.net
stats.g.doubleclick.net
cm.g.doubleclick.net
pubads.g.doubleclick.net
102 KB
7 outbrainimg.com
tcheck.outbrainimg.com
log.outbrainimg.com Failed
images.outbrainimg.com
56 KB
7 skimresources.com
s.skimresources.com
r.skimresources.com
p.skimresources.com
t.skimresources.com
17 KB
6 ad.gt
a.ad.gt
p.ad.gt
ids.ad.gt
12 KB
5 polarcdn-terrax.com
polarcdn-terrax.com
12 KB
5 cnevids.com
player.cnevids.com
api.cnevids.com
61 KB
4 polarcdn-pentos.com
polarcdn-pentos.com
929 B
4 tapad.com
pixel.tapad.com
1 KB
4 outbrain.com
widgets.outbrain.com
odb.outbrain.com
mcdp-chidc2.outbrain.com
47 KB
4 google.com
adservice.google.com
ampcid.google.com
www.google.com
714 B
3 googleapis.com
imasdk.googleapis.com
119 KB
3 adnxs.com
secure.adnxs.com
ib.adnxs.com
3 KB
3 twimg.com
cdn.syndication.twimg.com
pbs.twimg.com
24 KB
3 linkedin.com
px.ads.linkedin.com
www.linkedin.com
1 KB
3 googlesyndication.com
tpc.googlesyndication.com
3 medtargetsystem.com
www.medtargetsystem.com
39 KB
3 facebook.net
connect.facebook.net
109 KB
3 quantserve.com
secure.quantserve.com
pixel.quantserve.com
6 KB
3 google-analytics.com
www.google-analytics.com
18 KB
3 demdex.net
dpm.demdex.net
condenast.demdex.net
3 KB
3 google.de
adservice.google.de
ampcid.google.de
www.google.de
391 B
3 amazon-adsystem.com
c.amazon-adsystem.com
29 KB
3 googletagservices.com
www.googletagservices.com
73 KB
3 arstechnica.com
arstechnica.com
sstats.arstechnica.com
15 KB
2 emxdgt.com
cs.emxdgt.com
457 B
2 snapchat.com
tr.snapchat.com
2 facebook.com
www.facebook.com
234 B
2 rubiconproject.com
fastlane.rubiconproject.com
3 KB
2 casalemedia.com
as-sec.casalemedia.com Failed
678 B
2 adsrvr.org
match.adsrvr.org
1014 B
2 scorecardresearch.com
sb.scorecardresearch.com
1 KB
2 cookielaw.org
cdn.cookielaw.org
93 KB
2 mediavoice.com
cdn.mediavoice.com
plugin.mediavoice.com
125 KB
2 actionbutton.co
embed.actionbutton.co
prod-native.actionbutton.co
17 KB
2 indexww.com
js-sec.indexww.com
33 KB
1 2mdn.net
s0.2mdn.net
10 KB
1 deepintent.com
match.deepintent.com
230 B
1 onetrust.com
geolocation.onetrust.com
319 B
1 plrsrvcs.com
bw-prod.plrsrvcs.com
2 KB
1 polarcdn.com
static.polarcdn.com
118 KB
1 t.co
t.co
448 B
1 quantcount.com
rules.quantcount.com
2 KB
1 criteo.net
static.criteo.net
27 KB
1 everesttech.net
cm.everesttech.net
527 B
1 sc-static.net
sc-static.net
6 KB
1 licdn.com
snap.licdn.com
2 KB
1 bounceexchange.com
tag.bounceexchange.com
assets.bounceexchange.com Failed
3 KB
1 sail-horizon.com
ak.sail-horizon.com
43 KB
1 ads-twitter.com
static.ads-twitter.com
2 KB
1 turn.com
d.turn.com
698 B
1 zqtk.net
segment-data.zqtk.net
1 KB
1 googletagmanager.com
www.googletagmanager.com
66 KB
1 sans.org
click.email.sans.org
299 B
0 rfihub.com Failed
p.rfihub.com Failed
0 consensu.org Failed
api.skimlinks.mgr.consensu.org Failed
0 parsely.com Failed
srv-2019-11-05-03.config.parsely.com Failed
0 rkdms.com Failed
mid.rkdms.com Failed
0 rlcdn.com Failed
api.rlcdn.com Failed
237 64
Domain Requested by
21 dwgyu36up6iuz.cloudfront.net arstechnica.com
d2c8v52ll5s99u.cloudfront.net
18 cdn.arstechnica.net arstechnica.com
cdn.arstechnica.net
10 adserver-us.adtech.advertising.com 6 redirects arstechnica.com
10 capture.condenastdigital.com arstechnica.com
8 platform.twitter.com cdn.arstechnica.net
platform.twitter.com
8 px.moatads.com arstechnica.com
7 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
arstechnica.com
6 images.outbrainimg.com arstechnica.com
5 polarcdn-terrax.com cdn.mediavoice.com
plugin.mediavoice.com
static.polarcdn.com
arstechnica.com
4 ids.ad.gt arstechnica.com
4 polarcdn-pentos.com static.polarcdn.com
4 pixel.tapad.com 2 redirects arstechnica.com
3 dp8hsntg6do36.cloudfront.net arstechnica.com
d2c8v52ll5s99u.cloudfront.net
3 d2c8v52ll5s99u.cloudfront.net player.cnevids.com
imasdk.googleapis.com
d2c8v52ll5s99u.cloudfront.net
3 imasdk.googleapis.com player.cnevids.com
imasdk.googleapis.com
3 syndication.twitter.com 2 redirects arstechnica.com
3 tpc.googlesyndication.com securepubads.g.doubleclick.net
3 www.medtargetsystem.com arstechnica.com
www.medtargetsystem.com
3 connect.facebook.net arstechnica.com
connect.facebook.net
d2c8v52ll5s99u.cloudfront.net
3 www.google-analytics.com www.googletagmanager.com
www.google-analytics.com
arstechnica.com
3 player.cnevids.com arstechnica.com
cdn.arstechnica.net
player.cnevids.com
3 z.moatads.com arstechnica.com
securepubads.g.doubleclick.net
d2c8v52ll5s99u.cloudfront.net
3 c.amazon-adsystem.com arstechnica.com
c.amazon-adsystem.com
3 www.googletagservices.com arstechnica.com
securepubads.g.doubleclick.net
2 pbs.twimg.com arstechnica.com
2 cs.emxdgt.com 2 redirects
2 secure.adnxs.com 2 redirects
2 tr.snapchat.com sc-static.net
2 4d.condenastdigital.com pixel.condenastdigital.com
2 infinityid.condenastdigital.com pixel.condenastdigital.com
d2c8v52ll5s99u.cloudfront.net
2 pixel.quantserve.com arstechnica.com
2 www.facebook.com arstechnica.com
connect.facebook.net
2 fastlane.rubiconproject.com js-sec.indexww.com
2 as-sec.casalemedia.com js-sec.indexww.com
2 px.ads.linkedin.com 1 redirects arstechnica.com
2 match.adsrvr.org 1 redirects js-sec.indexww.com
2 t.skimresources.com arstechnica.com
s.skimresources.com
2 p.skimresources.com arstechnica.com
2 r.skimresources.com 1 redirects arstechnica.com
2 sb.scorecardresearch.com 1 redirects arstechnica.com
2 cdn.cookielaw.org www.googletagmanager.com
cdn.cookielaw.org
2 dpm.demdex.net arstechnica.com
2 pixel.condenastdigital.com arstechnica.com
2 api.cnevids.com cdn.arstechnica.net
2 widgets.outbrain.com cdn.arstechnica.net
widgets.outbrain.com
2 adservice.google.com www.googletagservices.com
imasdk.googleapis.com
2 js-sec.indexww.com arstechnica.com
2 arstechnica.com cdn.arstechnica.net
1 pubads.g.doubleclick.net d2c8v52ll5s99u.cloudfront.net
1 s0.2mdn.net imasdk.googleapis.com
1 mcdp-chidc2.outbrain.com widgets.outbrain.com
1 match.deepintent.com arstechnica.com
1 odb.outbrain.com widgets.outbrain.com
1 ib.adnxs.com 1 redirects
1 cm.g.doubleclick.net 1 redirects
1 p.ad.gt a.ad.gt
1 geolocation.onetrust.com cdn.cookielaw.org
1 cdn.syndication.twimg.com platform.twitter.com
1 bw-prod.plrsrvcs.com static.polarcdn.com
1 static.polarcdn.com securepubads.g.doubleclick.net
1 www.google.de arstechnica.com
1 www.google.com 1 redirects
1 stats.g.doubleclick.net 1 redirects
1 t.co arstechnica.com
1 rules.quantcount.com secure.quantserve.com
1 www.linkedin.com 1 redirects
1 ampcid.google.de www.google-analytics.com
1 tcheck.outbrainimg.com widgets.outbrain.com
1 ampcid.google.com www.google-analytics.com
1 plugin.mediavoice.com cdn.mediavoice.com
1 prod-native.actionbutton.co embed.actionbutton.co
1 static.criteo.net js-sec.indexww.com
1 cm.everesttech.net 1 redirects
1 sstats.arstechnica.com arstechnica.com
1 condenast.demdex.net arstechnica.com
1 sc-static.net arstechnica.com
1 snap.licdn.com arstechnica.com
1 a.ad.gt www.googletagmanager.com
1 tag.bounceexchange.com arstechnica.com
1 ak.sail-horizon.com www.googletagmanager.com
1 static.ads-twitter.com www.googletagmanager.com
1 d.turn.com arstechnica.com
1 secure.quantserve.com www.googletagmanager.com
1 mb.moatads.com z.moatads.com
1 segment-data.zqtk.net arstechnica.com
1 d1z2jf7jlzjs58.cloudfront.net arstechnica.com
1 adservice.google.de www.googletagservices.com
1 www.googletagmanager.com arstechnica.com
1 s.skimresources.com arstechnica.com
1 cdn.mediavoice.com arstechnica.com
1 embed.actionbutton.co arstechnica.com
1 click.email.sans.org 1 redirects
0 wren.condenastdigital.com Failed cdn.arstechnica.net
0 p.rfihub.com Failed arstechnica.com
0 log.outbrainimg.com Failed widgets.outbrain.com
0 api.skimlinks.mgr.consensu.org Failed s.skimresources.com
0 srv-2019-11-05-03.config.parsely.com Failed d1z2jf7jlzjs58.cloudfront.net
0 assets.bounceexchange.com Failed tag.bounceexchange.com
0 mid.rkdms.com Failed js-sec.indexww.com
0 api.rlcdn.com Failed js-sec.indexww.com
237 100

This site contains no links.

Subject Issuer Validity Valid
*.arstechnica.com
Sectigo RSA Domain Validation Secure Server CA
2019-01-16 -
2021-01-15
2 years crt.sh
*.cachefly.net
GlobalSign RSA OV SSL CA 2018
2019-11-01 -
2021-10-29
2 years crt.sh
*.g.doubleclick.net
GTS CA 1O1
2019-10-22 -
2020-01-14
3 months crt.sh
c.amazon-adsystem.com
Amazon
2019-10-07 -
2020-09-29
a year crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2019-07-17 -
2020-03-09
8 months crt.sh
moatads.com
DigiCert ECC Secure Server CA
2018-11-10 -
2020-02-09
a year crt.sh
*.actionbutton.co
Go Daddy Secure Certificate Authority - G2
2019-06-25 -
2020-06-27
a year crt.sh
*.cnevids.com
Trusted Secure Certificate Authority 5
2017-01-10 -
2020-01-10
3 years crt.sh
ssl962336.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-01-25 -
2019-12-11
a year crt.sh
*.skimresources.com
DigiCert SHA2 Secure Server CA
2018-09-13 -
2020-10-07
2 years crt.sh
*.google-analytics.com
GTS CA 1O1
2019-10-10 -
2020-01-02
3 months crt.sh
*.google.com
GTS CA 1O1
2019-10-22 -
2020-01-14
3 months crt.sh
*.outbrain.com
DigiCert SHA2 Secure Server CA
2018-12-14 -
2020-03-14
a year crt.sh
*.cloudfront.net
DigiCert Global CA G2
2019-07-17 -
2020-07-05
a year crt.sh
*.zqtk.net
COMODO RSA Domain Validation Secure Server CA
2018-08-09 -
2020-08-24
2 years crt.sh
condenast.com
GlobalSign CloudSSL CA - SHA256 - G3
2019-10-31 -
2020-08-07
9 months crt.sh
*.moatads.com
DigiCert SHA2 Secure Server CA
2019-03-12 -
2021-06-10
2 years crt.sh
*.demdex.net
DigiCert SHA2 High Assurance Server CA
2018-01-09 -
2021-02-12
3 years crt.sh
*.quantserve.com
DigiCert SHA2 High Assurance Server CA
2019-10-04 -
2020-10-07
a year crt.sh
*.turn.com
DigiCert SHA2 Secure Server CA
2019-01-25 -
2020-03-31
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-09-22 -
2019-12-20
3 months crt.sh
ads-twitter.com
DigiCert SHA2 High Assurance Server CA
2019-08-14 -
2020-08-18
a year crt.sh
ak.sail-horizon.com
Amazon
2019-03-06 -
2020-04-06
a year crt.sh
tag.bounceexchange.com
Let's Encrypt Authority X3
2019-10-25 -
2020-01-23
3 months crt.sh
*.ad.gt
Amazon
2019-07-06 -
2020-08-06
a year crt.sh
*.licdn.com
DigiCert SHA2 Secure Server CA
2019-04-01 -
2021-05-07
2 years crt.sh
medtargetsystem.com
Amazon
2018-11-23 -
2019-12-23
a year crt.sh
sc-static.net
DigiCert SHA2 Secure Server CA
2019-03-11 -
2021-03-15
2 years crt.sh
sa437gl.wpc.edgecastcdn.net
DigiCert SHA2 Secure Server CA
2018-05-17 -
2020-08-19
2 years crt.sh
*.scorecardresearch.com
COMODO RSA Organization Validation Secure Server CA
2018-11-28 -
2019-12-26
a year crt.sh
*.tapad.com
DigiCert SHA2 Secure Server CA
2019-11-02 -
2020-11-06
a year crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2019-10-10 -
2020-01-02
3 months crt.sh
*.twimg.com
DigiCert SHA2 High Assurance Server CA
2018-11-19 -
2019-11-27
a year crt.sh
sstats.arstechnica.com
DigiCert SHA2 High Assurance Server CA
2019-03-03 -
2020-06-05
a year crt.sh
*.criteo.net
DigiCert ECC Secure Server CA
2019-03-26 -
2020-03-30
a year crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2019-03-07 -
2021-04-19
2 years crt.sh
ssl446800.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-09-13 -
2020-03-21
6 months crt.sh
*.outbrainimg.com
DigiCert SHA2 Secure Server CA
2019-02-24 -
2020-05-25
a year crt.sh
px.ads.linkedin.com
DigiCert SHA2 Secure Server CA
2019-05-29 -
2021-06-29
2 years crt.sh
*.adtech.advertising.com
DigiCert SHA2 High Assurance Server CA
2018-05-22 -
2020-05-26
2 years crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2019-01-10 -
2021-01-14
2 years crt.sh
t.co
DigiCert SHA2 High Assurance Server CA
2019-04-09 -
2020-04-01
a year crt.sh
www.google.de
GTS CA 1O1
2019-10-10 -
2020-01-02
3 months crt.sh
ssl962736.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-12-19 -
2019-12-11
a year crt.sh
*.conde.io
Amazon
2019-06-03 -
2020-07-03
a year crt.sh
tr.snapchat.com
DigiCert SHA2 Secure Server CA
2019-02-19 -
2021-02-23
2 years crt.sh
ssl887612.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-08-29 -
2020-03-06
6 months crt.sh
ssl880796.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-07-31 -
2020-02-06
6 months crt.sh
syndication.twitter.com
DigiCert SHA2 High Assurance Server CA
2019-04-09 -
2020-04-01
a year crt.sh
*.onetrust.com
DigiCert SHA2 Secure Server CA
2018-03-12 -
2020-06-14
2 years crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-07-30 -
2020-07-25
a year crt.sh
*.googleapis.com
GTS CA 1O1
2019-10-10 -
2020-01-02
3 months crt.sh
*.deepintent.com
Go Daddy Secure Certificate Authority - G2
2018-06-08 -
2020-06-08
2 years crt.sh
*.doubleclick.net
GTS CA 1O1
2019-10-10 -
2020-01-02
3 months crt.sh

This page contains 20 frames:

Primary Page: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Frame ID: DF467D1D74C8FC3E46E6A849E40D70B6
Requests: 203 HTTP requests in this frame

Frame: https://js-sec.indexww.com/um/ixmatch.html
Frame ID: 4255444D0AF0DCD586DBF7F88D2EE44D
Requests: 1 HTTP requests in this frame

Frame: https://t.skimresources.com/api/v2/robots.txt?__skimjs_preflight__please_ignore__=true&rnd=0.0423253775942356
Frame ID: 8572255B1DC9593B698775661ABE6AC9
Requests: 1 HTTP requests in this frame

Frame: https://condenast.demdex.net/dest5.html?d_nsid=0
Frame ID: 0EAB84C3455BA34788B94BF0E95E7CC4
Requests: 1 HTTP requests in this frame

Frame: https://prod-native.actionbutton.co/?isNativeEmbed=true&712cf4cf-abf8-4395-8d78-0c8db16a217d
Frame ID: 6BA8D3C7FED0198A804DF39FD841923B
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/widget_iframe.2d991e3dfc9abb2549972ce8b64c5d85.html?origin=https%3A%2F%2Farstechnica.com
Frame ID: 8535F921C815355B7057B2EC577180FF
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjst9vvuSgQVLNQNeeLsltqFJCUGx1c-W4PM-WO7uHSc6Qz5NuSplyM2dSm1B6SzYcnskjxhsRtBPRVCWbXqTxVHvZixTh7Ic9d6YuRp3_jqPeImA8QNx4XeeErjNWXseeUapep0A2RqjA3NNAiXNo3OoPDzlrTDAWxZAr1E-uCIm1Rw98JdE65zFrzFMczEiQBh1j5_h9lkyGQZhjxyswPyt3IcfHnPaIwRunPw7xBkQc3s3ZBmHY0IRY4mJpKXrfpSR11HhaUTEFVxsKA3Tj6-nZjop&sig=Cg0ArKJSzCHDnvoDBS5TEAE&urlfix=1&adurl=
Frame ID: B534FB35A39F49E3579249358B4235B3
Requests: 11 HTTP requests in this frame

Frame: https://polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/
Frame ID: F5C1D7C03D0C774C7CA9F508B61F331A
Requests: 1 HTTP requests in this frame

Frame: https://tr.snapchat.com/cm/i
Frame ID: 492FC3E23E7D5DC9CC534A01A0B97C7B
Requests: 1 HTTP requests in this frame

Frame: https://tr.snapchat.com/p
Frame ID: 1BA1B568A3C73DAFBF9993A17F06901A
Requests: 1 HTTP requests in this frame

Frame: https://polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/
Frame ID: E76C7A2A04C7602BA296F4A58CD44AA9
Requests: 1 HTTP requests in this frame

Frame: https://www.medtargetsystem.com/beacon/portal/?_url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&_sid=8c6a64f3-434a-41e9-a29f-eb0e717434ea&_vid=208d0682-7f05-4e51-bbbf-b2edf2fea976&_ak=119-556-B0E9F642&_flash=false&_th=1572924850|1572924850|1
Frame ID: D198E049FB2E577A0D9AACAA6200ABF4
Requests: 1 HTTP requests in this frame

Frame: https://www.facebook.com/tr/
Frame ID: 50C5C011FE9FAC8377D4A2B4D5F970F8
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: 1AC412DBA683126BE1097A86C3CAB435
Requests: 27 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-36/html/container.html
Frame ID: 17AD49C3B640D54512F76F603A827313
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-36/html/container.html
Frame ID: 7F597162EB230BB5FD5B78DD5F9BFE0D
Requests: 1 HTTP requests in this frame

Frame: https://widgets.outbrain.com/widgetOBUserSync/obUserSync.html
Frame ID: 501640EF05A230C53EDD8DE5C0239D1C
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.347.1_en.html
Frame ID: 7677E9E67175E57307FFBC6EDEFE410C
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/jot.html
Frame ID: 9B721B7CAA8DA3E64CD48150FA414E67
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/jot.html
Frame ID: A25DC7E375A99C1B09C7E073A95B5C5C
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://click.email.sans.org/?qs=ce5f2a3aaa0e6fc08e5f3cb17dda05afdb66ffa741f3c6c6da909190b43ba6ea292e2b50... HTTP 302
    https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

237
Requests

88 %
HTTPS

31 %
IPv6

64
Domains

100
Subdomains

78
IPs

8
Countries

3635 kB
Transfer

8588 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://click.email.sans.org/?qs=ce5f2a3aaa0e6fc08e5f3cb17dda05afdb66ffa741f3c6c6da909190b43ba6ea292e2b5056670eb7bf8bf2bbb776e54a2157594180388d6c HTTP 302
    https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 62
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035094&ns__t=1572924850091&ns_c=UTF-8&c8=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1572924850091&ns_c=UTF-8&c8=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&c9=
Request Chain 63
  • https://pixel.tapad.com/idsync/ex/receive?partner_id=ADB&partner_device_id=undefined HTTP 302
  • https://pixel.tapad.com/idsync/ex/receive/check?partner_id=ADB&partner_device_id=undefined
Request Chain 64
  • https://pixel.tapad.com/idsync/ex/receive?partner_id=648&partner_device_id=undefined HTTP 302
  • https://pixel.tapad.com/idsync/ex/receive/check?partner_id=648&partner_device_id=undefined
Request Chain 68
  • https://r.skimresources.com/api/ HTTP 307
  • https://r.skimresources.com/api/?xguid=01DRWT103RMAK1H6EDFE181Z4N&persistence=1&checksum=b235f42e8085430a29f5889296c9b6e1c6e1e80ba2d3a2fc3592c48a92a3436e
Request Chain 77
  • https://cm.everesttech.net/cm/dd?d_uuid=05877987866529151954602699737643304077 HTTP 302
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=XcDtsgAAFh7enxN_
Request Chain 94
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&time=1572924850416 HTTP 302
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D434737%26url%3Dhttps%253A%252F%252Farstechnica.com%252Finformation-technology%252F2019%252F10%252Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%252F%26time%3D1572924850416%26liSync%3Dtrue HTTP 302
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&time=1572924850416&liSync=true
Request Chain 99
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1572924850483;callback=window.headertag.AolHtb.adResponseCallbacks._9r3eTwsi; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1572924853;cmd=bid;cors=yes;v=2;misc=1572924850483;callback=window.headertag.AolHtb.adResponseCallbacks._9r3eTwsi HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1A237b8744-ff7d-11e9-8386-12358a211a00;cfp=1;rndc=1572924853;cmd=bid;cors=yes;v=2;misc=1572924850483;callback=window.headertag.AolHtb.adResponseCallbacks._9r3eTwsi
Request Chain 100
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1572924850483;callback=window.headertag.AolHtb.adResponseCallbacks._CPVxo1Wy; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1572924853;cmd=bid;cors=yes;v=2;misc=1572924850483;callback=window.headertag.AolHtb.adResponseCallbacks._CPVxo1Wy
Request Chain 105
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1572924850487;callback=window.headertag.AolHtb.adResponseCallbacks._IeiRQAIa; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1572924853;cmd=bid;cors=yes;v=2;misc=1572924850487;callback=window.headertag.AolHtb.adResponseCallbacks._IeiRQAIa HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1A235667d4-ff7d-11e9-aebd-12bf237d14d4;cfp=1;rndc=1572924853;cmd=bid;cors=yes;v=2;misc=1572924850487;callback=window.headertag.AolHtb.adResponseCallbacks._IeiRQAIa
Request Chain 106
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1572924850487;callback=window.headertag.AolHtb.adResponseCallbacks._dn2fHbLo; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1572924853;cmd=bid;cors=yes;v=2;misc=1572924850487;callback=window.headertag.AolHtb.adResponseCallbacks._dn2fHbLo
Request Chain 111
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j79&tid=UA-31997-1&cid=2042026595.1572924850&jid=1319062663&gjid=650177328&_gid=2138006251.1572924851&_u=aChAgUAjAAQC~&z=2021087775 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=2042026595.1572924850&jid=1319062663&_v=j79&z=2021087775 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=2042026595.1572924850&jid=1319062663&_v=j79&z=2021087775&slf_rd=1&random=3375553316
Request Chain 168
  • https://secure.adnxs.com/getuid?https://ids.ad.gt/api/v1/match?id=3770c5c8-e8d3-4d1f-b991-a6d9329552c8&adnxs_id=$UID HTTP 302
  • https://secure.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fmatch%3Fid%3D3770c5c8-e8d3-4d1f-b991-a6d9329552c8%26adnxs_id%3D%24UID HTTP 302
  • https://ids.ad.gt/api/v1/match?id=3770c5c8-e8d3-4d1f-b991-a6d9329552c8&adnxs_id=5098920238496472947
Request Chain 169
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=8gkxb6n&ttd_tpi=1&gpdr=0&ttd_puid=3770c5c8-e8d3-4d1f-b991-a6d9329552c8 HTTP 302
  • https://ids.ad.gt/api/v1/t_match?tdid=5780cc30-ee93-4947-a121-516e0e6f4c0c&id=3770c5c8-e8d3-4d1f-b991-a6d9329552c8
Request Chain 170
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3D3770c5c8-e8d3-4d1f-b991-a6d9329552c8 HTTP 302
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?ird=1&rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3D3770c5c8-e8d3-4d1f-b991-a6d9329552c8 HTTP 302
  • https://ids.ad.gt/api/v1/pbm_match?pbm=4A4C5D02-0557-4A07-A92A-EA63988A6036&id=3770c5c8-e8d3-4d1f-b991-a6d9329552c8
Request Chain 171
  • https://cm.g.doubleclick.net/pixel?google_nid=audigent_w_appnexus_3985&google_cm&google_sc&google_ula=450542624&id=3770c5c8-e8d3-4d1f-b991-a6d9329552c8 HTTP 302
  • https://ids.ad.gt/api/v1/g_match?id=3770c5c8-e8d3-4d1f-b991-a6d9329552c8&google_gid=CAESEKp4UOsWRwZH90ut1bvsZdk&google_cver=1&google_ula=450542624,0
Request Chain 172
  • https://cs.emxdgt.com/um?redirect=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Femx_match%3Femxid%3D%24UID%26id%3D3770c5c8-e8d3-4d1f-b991-a6d9329552c8 HTTP 302
  • https://ib.adnxs.com/getuid?https://cs.emxdgt.com/umcheck?apnxid=$UID&redirect=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Femx_match%3Femxid%3D%24EMXUID%26id%3D3770c5c8-e8d3-4d1f-b991-a6d9329552c8 HTTP 302
  • https://cs.emxdgt.com/umcheck?apnxid=5098920238496472947&redirect=https://ids.ad.gt/api/v1/emx_match?emxid=$EMXUID&id=3770c5c8-e8d3-4d1f-b991-a6d9329552c8 HTTP 302
  • https://ids.ad.gt/api/v1/emx_match?emxid=5098920238496472947brt35321572924852045373f1
Request Chain 235
  • https://syndication.twitter.com/i/jot HTTP 302
  • https://platform.twitter.com/jot.html
Request Chain 253
  • https://syndication.twitter.com/i/jot HTTP 302
  • https://platform.twitter.com/jot.html

237 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Redirect Chain
  • https://click.email.sans.org/?qs=ce5f2a3aaa0e6fc08e5f3cb17dda05afdb66ffa741f3c6c6da909190b43ba6ea292e2b5056670eb7bf8bf2bbb776e54a2157594180388d6c
  • https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
43 KB
14 KB
Document
General
Full URL
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.31.169.131 Elk Grove Village, United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
ge-11-2-1.ar10.ord6.us.scnet.net
Software
nginx /
Resource Hash
af00a76b84d3df0d736b4f2a9af2199160c8d561fd9ad3e1e98245158df95c1f
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
arstechnica.com
:scheme
https
:path
/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
sec-fetch-mode
navigate
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1

Response headers

status
200
server
nginx
date
Tue, 05 Nov 2019 03:34:08 GMT
content-type
text/html; charset=UTF-8
link
<https://arstechnica.com/wp-json/>; rel="https://api.w.org/"
strict-transport-security
max-age=300
x-content-type-options
nosniff
x-xss-protection
1; mode=block
x-frame-options
SAMEORIGIN
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
x-ars-server
web202
content-encoding
gzip

Redirect headers

Cache-Control
private
Content-Type
text/html; charset=utf-8
Location
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Date
Tue, 05 Nov 2019 03:34:07 GMT
Connection
close
Content-Length
241
main-af0123dfd5.css
cdn.arstechnica.net/wp-content/themes/ars/assets/css/
344 KB
72 KB
Stylesheet
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
3f5e07ec8bcc711b2a34aa1dfcc0d0637bf8050803243aa19d30fd43ad957c92

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:09 GMT
content-encoding
gzip
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
72883
x-cf-tsc
1572377178
x-cf2
H
last-modified
Tue, 29 Oct 2019 19:22:59 GMT
server
CFS 0215
x-cff
B
etag
W/"5db89193-5606b"
content-type
text/css
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Tue, 31 Dec 2019 03:34:09 GMT
gpt.js
www.googletagservices.com/tag/js/
49 KB
15 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
c4bbc03a9fcd94ea2941b59d5b4d7772cdc893ec3105c3390632fd12b56d303d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"327 / 382 of 1000 / last-modified: 1572905287"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
15503
x-xss-protection
0
expires
Tue, 05 Nov 2019 03:34:09 GMT
apstag.js
c.amazon-adsystem.com/aax2/
88 KB
26 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.199.29 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-199-29.fra2.r.cloudfront.net
Software
Server /
Resource Hash
1d578dc3367ffc480f6c230a912f72e3906d4438b5daaf1c319fd3b7a006cd3d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 04 Nov 2019 15:42:53 GMT
content-encoding
gzip
server
Server
age
42674
etag
4802c581ddff8a15b3e0b68c83bbce7b
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=86400
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
x-amz-cf-id
1He9fxFVRwysqb2sVr1gdw_gI6cf93tgZ29TVOepkHUjdHw8zhOdBg==
via
1.1 69f13f852a135432abb1b7bfc5a8b421.cloudfront.net (CloudFront)
183973-1558632223658.js
js-sec.indexww.com/ht/p/
115 KB
33 KB
Script
General
Full URL
https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
b08179fe75c1789bf7f893a2e283928dec028893b664e7cd4428a37367d0af6f

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:09 GMT
Content-Encoding
gzip
Last-Modified
Tue, 05 Nov 2019 03:00:16 GMT
Server
Apache
ETag
"904bcc-1cdc2-59690a1c0be03"
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=1587
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
text/javascript
Content-Length
33162
Expires
Tue, 05 Nov 2019 04:00:36 GMT
moatheader.js
z.moatads.com/condenastprebidheader987326845656/
187 KB
66 KB
Script
General
Full URL
https://z.moatads.com/condenastprebidheader987326845656/moatheader.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
0eb438ad4233f9cdadd2cf6e5e3544a29b1e693a03f45b0b9fa25e70f2675917

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:09 GMT
Content-Encoding
gzip
Last-Modified
Tue, 29 Oct 2019 23:07:10 GMT
Server
AmazonS3
x-amz-request-id
EE440658F867C214
ETag
"36eff026ea983609efb74e7f83fac3f5"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=55360
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
67412
x-amz-id-2
YL9ogPz0mWBFOZthev9AeEKdbJpmm9pcgfLlY/H6675TxLi7xe45e7mSRBFYKnwFlZgbaSnvgx4=
ars-technica.min.js
cdn.arstechnica.net/cns/
132 KB
43 KB
Script
General
Full URL
https://cdn.arstechnica.net/cns/ars-technica.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
a641143af073af304c2a59416f269a90f6c8520b63e60757b173a263efcf561a

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:09 GMT
content-encoding
gzip
x-cf3
H
x-amz-request-id
52E497B7141D1FFA
xkey-type
application/javascript
x-cf1
14961:fB.ams1:co:1571783178:cacheN.ams1-01:H
status
200
x-cache-hits
1
content-length
43652
x-amz-id-2
KsCNbO7mVwM+VnDYL1d7+Hhdock1YnBWlWqouTXHOqJQPwVylrqRqTdl9HBjD4WLxQW7+iKCWqc=
x-served-by
cache-mdw17327-MDW
cf4ttl
109.500
x-cf2
H
last-modified
Wed, 09 Oct 2019 18:53:23 GMT
server
CFS 0215
x-timer
S1571783181.075710,VS0,VE1
x-cff
B
etag
"fa8d177f3889042b037a66665872e42e"
vary
Accept-Encoding
x-amz-version-id
usAI1.ut.QN1olpdoALg05UaQkX9_kaz
access-control-allow-origin
*
cache-control
max-age=86400
cf4age
22
accept-ranges
bytes
content-type
application/javascript
x-cf-tsc
1571783191
expires
Wed, 06 Nov 2019 03:34:09 GMT
ars-bcfee6c82a.ads.us.js
cdn.arstechnica.net/wp-content/themes/ars/assets/js/
4 KB
2 KB
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/ars-bcfee6c82a.ads.us.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
032027ea92b8b014594b64b514f922a12029c27c3dc27e5c11b09eabfaf810c3

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:09 GMT
content-encoding
gzip
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1565891941:cacheN.ams1-01:H
status
200
content-length
1415
x-cf-tsc
1572377905
x-cf2
H
last-modified
Tue, 29 Oct 2019 19:37:29 GMT
server
CFS 0215
x-cff
B
etag
W/"5db894f9-e66"
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Tue, 31 Dec 2019 03:34:09 GMT
The_Kudankulam_Nuclear_Power_Plant_KKNPP-800x506.jpg
cdn.arstechnica.net/wp-content/uploads/2019/10/
57 KB
58 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2019/10/The_Kudankulam_Nuclear_Power_Plant_KKNPP-800x506.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
894b5c3c2e5388f69c30228b71374455dd12fa087c0c260b8d824e9e131633a9

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:09 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:M
status
200
content-length
58502
x-cf-tsc
1572905023
x-cf2
H
last-modified
Tue, 29 Oct 2019 15:20:57 GMT
server
CFS 0215
x-cff
B
etag
"5db858d9-e486"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
13000
accept-ranges
bytes
x-cf-rand
69.345
expires
Tue, 31 Dec 2019 03:34:09 GMT
main-227ecd1ec6.js
cdn.arstechnica.net/wp-content/themes/ars/assets/js/
662 KB
215 KB
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-227ecd1ec6.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
dbf54924de9788ccb933c9ddd017cb305fb45e2a27b037a55b923b138cc41fbd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:09 GMT
content-encoding
gzip
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
219228
x-cf-tsc
1572632967
x-cf2
H
last-modified
Fri, 01 Nov 2019 18:28:50 GMT
server
CFS 0215
x-cff
B
etag
W/"5dbc7962-a572d"
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
x-cf-rand
30.470
expires
Tue, 31 Dec 2019 03:34:09 GMT
widget.min.js
embed.actionbutton.co/widget/
53 KB
17 KB
Script
General
Full URL
https://embed.actionbutton.co/widget/widget.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.78.4 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-78-4.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
f9b84f2df9256c362df6f7eb8ca204830c81a25cec361bcff302e48e55fc15ce

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Mon, 04 Nov 2019 18:33:52 GMT
Content-Encoding
gzip
Connection
keep-alive
Last-Modified
Mon, 04 Nov 2019 18:33:48 GMT
Server
AmazonS3
Age
32418
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 286eb4b50e0acf373dd03645aee00b7f.cloudfront.net (CloudFront)
Cache-Control
no-cache
Transfer-Encoding
chunked
X-Amz-Cf-Pop
FRA2-C2
X-Amz-Cf-Id
3ZZ3l1NEwTlms3hC682wcKZzQ6ID--qSy_ee1gY-cF3kWrmSqSv6nQ==
arstechnica.js
player.cnevids.com/interlude/
109 KB
28 KB
Script
General
Full URL
https://player.cnevids.com/interlude/arstechnica.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.51 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-51.fra2.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
02a9db289d960e3196e2269632ee772bbcb51333e9ab3503105ae7f3b1665062
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:09 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Amz-Cf-Pop
FRA2-C1
X-Cache
Miss from cloudfront
Status
200 OK
Connection
keep-alive
Content-Length
27527
X-XSS-Protection
1; mode=block
X-Request-Id
ab6e41b7-2851-4ceb-b31c-cf6efcad8c2f
X-Runtime
0.010473
X-Backend-Node
10.110.72.103
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"c0a6583232393903b937c710bdc5629f"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 3aed5a4f89d72775aaf2cc5a5f642386.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Id
68b4eUwIhD54HHsnLBRShovzRreCq2PY98vqeJ2zA3qTYG98zhjO3w==
conde-asa-polar-master.js
cdn.mediavoice.com/nativeads/script/condenastcorporate/
5 KB
2 KB
Script
General
Full URL
https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:d983 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
030e91b7512dbb40e9b9057f20bcf54c296a7f28c04bbcde0f2d2706dd2a3a06

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:09 GMT
content-encoding
gzip
cf-cache-status
HIT
age
17573
cf-ray
530bc5374fb0cba4-VIE
status
200
cf-ipcountry
DE
x-country
DE
content-length
2018
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-varnish
1545548631 1545514505
via
1.1 varnish
cache-control
max-age=21600
accept-ranges
bytes
content-type
text/javascript
100098X1555750.skimlinks.js
s.skimresources.com/js/
38 KB
15 KB
Script
General
Full URL
https://s.skimresources.com/js/100098X1555750.skimlinks.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1334db759a76c265d7ae0860975170a39334612497a347a746c40f9bc4af2c39

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:09 GMT
content-encoding
gzip
last-modified
Mon, 04 Nov 2019 16:42:43 GMT
server
AmazonS3
x-amz-request-id
3DFD6E7BC69F196E
etag
"c442360c1c83a551e3bdd9cf972c9895"
x-hw
1572924849.cds144.fr8.hn,1572924849.cds127.fr8.c
content-type
application/octet-stream
status
200
cache-control
max-age=3600
accept-ranges
bytes
content-length
15084
x-amz-id-2
RfGSqmeVADxzuNDjBeuHvHe4omCbTYyKG0z1SVEDrdFAHFKARenhm2bs14DO/tOyNbpwGoIDkFA=
gtm.js
www.googletagmanager.com/
272 KB
66 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
2673712b8339c83765c795c71fe7f923f16e70c794b690615a1f9bcef1961fd5
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:09 GMT
content-encoding
br
last-modified
Tue, 05 Nov 2019 03:00:00 GMT
server
Google Tag Manager
access-control-allow-headers
Cache-Control
status
200
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
66929
x-xss-protection
0
expires
Tue, 05 Nov 2019 03:34:09 GMT
integrator.js
adservice.google.de/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 05 Nov 2019 03:34:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 05 Nov 2019 03:34:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_2019103101.js
securepubads.g.doubleclick.net/gpt/
159 KB
58 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019103101.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.98 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s45-in-f2.1e100.net
Software
sffe /
Resource Hash
e4ab34b8a905b1076f36fddd2dc1e2dacd9c1bbca6614ab260e9b40aa0dced41
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 31 Oct 2019 13:10:21 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
59272
x-xss-protection
0
expires
Tue, 05 Nov 2019 03:34:09 GMT
ads.js
arstechnica.com/hotzones/src/
0
517 B
XHR
General
Full URL
https://arstechnica.com/hotzones/src/ads.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.31.169.131 Elk Grove Village, United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
ge-11-2-1.ar10.ord6.us.scnet.net
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:09 GMT
x-content-type-options
nosniff
last-modified
Fri, 01 Nov 2019 18:28:16 GMT
server
nginx
etag
"5dbc7940-0"
x-frame-options
SAMEORIGIN
content-type
application/javascript
status
200
content-length
0
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
strict-transport-security
max-age=300
accept-ranges
bytes
x-ars-server
web202
x-xss-protection
1; mode=block
aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.199.29 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-199-29.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
06b99248a163333e36980a6cfb756f1a7de60fa49517162b87b1a44d5d48f844

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 04 Nov 2019 13:47:26 GMT
content-encoding
gzip
vary
Origin
age
49604
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Fri, 01 Nov 2019 13:46:13 GMT
server
AmazonS3
access-control-max-age
3000
access-control-allow-methods
GET
content-type
application/javascript
via
1.1 8002c303d4f2295f77566a349deba122.cloudfront.net (CloudFront)
cache-control
public, max-age=86400
x-amz-cf-pop
FRA2-C1
x-amz-cf-id
dc2-rGQ0fwGeWIopP5eM8Zq2OBZOUciAkBkIWAtSpsFxCbtlU_9kzg==
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
78c8c364b438f0be81f1c51627902fda95b7aebdd2c04aee28c2f72cd4390207

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
357 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f95836cdd8c1af1d8261e8e198a4c1dd306e2b50ddc389fe820b56212a9cb17d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
economica-bold-otf-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
25 KB
25 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/economica-bold-otf-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
5315cf641e62ac7de4a82e6003cc1bd1ff09218400d8ff5286c951e25aee966b

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:09 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
25592
x-cf-tsc
1548822248
x-cf2
H
last-modified
Fri, 18 Jan 2019 16:37:54 GMT
server
CFS 0215
x-cff
B
etag
"5c4200e2-63f8"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
7
accept-ranges
bytes
expires
Tue, 31 Dec 2019 03:34:09 GMT
economica-regular-otf-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
24 KB
24 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/economica-regular-otf-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
c14a030b0b5ef06f710d9bbff164662d4b43c037e62f254aa6280504013caa34

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:09 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
24264
x-cf-tsc
1548820322
x-cf2
H
last-modified
Fri, 18 Jan 2019 16:37:54 GMT
server
CFS 0215
x-cff
B
etag
"5c4200e2-5ec8"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
41855
accept-ranges
bytes
expires
Tue, 31 Dec 2019 03:34:09 GMT
truncated
/
279 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5ecbfb541946a9a9437190a21d98e1c7ab7d863837d7d038a9a1e053c649c8ba

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
400 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6f261533d4b74ae931965cf3609bf47bb55001e39eb7029502d96cec73c4749a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
700 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5ab499494548829e507e9b6cd57247a6cd565e7f1bc6eb55e3da445af76f1f0c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
49282a74c6ced31e99f808232188ade8d82652004df4d664dcdb98c32563dd39

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
841 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
039f13cdf684666dd973e2385f773385adb074039e8a832ec48e1ae35fb20c15

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
blockquote-afedeab761.svg
cdn.arstechnica.net/wp-content/themes/ars/assets/img/
419 B
764 B
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/img/blockquote-afedeab761.svg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
8edcf5bd609aef18638950de010699cd2765ef88aba3d019feb51a4271807662

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:09 GMT
x-cf3
H
cf4ttl
43200.000
xkey-type
image/svg+xml
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
419
x-cf-tsc
1569719553
x-cf2
H
last-modified
Fri, 27 Sep 2019 21:39:44 GMT
server
CFS 0215
x-cff
B
etag
"5d8e81a0-1a3"
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
37245
accept-ranges
bytes
expires
Tue, 31 Dec 2019 03:34:09 GMT
s.gallagher-9.jpg
cdn.arstechnica.net/wp-content/uploads/2016/05/
51 KB
51 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2016/05/s.gallagher-9.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
703c68bc0eb86c90d0c6670ec0547e19a230db953c002879f2a204dd85dd8571

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:09 GMT
x-cf3
H
cf4ttl
43200.000
xkey-type
image/jpeg
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
51988
x-cf-tsc
1572892638
x-cf2
H
last-modified
Tue, 10 May 2016 18:23:41 GMT
server
CFS 0215
x-cff
B
etag
"5732272d-cb14"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
9265
accept-ranges
bytes
x-cf-rand
24.165
expires
Tue, 31 Dec 2019 03:34:09 GMT
channel-ars-be7bb52ba9.png
cdn.arstechnica.net/wp-content/themes/ars/assets/img/
5 KB
5 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/img/channel-ars-be7bb52ba9.png
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
08ed3bf6e73a999bafb422b878fb05b87269b00a65230c9457ce75aee10b873e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:09 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
4809
x-cf-tsc
1548822260
x-cf2
H
last-modified
Fri, 18 Jan 2019 16:37:54 GMT
server
CFS 0215
x-cff
B
etag
"5c4200e2-12c9"
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
19
accept-ranges
bytes
expires
Tue, 31 Dec 2019 03:34:09 GMT
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c7f2558d7005dc61e343b6abb61a63da8ace760a0fdd45cb0cc124b0de5b4c2f

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
18 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
62c7d2da9a5942053f17c9756e53b7cda414541619bd35c2b1441cd88c77f235

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4ec4b6769730ca98db1f40b152c52bd5bec01f61f559fb92709c307750388ac8

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
opensans-regular-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
18 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-regular-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
caa3854f28740fa98125ded826446ee4456379e8ad7c4ff46643347d1901506a

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:09 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
18824
x-cf-tsc
1548822248
x-cf2
H
last-modified
Fri, 18 Jan 2019 16:37:54 GMT
server
CFS 0215
x-cff
B
etag
"5c4200e2-4988"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
7
accept-ranges
bytes
expires
Tue, 31 Dec 2019 03:34:09 GMT
bitter-italic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
24 KB
24 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-italic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1193e934b76ed372f47e23f78f8a13e99d9588e564aff866e8f700e7a0650a83

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:09 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
24212
x-cf-tsc
1548820322
x-cf2
H
last-modified
Fri, 18 Jan 2019 16:37:54 GMT
server
CFS 0215
x-cff
B
etag
"5c4200e2-5e94"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
41855
accept-ranges
bytes
expires
Tue, 31 Dec 2019 03:34:09 GMT
bitter-regular-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
22 KB
23 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-regular-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
0186840386391fa2c0750ff7450a78e066498ba3274546a6fcf0fa9c55cd457c

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:09 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
22872
x-cf-tsc
1548820322
x-cf2
H
last-modified
Fri, 18 Jan 2019 16:37:54 GMT
server
CFS 0215
x-cff
B
etag
"5c4200e2-5958"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
41855
accept-ranges
bytes
expires
Tue, 31 Dec 2019 03:34:09 GMT
opensans-semibold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
19 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-semibold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1f9cd4a445ba85172da6090dd7b95edf55fd9e81ddb193e0b78093c1afa84378

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:09 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
18972
x-cf-tsc
1548822260
x-cf2
H
last-modified
Fri, 18 Jan 2019 16:37:54 GMT
server
CFS 0215
x-cff
B
etag
"5c4200e2-4a1c"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
42517
accept-ranges
bytes
expires
Tue, 31 Dec 2019 03:34:09 GMT
opensans-semibolditalic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-semibolditalic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
59201950b83489808587827b4050ffe0597992825daa88c227476cdbbf8ca282

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:09 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
20872
x-cf-tsc
1548822260
x-cf2
H
last-modified
Fri, 18 Jan 2019 16:37:54 GMT
server
CFS 0215
x-cff
B
etag
"5c4200e2-5188"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
41417
accept-ranges
bytes
expires
Tue, 31 Dec 2019 03:34:09 GMT
opensans-bold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
19 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-bold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
86096831a70c72ac0c08f5e65ae92d98330d9fd2b7511dde65ff50b8a16bfd9a

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:09 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
19516
x-cf-tsc
1548822260
x-cf2
H
last-modified
Fri, 18 Jan 2019 16:37:54 GMT
server
CFS 0215
x-cff
B
etag
"5c4200e2-4c3c"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
42517
accept-ranges
bytes
expires
Tue, 31 Dec 2019 03:34:09 GMT
bitter-bold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
22 KB
22 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-bold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
807271433f80bb33654a84ec904035be3d2b34e505a051e3469a47fe39ccb752

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:09 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
22104
x-cf-tsc
1548822260
x-cf2
H
last-modified
Fri, 18 Jan 2019 16:37:54 GMT
server
CFS 0215
x-cff
B
etag
"5c4200e2-5658"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
42517
accept-ranges
bytes
expires
Tue, 31 Dec 2019 03:34:09 GMT
outbrain.js
widgets.outbrain.com/
107 KB
37 KB
Script
General
Full URL
https://widgets.outbrain.com/outbrain.js?_=1572924849862
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-227ecd1ec6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.190 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-190.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
1a0503f1a0744078ae0519392e26c64545c04dbb2e2985962a4d769b89b479dd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:10 GMT
Content-Encoding
gzip
Last-Modified
Mon, 04 Nov 2019 18:36:26 GMT
Server
Apache
ETag
"8cb51eb01e37ea303f132be44adb92d6:1572892930"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=14400
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
37170
video_groups
api.cnevids.com/v1/
4 KB
1 KB
XHR
General
Full URL
https://api.cnevids.com/v1/video_groups?filters={%22channel_key%22:%22arstechnica%22}&pagesize=20&endpoint=oo.arstechnica
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-227ecd1ec6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.220.246.137 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-3-220-246-137.compute-1.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
e63b1da010fd0ae09966d8d1cb1d5a094faebea66a20c21b4f3e1c4c1abadd66
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/*
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

Date
Tue, 05 Nov 2019 03:34:10 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
658
X-XSS-Protection
1; mode=block
X-Request-Id
b9fbcbac-2ec4-46b4-ae2a-a1c5f905e0b2
X-Runtime
0.001726
X-Backend-Node
10.110.10.11
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
X-Frame-Options
SAMEORIGIN
ETag
W/"30be494ef7974a0b98bd2acd158bca48"
X-Download-Options
noopen
Vary
Accept-Encoding, Origin
Access-Control-Allow-Methods
GET, PUT, POST, DELETE, OPTIONS
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
p.js
d1z2jf7jlzjs58.cloudfront.net/
6 KB
3 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/p.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.108 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-108.fra50.r.cloudfront.net
Software
nginx /
Resource Hash
725913eab3460e2955a8ac4ec176f902c7d8d2db60757248b735cbf8698b0749

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 01:42:43 GMT
Content-Encoding
gzip
Age
6699
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Pragma
public
Last-Modified
Fri, 07 Mar 2014 00:45:07 GMT
Server
nginx
ETag
W/"53191693-19c1"
Content-Type
application/x-javascript
Via
1.1 9128c49d19c76fd86ec4c647434ccb0a.cloudfront.net (CloudFront)
Cache-Control
max-age=86400, public
X-Amz-Cf-Pop
FRA50-C1
X-Amz-Cf-Id
SQ9Cld4VI7DMZx_1AIVJ9xYdu_m3XJdcIPjxS3mYi6q94gXvkY6qxA==
Expires
Wed, 06 Nov 2019 01:42:29 GMT
conde-nast
segment-data.zqtk.net/
757 B
1 KB
Script
General
Full URL
https://segment-data.zqtk.net/conde-nast?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.19.1.241 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-19-1-241.eu-west-1.compute.amazonaws.com
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
be084fee541080da11135a396e0457d6592a0bb74656ba03c0e1329c9e849e96

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:10 GMT
Expires
Wed, 06 Nov 2019 02:01:53 GMT
Last-Modified
Mon, 04 Nov 2019 02:01:53 GMT
Server
nginx/1.10.3 (Ubuntu)
Connection
keep-alive
Content-Length
757
Content-Type
application/javascript; charset=UTF-8
ixmatch.html
js-sec.indexww.com/um/ Frame 4255
0
0
Document
General
Full URL
https://js-sec.indexww.com/um/ixmatch.html
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Host
js-sec.indexww.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/

Response headers

Server
Apache
Last-Modified
Mon, 19 Jun 2017 19:18:19 GMT
ETag
"e20015-112-55254ff6a1972"
Accept-Ranges
bytes
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Content-Type
text/html; charset=UTF-8
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
211
Date
Tue, 05 Nov 2019 03:34:10 GMT
Connection
keep-alive
ars-technica.config.js
pixel.condenastdigital.com/config/v2/production/
5 KB
2 KB
Script
General
Full URL
https://pixel.condenastdigital.com/config/v2/production/ars-technica.config.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.12.239 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
a6a60bfeca1021496ac984a7e6b7f05f9473db17edcccbc91855b302863bab76

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:10 GMT
Content-Encoding
gzip
Age
522638
X-Cache
HIT, HIT
Connection
keep-alive
Content-Length
995
x-amz-id-2
1VOF2yhQNTZO1qIp5jW5KhzfFEBiiyGcgO6xDZXv3TE5WRaZZuEkooWaunXyOFKDh3Xskof7QzU=
X-Served-By
cache-iad2135-IAD, cache-fra19161-FRA
Access-Control-Allow-Origin
*
Last-Modified
Fri, 12 Apr 2019 14:56:32 GMT
Server
AmazonS3
X-Timer
S1572924850.067123,VS0,VE0
ETag
"1be0f93ab87f7c023eae8fa152ea611f"
Vary
Accept-Encoding
x-amz-request-id
2E82BC22775206F1
Via
1.1 varnish, 1.1 varnish
Expires
Wed, 09 Oct 2019 07:32:14 GMT
Cache-Control
no-cache, public, max-age=604800
Accept-Ranges
bytes
Content-Type
application/javascript
X-Cache-Hits
1, 119
yi.js
mb.moatads.com/
2 KB
2 KB
Script
General
Full URL
https://mb.moatads.com/yi.js?ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGM%3Dh%2CqkG%24%7Du_b7jPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&confidence=2&pcode=condenastprebidheader987326845656&callback=MoatNadoAllJsonpRequest_24449947
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/condenastprebidheader987326845656/moatheader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.10.47.75 London, United Kingdom, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-3-10-47-75.eu-west-2.compute.amazonaws.com
Software
TornadoServer/4.5.3 /
Resource Hash
3b1c61e8167c01ddc09ea610027fa51b179e9dde332fce8b8b62105926462767

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:10 GMT
server
TornadoServer/4.5.3
etag
"d7b3ecd89f65ac8087854d41f9775a802c2c0df9"
content-type
text/html; charset=UTF-8
status
200
cache-control
max-age=900
timing-allow-origin
*
content-length
1541
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&t=1572924849986&de=494475862807&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatRendered=0&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=0&zMoatSafetyTargetingSet=0&zMoatEmptySlot=0&zMoatNadoDataLoadTime=Not%20Loaded&zMoatAllDataLoadTime=Not%20Loaded&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&ac=1&bq=11&f=0&na=487149906&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 05 Nov 2019 03:34:10 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 05 Nov 2019 03:34:10 GMT
id
dpm.demdex.net/
6 KB
2 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=3.3.0&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_orgid=F7093025512D2B690A490D44%40AdobeOrg&d_nsid=0&ts=1572924850077
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.77.236.71 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-77-236-71.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
cb2697b81409107548654461b9022815d81915c67cd481a2c298b855908777ff
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v050-0b19ad23a.edge-irl1.demdex.com 5.62.0.20191030104901 5ms (+1ms)
Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
Content-Encoding
gzip
X-TID
EkuTFY00R/s=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
1598
Expires
Thu, 01 Jan 1970 00:00:00 GMT
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
dbb67c620eaabf6679a314db18d3ae43037aef71ab27422e6feec08ee987cc0a
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 19 Aug 2019 17:22:41 GMT
server
Golfe2
age
3632
date
Tue, 05 Nov 2019 02:33:38 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
17803
expires
Tue, 05 Nov 2019 04:33:38 GMT
quant.js
secure.quantserve.com/
12 KB
6 KB
Script
General
Full URL
https://secure.quantserve.com/quant.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.146 , United Kingdom, ASN27281 (QUANTCAST - Quantcast Corporation, US),
Reverse DNS
Software
QS /
Resource Hash
404a9b0ffbcc813e8ddbb8d8510a24a69c09079282f8083ee94f4adc5d627176

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:10 GMT
Content-Encoding
gzip
Last-Modified
Tue, 05-Nov-2019 03:34:10 GMT
Server
QS
ETag
M0-e2b9884a
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=604800
Connection
keep-alive
Content-Length
5456
Expires
Tue, 12 Nov 2019 03:34:10 GMT
PageName=information%20technology,SiteID=Ars%20Technica,CampaignID=1802C,Channel=website,CreativeID=undefined
d.turn.com/r/dd/id/L21rdC84MTYvY2lkLzI4NTk1MjExL3QvMA/kv/
253 B
698 B
Script
General
Full URL
https://d.turn.com/r/dd/id/L21rdC84MTYvY2lkLzI4NTk1MjExL3QvMA/kv/PageName=information%20technology,SiteID=Ars%20Technica,CampaignID=1802C,Channel=website,CreativeID=undefined
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_CBC
Server
46.228.164.13 , United Kingdom, ASN56396 (TURN, GB),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
c5f2a33079884b0fdb3c9dc082cf38ad359dbaafb5811e4ec56eb20193b44d23

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 05 Nov 2019 03:34:09 GMT
Cache-Control
max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0
Server
Apache-Coyote/1.1
P3P
policyref="/w3c/p3p.xml", CP="NOI CURa DEVa TAIa PSAa PSDa IVAa IVDa OUR IND UNI NAV"
Content-Length
253
Content-Type
text/javascript;charset=UTF-8
fbevents.js
connect.facebook.net/en_US/
103 KB
22 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
b02eb6a63bca577aa26a3d54c450cd179dab7b63e08cb8830411bca8f853c002
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-23=":443"; ma=3600
content-length
22456
x-xss-protection
0
pragma
public
x-fb-debug
funwytVQQLL6F8u5CvLYn5XYHl+SHcpRvg6uKgVyZ2A4ZOfEqoEZlVTk2jtclzP0NamuD9/04JjrY7ABNxIH7w==
x-fb-trip-id
975780461
x-frame-options
DENY
date
Tue, 05 Nov 2019 03:34:10 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
uwt.js
static.ads-twitter.com/
5 KB
2 KB
Script
General
Full URL
https://static.ads-twitter.com/uwt.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.12.157 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
319949c8c08b86e9c35ea542c0dc0c30cedaa9b8d3d3c3327a36c91aefbd8af5

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:10 GMT
content-encoding
gzip
age
69637
x-cache
HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
1954
x-served-by
cache-fra19179-FRA
last-modified
Tue, 23 Jan 2018 20:09:00 GMT
x-timer
S1572924850.168693,VS0,VE0
etag
"b7b33882a4f3ffd5cbf07434f3137166+gzip"
vary
Accept-Encoding,Host
content-type
application/javascript; charset=utf-8
via
1.1 varnish
cache-control
no-cache
accept-ranges
bytes
spm.v1.min.js
ak.sail-horizon.com/spm/
118 KB
43 KB
Script
General
Full URL
https://ak.sail-horizon.com/spm/spm.v1.min.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.78.106 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-78-106.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
db84a28d93c321517263ee05f6f64fbf89569e423d2b5bec5f24e4c2d7f54663

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:25:35 GMT
content-encoding
gzip
last-modified
Thu, 24 Oct 2019 20:42:52 GMT
server
Apache
age
553
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/javascript
status
200
cache-control
max-age=600; must-revalidate
x-amz-cf-pop
FRA2-C2
accept-ranges
bytes
content-length
43149
via
1.1 91ba7c34719cd9c69e0357c149b94b90.cloudfront.net (CloudFront)
x-amz-cf-id
P-2FZxcvGFI1zsC0uFHujQVZp7ZoV3i6SEOLf5AzdzM5ih-qjvbAXQ==
i.js
tag.bounceexchange.com/2806/
9 KB
3 KB
Script
General
Full URL
https://tag.bounceexchange.com/2806/i.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.92.63 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
63.92.190.35.bc.googleusercontent.com
Software
fasthttp /
Resource Hash
dccc2fe6f4f4ddc1be76583861277e2da68cbfe568c54f8cb39a64cd151bb1ed

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:09 GMT
content-encoding
gzip
server
fasthttp
etag
4a7f866f10ef4c
content-type
text/plain; charset=utf-8
status
200
cache-control
no-cache, must-revalidate
x-region
europe-west3
alt-svc
clear
content-length
3175
via
1.1 google
57
a.ad.gt/api/v1/u/matches/
3 KB
2 KB
Script
General
Full URL
https://a.ad.gt/api/v1/u/matches/57
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.165.247.37 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-165-247-37.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
5c1f5308b00fe9c2a6d6d3264f70d4abd28167f6536b4dbb559b2662d67f4f47

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:10 GMT
Content-Encoding
gzip
Server
nginx/1.8.1
Connection
keep-alive
Content-Length
1220
Content-Type
text/html; charset=utf-8
insight.min.js
snap.licdn.com/li.lms-analytics/
3 KB
2 KB
Script
General
Full URL
https://snap.licdn.com/li.lms-analytics/insight.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:295::25ea , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
41dd5e421fe221a7d2921d6fa2b36e8b01a9f2c054aaef5fad866fe896c1d1e0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:10 GMT
Content-Encoding
gzip
Last-Modified
Mon, 07 Oct 2019 16:41:31 GMT
X-CDN
AKAM
Vary
Accept-Encoding
Content-Type
application/x-javascript;charset=utf-8
Cache-Control
max-age=46552
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1576
beacon.js
www.medtargetsystem.com/javascript/
136 KB
39 KB
Script
General
Full URL
https://www.medtargetsystem.com/javascript/beacon.js?v2.5.12
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.1.219.33 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-1-219-33.compute-1.amazonaws.com
Software
Apache/2.4.7 (Ubuntu) /
Resource Hash
a0146edb0582a128b44dbe3469296a0d6096e997eb94a1d4e82b5fc5a1adc459

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:10 GMT
Content-Encoding
gzip
Last-Modified
Mon, 28 Oct 2019 17:59:07 GMT
Server
Apache/2.4.7 (Ubuntu)
ETag
"21ef7-595fc4183b0c0-gzip"
Vary
X-Forwarded-Proto,Accept-Encoding
Content-Type
application/javascript
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
39393
scevent.min.js
sc-static.net/
14 KB
6 KB
Script
General
Full URL
https://sc-static.net/scevent.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.45 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-45.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
4d2e73fabea4a24a0278320a4920a5766ae7c7c5a11f787e0f31467a253bdddf

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Mon, 04 Nov 2019 14:08:45 GMT
content-encoding
gzip
last-modified
Thu, 22 Aug 2019 01:24:21 GMT
server
AmazonS3
age
48325
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, s-maxage=86400, max-age=600
x-amz-cf-pop
FRA50-C1
x-amz-cf-id
Ppkq_ABwb063TR6OWaBYuSw-grDlSWS4vqs_isqQwRnz9S9M4KIqLw==
via
1.1 24475cc722041223cf99f56b55432566.cloudfront.net (CloudFront)
b10882a1-8446-4e7d-bfb2-ce2c770ad910.js
cdn.cookielaw.org/consent/
377 KB
86 KB
Script
General
Full URL
https://cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (lha/8DF9) /
Resource Hash
3cc61abeca0bca8cca19b81ddd3dbccd8a09cc5857dd90afb54618103774f801

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Tue, 05 Nov 2019 03:34:15 GMT
content-encoding
gzip
content-md5
BBHYzHtnSmFkhVyvUukk1A==
x-cache
HIT
status
200
content-length
88035
x-ms-lease-status
unlocked
last-modified
Fri, 25 Oct 2019 18:59:50 GMT
server
ECAcc (lha/8DF9)
etag
0x8D7597D83349ECD
vary
Accept-Encoding
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
b2429bf2-c01e-00e1-1c85-933f93000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Tue, 05 Nov 2019 07:34:15 GMT
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035094&ns__t=1572924850091&ns_c=UTF-8&c8=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea%20%7C%20Ars...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1572924850091&ns_c=UTF-8&c8=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea%20%7C%20Ar...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1572924850091&ns_c=UTF-8&c8=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&c9=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
172.227.124.249 , United States, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a172-227-124-249.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 05 Nov 2019 03:34:10 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1572924850091&ns_c=UTF-8&c8=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&c9=
Pragma
no-cache
Date
Tue, 05 Nov 2019 03:34:10 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
check
pixel.tapad.com/idsync/ex/receive/
Redirect Chain
  • https://pixel.tapad.com/idsync/ex/receive?partner_id=ADB&partner_device_id=undefined
  • https://pixel.tapad.com/idsync/ex/receive/check?partner_id=ADB&partner_device_id=undefined
95 B
351 B
Image
General
Full URL
https://pixel.tapad.com/idsync/ex/receive/check?partner_id=ADB&partner_device_id=undefined
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.227.248.159 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
159.248.227.35.bc.googleusercontent.com
Software
Jetty(8.1.13.v20130916) /
Resource Hash
3eb10792d1f0c7e07e7248273540f1952d9a5a2996f4b5df70ab026cd9f05517

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:10 GMT
via
1.1 google
server
Jetty(8.1.13.v20130916)
p3p
policyref="http://tapad-taptags.s3.amazonaws.com/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
status
200
content-type
image/png
alt-svc
clear
content-length
95

Redirect headers

date
Tue, 05 Nov 2019 03:34:10 GMT
via
1.1 google
server
Jetty(8.1.13.v20130916)
status
302
p3p
policyref="http://tapad-taptags.s3.amazonaws.com/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
location
https://pixel.tapad.com/idsync/ex/receive/check?partner_id=ADB&partner_device_id=undefined
alt-svc
clear
content-length
0
check
pixel.tapad.com/idsync/ex/receive/
Redirect Chain
  • https://pixel.tapad.com/idsync/ex/receive?partner_id=648&partner_device_id=undefined
  • https://pixel.tapad.com/idsync/ex/receive/check?partner_id=648&partner_device_id=undefined
95 B
340 B
Image
General
Full URL
https://pixel.tapad.com/idsync/ex/receive/check?partner_id=648&partner_device_id=undefined
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.227.248.159 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
159.248.227.35.bc.googleusercontent.com
Software
Jetty(8.1.13.v20130916) /
Resource Hash
3eb10792d1f0c7e07e7248273540f1952d9a5a2996f4b5df70ab026cd9f05517

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:10 GMT
via
1.1 google
server
Jetty(8.1.13.v20130916)
p3p
policyref="http://tapad-taptags.s3.amazonaws.com/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
status
200
content-type
image/png
alt-svc
clear
content-length
95

Redirect headers

date
Tue, 05 Nov 2019 03:34:10 GMT
via
1.1 google
server
Jetty(8.1.13.v20130916)
status
302
p3p
policyref="http://tapad-taptags.s3.amazonaws.com/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
location
https://pixel.tapad.com/idsync/ex/receive/check?partner_id=648&partner_device_id=undefined
alt-svc
clear
content-length
0
ads
securepubads.g.doubleclick.net/gampad/
418 B
393 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2975460448728257&correlator=4477059840655887&output=ldjh&impl=fifs&adsid=NT&eid=21063205%2C21065018&vrg=2019103101&guci=1.2.0.0.2.2.0.0&plat=1%3A536903688%2C2%3A536903688%2C8%3A134250504&sc=1&sfv=1-0-36&ecs=20191105&iu_parts=3379%2Cconde.ars%2Cinterstitial%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=1x1&ists=1&prev_scp=pos%3Dinterstitial%26ctx_slot_type%3Dout_of_page%26ctx_slot_rn%3D0%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dout_of_page_0&eri=1&cust_params=amznbid%3D0%26amznp%3D0%26m_data%3Dwaiting%26m_safety%3Dwaiting%26m_categories%3Dwaiting%26m_mv%3Dwaiting%26m_gv%3Dwaiting%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.30.9%26ctx_page_slug%3Dindian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%26cnt_tags%3Ddtrack%252Cindia%252Cnorth-korea%252Cnuclear-energy%252Cnuclear-reactor-control-systems%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D&cookie_enabled=1&bc=31&abxe=1&lmt=1572924850&dt=1572924850177&dlt=1572924849621&idt=398&frm=20&biw=1585&bih=1200&oid=3&adxs=0&adys=0&adks=2746652139&ucis=1&ifi=1&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&dssz=58&icsg=35229473439744&mso=262144&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1585x1&msz=1585x1&ga_vid=2042026595.1572924850&ga_sid=1572924850&ga_hid=780885733&fws=4&ohw=1585
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019103101.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.98 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s45-in-f2.1e100.net
Software
cafe /
Resource Hash
c273920217b1fdc902c5f4a25d803fa9105c614b7a4fb9e46747573e5f77f6cd
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:10 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
207
x-xss-protection
0
google-lineitem-id
-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2019103101.js
securepubads.g.doubleclick.net/gpt/
64 KB
25 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019103101.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019103101.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.98 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s45-in-f2.1e100.net
Software
sffe /
Resource Hash
5075b0d31c00903c1a8f437e6e356da4ebf9fe7066ac6809427d184b55fc382c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 31 Oct 2019 13:10:21 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
25134
x-xss-protection
0
expires
Tue, 05 Nov 2019 03:34:10 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-36/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-36/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019103101.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

/
r.skimresources.com/api/
Redirect Chain
  • https://r.skimresources.com/api/
  • https://r.skimresources.com/api/?xguid=01DRWT103RMAK1H6EDFE181Z4N&persistence=1&checksum=b235f42e8085430a29f5889296c9b6e1c6e1e80ba2d3a2fc3592c48a92a3436e
152 B
460 B
XHR
General
Full URL
https://r.skimresources.com/api/?xguid=01DRWT103RMAK1H6EDFE181Z4N&persistence=1&checksum=b235f42e8085430a29f5889296c9b6e1c6e1e80ba2d3a2fc3592c48a92a3436e
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
cda010170dc7045e4d2e1933643d1ab033c809edbf74993a17172b8ab4279dea
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
openresty/1.11.2.5
status
200
vary
Accept-Encoding
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google

Redirect headers

date
Tue, 05 Nov 2019 03:34:10 GMT
via
1.1 google
server
openresty/1.11.2.5
status
307
location
//r.skimresources.com/api/?xguid=01DRWT103RMAK1H6EDFE181Z4N&persistence=1&checksum=b235f42e8085430a29f5889296c9b6e1c6e1e80ba2d3a2fc3592c48a92a3436e
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
text/html
alt-svc
clear
content-length
193
px.gif
p.skimresources.com/
43 B
107 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=1&rn=8.945112644960592
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
date
Tue, 05 Nov 2019 03:34:10 GMT
x-guploader-uploadid
AEnB2UqKCKreSa9oLySBOZqr4r1kYY-OqUd1YzObSyAifabiThXDLoU4YAYfAKU1hikuf8fYOr4rVSWgWNGZKI6-P6Doqys8Qw
x-goog-storage-class
MULTI_REGIONAL
status
200
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-hw
1572924850.cds144.fr8.hn,1572924850.cds054.fr8.c
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
px.gif
p.skimresources.com/
43 B
495 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=2&rn=8.945112644960592
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
date
Tue, 05 Nov 2019 03:34:10 GMT
x-guploader-uploadid
AEnB2UqKCKreSa9oLySBOZqr4r1kYY-OqUd1YzObSyAifabiThXDLoU4YAYfAKU1hikuf8fYOr4rVSWgWNGZKI6-P6Doqys8Qw
x-goog-storage-class
MULTI_REGIONAL
status
200
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-hw
1572924850.cds144.fr8.hn,1572924850.cds054.fr8.c
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
robots.txt
t.skimresources.com/api/v2/ Frame 8572
0
103 B
Image
General
Full URL
https://t.skimresources.com/api/v2/robots.txt?__skimjs_preflight__please_ignore__=true&rnd=0.0423253775942356
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

status
404
date
Tue, 05 Nov 2019 03:34:10 GMT
via
1.1 google
server
Python/3.7 aiohttp/3.5.4
alt-svc
clear
content-length
0
content-type
application/octet-stream
widgets.js
platform.twitter.com/
95 KB
29 KB
Script
General
Full URL
https://platform.twitter.com/widgets.js?_=1572924849863
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-227ecd1ec6.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40D2) /
Resource Hash
f5b5ac5fdb8870504505be0a9522061f905e5c1b25a927f877303785129cb3f9

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:11 GMT
Content-Encoding
gzip
Last-Modified
Tue, 22 Oct 2019 23:03:20 GMT
Server
ECS (fcn/40D2)
Etag
"dbb5834a50c19a7a8e3ad3ae8f1c1329+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Access-Control-Max-Age
3000
Cache-Control
public, max-age=1800
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
28705
yubikey-promo-2x-f8e0c5b722.png
cdn.arstechnica.net/wp-content/themes/ars/assets/img/
50 KB
50 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/img/yubikey-promo-2x-f8e0c5b722.png
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-227ecd1ec6.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
9142187aab08da4e5de78a21486593c9c167cf2d221878714c852b490bc31d25

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:10 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fB.ams1:co:1525808045:cacheN.ams1-01:H
status
200
content-length
50883
x-cf-tsc
1565730168
x-cf2
H
last-modified
Tue, 13 Aug 2019 20:51:03 GMT
server
CFS 0215
x-cff
B
etag
"5d5322b7-c6c3"
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
x-cf-rand
7.170
expires
Tue, 31 Dec 2019 03:34:10 GMT
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ded8aafe08adcc23835de89f62fbee0b98184f32296c7679ab5b5a358f044f63

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
Cookie set dest5.html
condenast.demdex.net/ Frame 0EAB
0
0
Document
General
Full URL
https://condenast.demdex.net/dest5.html?d_nsid=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.240.143.140 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-240-143-140.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Host
condenast.demdex.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Accept-Encoding
gzip, deflate, br
Cookie
demdex=05877987866529151954602699737643304077
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/

Response headers

Accept-Ranges
bytes
Cache-Control
max-age=21600
Content-Encoding
gzip
Content-Type
text/html
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified
Wed, 30 Oct 2019 17:29:43 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Pragma
no-cache
Set-Cookie
demdex=05877987866529151954602699737643304077;Path=/;Domain=.demdex.net;Expires=Sun, 03-May-2020 03:34:10 GMT;Max-Age=15552000
Strict-Transport-Security
max-age=31536000; includeSubDomains
Vary
Accept-Encoding, User-Agent
X-TID
98LIFGUJTuE=
Content-Length
2764
Connection
keep-alive
id
sstats.arstechnica.com/
49 B
684 B
XHR
General
Full URL
https://sstats.arstechnica.com/id?d_visid_ver=3.3.0&d_fieldgroup=A&mcorgid=F7093025512D2B690A490D44%40AdobeOrg&mid=06051341725406681944588476106434512980&ts=1572924850272
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.140.41.50 , United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
arstechnica.com.ssl.d1.sc.omtrdc.net
Software
Omniture DC /
Resource Hash
4a4445aba04a210efaf75054d544f90b46884ed788e75ef2e6ce0878124bbd23
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Date
Tue, 05 Nov 2019 03:34:10 GMT
X-Content-Type-Options
nosniff
Server
Omniture DC
xserver
www280
Vary
Origin
X-C
ms-6.11.2
P3P
CP="This is not a P3P policy"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/x-javascript
Keep-Alive
timeout=15
Content-Length
49
X-XSS-Protection
1; mode=block
ibs:dpid=411&dpuuid=XcDtsgAAFh7enxN_
dpm.demdex.net/
Redirect Chain
  • https://cm.everesttech.net/cm/dd?d_uuid=05877987866529151954602699737643304077
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=XcDtsgAAFh7enxN_
42 B
873 B
Image
General
Full URL
https://dpm.demdex.net/ibs:dpid=411&dpuuid=XcDtsgAAFh7enxN_
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.77.236.71 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-77-236-71.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

DCS
dcs-prod-irl1-v050-031fc8c2f.edge-irl1.demdex.com 5.62.0.20191030104901 2ms (+1ms)
Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Content-Type-Options
nosniff
X-TID
Khk8eBdtQGY=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT

Redirect headers

Date
Tue, 05 Nov 2019 03:34:10 GMT
Server
AMO-cookiemap/1.1
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Location
https://dpm.demdex.net/ibs:dpid=411&dpuuid=XcDtsgAAFh7enxN_
Cache-Control
no-cache
Connection
Keep-Alive
Keep-Alive
timeout=15,max=100
Content-Length
0
publishertag.js
static.criteo.net/js/ld/
87 KB
27 KB
Script
General
Full URL
https://static.criteo.net/js/ld/publishertag.js
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
178.250.0.130 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
nginx /
Resource Hash
40483fac4e86b90f4d46c4b9ab5b5a25662849de0c9789e571abc23ef1217a6e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:10 GMT
content-encoding
gzip
last-modified
Fri, 25 Oct 2019 13:44:17 GMT
server
nginx
etag
W/"5db2fc31-15cda"
status
200
content-type
text/javascript
access-control-allow-origin
*
cache-control
max-age=86400, public
timing-allow-origin
*
expires
Wed, 06 Nov 2019 03:34:10 GMT
rid
match.adsrvr.org/track/
109 B
535 B
XHR
General
Full URL
https://match.adsrvr.org/track/rid?ttd_pid=casale&fmt=json&p=183973
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.48.158.117 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-48-158-117.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
3bc5ae75644bbfb3019e3432f80d48449170846cbbb00ac63c9448c362fb2025

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Tue, 05 Nov 2019 03:34:10 GMT
x-aspnet-version
4.0.30319
status
200
vary
Origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
cache-control
private
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Content-Length, Content-Encoding, Vary, Cache-Control, Accept
content-length
109
expires
Thu, 05 Dec 2019 03:34:10 GMT
identity
api.rlcdn.com/api/
0
0

idsv2
mid.rkdms.com/
0
0

/
prod-native.actionbutton.co/ Frame 6BA8
0
0
Document
General
Full URL
https://prod-native.actionbutton.co/?isNativeEmbed=true&712cf4cf-abf8-4395-8d78-0c8db16a217d
Requested by
Host: embed.actionbutton.co
URL: https://embed.actionbutton.co/widget/widget.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:200d:a000:11:8cf6:b500:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash

Request headers

:method
GET
:authority
prod-native.actionbutton.co
:scheme
https
:path
/?isNativeEmbed=true&712cf4cf-abf8-4395-8d78-0c8db16a217d
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/

Response headers

status
200
content-type
text/html
date
Thu, 31 Oct 2019 20:20:57 GMT
last-modified
Thu, 31 Oct 2019 20:20:45 GMT
cache-control
max-age=31536000,public
server
AmazonS3
content-encoding
gzip
vary
Accept-Encoding
x-cache
Hit from cloudfront
via
1.1 c2890b1d84d781704a34b9aa5c069d4e.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA50
x-amz-cf-id
7MsmN7deVWd8wfOqkDf0EHJLaJ6QR-MYH7w0AO1uqQAUgae0tlTc6g==
age
371588
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&app=playerservice&cCh=videos%2Fshow&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pID=&sID=&uId=&xid=&_ts=2019-11-05T03%3A34%3A10.305Z&_c=error&_t=Interlude%20Insertion%20Error&dim1=%7B%22interludeFailure%22%3A%22unsupported%20template%22%2C%22pageTemplate%22%3A%22article%7Creport%22%2C%22url%22%3A%22information-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%7D&dim3=Availability%3A%20unsupported%20template
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.158.200 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-158-200.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 05 Nov 2019 03:34:10 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
plugin.js
plugin.mediavoice.com/
330 KB
123 KB
Script
General
Full URL
https://plugin.mediavoice.com/plugin.js
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:d983 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
8b1bb9a5329829ee1ecaa01d3b0f02248ef84c21447b5b5f17b240a602330f1f

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:10 GMT
content-encoding
gzip
cf-cache-status
HIT
age
16354
status
200
content-type
application/javascript
content-length
125467
timing-allow-origin
*
access-control-allow-origin
*
last-modified
Wed, 30 Oct 2019 23:01:08 GMT
server
cloudflare
etag
W/"5dba1634-5293c"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, OPTIONS
x-varnish
2109248592 2109248522
via
1.1 varnish
cache-control
max-age=43200
access-control-allow-credentials
true
accept-ranges
bytes
cf-ray
530bc53a7b64cba4-VIE
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
expires
Mon, 04 Nov 2019 23:01:17 GMT
condenastcorporate
polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/organization/
181 B
594 B
XHR
General
Full URL
https://polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/organization/condenastcorporate
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
6bd131d59efb6aa6a2d98ce4af498a811c84f74148129e140ff5a76904ca9f74

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 05 Nov 2019 03:34:10 GMT
content-encoding
gzip
server
cloudflare
status
200
etag
W/"4ed41fc03a3c3b67ac78af86ee19d7f1"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-Country, CF-Ray
cache-control
max-age=86400
x-country
DE
cf-ray
530bc53af9ee8cb0-VIE
linkid.js
www.google-analytics.com/plugins/ua/
2 KB
934 B
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/linkid.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
92fca55833f48b4289ac8f1cedd48752b580fce4ec4b5d81670b8193d6e51b54
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:24:06 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 22 Oct 2019 18:15:00 GMT
server
sffe
age
604
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
859
x-xss-protection
0
expires
Tue, 05 Nov 2019 04:24:06 GMT
publisher:getClientId
ampcid.google.com/v1/
74 B
193 B
XHR
General
Full URL
https://ampcid.google.com/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
991bfe84fec788f2b7d432b99a60c1e2aa2e799bc0137da8cf478299d0fc9a10
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 05 Nov 2019 03:34:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
94
x-xss-protection
0
228464857488266
connect.facebook.net/signals/config/
281 KB
65 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/228464857488266?v=2.9.5&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
663e406700665b2f9643ba7e9f3df29e5997ce6ea7514921f6f16dd5034b8aff
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-23=":443"; ma=3600
content-length
66295
x-xss-protection
0
pragma
public
x-fb-debug
3lA96m48qi7HERbEocd5J1YpbsQ+lVsQJYHnCkzgFJf1GzQk6SPtiF+mLeOqIAg5fTHG8LDWahawj425XynZgw==
x-fb-trip-id
975780461
x-frame-options
DENY
date
Tue, 05 Nov 2019 03:34:10 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
YXJzdGVjaG5pY2EuY29t
tcheck.outbrainimg.com/tcheck/check/
16 B
477 B
XHR
General
Full URL
https://tcheck.outbrainimg.com/tcheck/check/YXJzdGVjaG5pY2EuY29t
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1572924849862
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
929701ed632814943e3df803ddd9e3f179ccf889c0ad7b7f3392bd8d109b174f
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
ETag
W/"10-us8lSJutAxKqLzf8c1+n5XstcwY"
Access-Control-Max-Age
43200
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=24492
Date
Tue, 05 Nov 2019 03:34:10 GMT
Connection
keep-alive
Access-Control-Allow-Credentials
false
Content-Length
16
Expires
Tue, 05 Nov 2019 10:22:22 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&t=1572924849986&de=494475862807&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatRendered=0&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=0&zMoatSafetyTargetingSet=0&zMoatEmptySlot=0&zMoatNadoDataLoadTime=Not%20Loaded&zMoatAllDataLoadTime=Not%20Loaded&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&ac=1&bq=11&f=0&zn=0&na=2025346841&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 05 Nov 2019 03:34:10 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 05 Nov 2019 03:34:10 GMT
ads
securepubads.g.doubleclick.net/gampad/
5 KB
3 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2975460448728257&correlator=4477059840655887&output=ldjh&impl=fifs&adsid=NT&eid=21063205%2C21065018&vrg=2019103101&guci=1.2.0.0.2.2.0.0&plat=1%3A536903688%2C2%3A536903688%2C8%3A134250504&sc=1&sfv=1-0-36&ecs=20191105&iu_parts=3379%2Cars.dart%2Cinformation-technology&enc_prev_ius=0%2F1%2F2&prev_iu_szs=300x140&prev_scp=pos%3Dsponsor%26ctx_slot_type%3Dnative_xrail%26ctx_slot_rn%3D0%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dnative_xrail_0&eri=1&cust_params=amznbid%3D0%26amznp%3D0%26m_data%3Dwaiting%26m_safety%3Dwaiting%26m_categories%3Dwaiting%26m_mv%3Dwaiting%26m_gv%3Dwaiting%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.30.9%26ctx_page_slug%3Dindian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%26cnt_tags%3Ddtrack%252Cindia%252Cnorth-korea%252Cnuclear-energy%252Cnuclear-reactor-control-systems%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D&cookie_enabled=1&bc=31&abxe=1&lmt=1572924850&dt=1572924850381&dlt=1572924849621&idt=398&frm=20&biw=1585&bih=1200&oid=3&adxs=1063&adys=786&adks=1840483542&ucis=2&ifi=2&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&dssz=63&icsg=35229486022656&mso=262144&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=300x0&msz=300x140&ga_vid=2042026595.1572924850&ga_sid=1572924850&ga_hid=780885733&fws=516&ohw=300
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019103101.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.98 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s45-in-f2.1e100.net
Software
cafe /
Resource Hash
e41916d2a94c4b0a00c30ffac34dc1ea4a5bc0ac41122995868b935503154df8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:10 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
2626
x-xss-protection
0
google-lineitem-id
4736014287
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138237302059
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
sparrow.min.js
pixel.condenastdigital.com/
38 KB
14 KB
Script
General
Full URL
https://pixel.condenastdigital.com/sparrow.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.12.239 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
aece3989759ce8b9a715ba342a604316f14a06ff35d5d4ee0cb5c7dfc8bbecc6

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:10 GMT
Content-Encoding
gzip
Age
301611
X-Cache
HIT, HIT
Connection
keep-alive
Content-Length
13266
x-amz-id-2
G22jDR/T8Gn5E/DpiqgzExuok1rN1IkBMU610B7kk+5zBa3VSyC9OSc2tGwSwko2nJI4oLiZ+R8=
X-Served-By
cache-iad2148-IAD, cache-fra19161-FRA
Access-Control-Allow-Origin
*
Last-Modified
Fri, 26 Jul 2019 15:47:25 GMT
Server
AmazonS3
X-Timer
S1572924850.404377,VS0,VE0
ETag
"dba402ad6593e4f796c1bbad29c3e81e"
Vary
Accept-Encoding
x-amz-request-id
DEC7F0F62070489D
Via
1.1 varnish, 1.1 varnish
Expires
Fri, 26 Jul 2019 21:47:24 GMT
Cache-Control
no-cache, public, max-age=604800
Accept-Ranges
bytes
Content-Type
application/javascript
X-Cache-Hits
1, 7185
publisher:getClientId
ampcid.google.de/v1/
3 B
111 B
XHR
General
Full URL
https://ampcid.google.de/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 05 Nov 2019 03:34:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
23
x-xss-protection
0
collect
px.ads.linkedin.com/
Redirect Chain
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-kor...
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D434737%26url%3Dhttps%253A%252F%252Farstechnica.com%252Finformation-technology%252...
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-kor...
0
93 B
Image
General
Full URL
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&time=1572924850416&liSync=true
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:f500:11:101::b93f:9005 , Ireland, ASN14413 (LINKEDIN - LinkedIn Corporation, US),
Reverse DNS
Software
Play /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:11 GMT
content-encoding
gzip
server
Play
vary
Accept-Encoding
x-li-fabric
prod-lor1
status
200
x-li-proto
http/2
x-li-pop
prod-tln1
content-type
application/javascript
content-length
20
x-li-uuid
Ugh3eNEm1BXgM86N4CoAAA==

Redirect headers

date
Tue, 05 Nov 2019 03:34:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
302
vary
Accept-Encoding
content-length
20
x-li-uuid
89cdadEm1BVgzYOi4CoAAA==
server
Play
pragma
no-cache
x-li-pop
prod-tln1
x-frame-options
sameorigin
expect-ct
max-age=86400, report-uri="https://www.linkedin.com/platform-telemetry/ct"
strict-transport-security
max-age=2592000
x-li-fabric
prod-lor1
location
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&time=1572924850416&liSync=true
x-xss-protection
1; mode=block
cache-control
no-cache, no-store
content-security-policy
default-src *; connect-src 'self' static.licdn.com media.licdn.com static-exp1.licdn.com static-exp2.licdn.com static-exp3.licdn.com media-exp1.licdn.com media-exp2.licdn.com https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com https://dpm.demdex.net/id https://lnkd.demdex.net/event blob:; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' platform.linkedin.com spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com https://snap.licdn.com/li.lms-analytics/insight.min.js; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'; report-uri https://www.linkedin.com/platform-telemetry/csp?f=l
x-li-proto
http/2
expires
Thu, 01 Jan 1970 00:00:00 GMT
widget_iframe.2d991e3dfc9abb2549972ce8b64c5d85.html
platform.twitter.com/widgets/ Frame 8535
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/widget_iframe.2d991e3dfc9abb2549972ce8b64c5d85.html?origin=https%3A%2F%2Farstechnica.com
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js?_=1572924849863
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/4185) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/

Response headers

Content-Encoding
gzip
Access-Control-Allow-Methods
GET
Access-control-allow-origin
*
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Tue, 05 Nov 2019 03:34:02 GMT
Etag
"7d3f6ed140174a20e7c8be261a70a863+gzip"
Last-Modified
Tue, 22 Oct 2019 22:27:25 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/4185)
Vary
Accept-Encoding
X-Cache
HIT
Content-Length
5816
ijs_all_modules_388015b95703e0f662a36d527ea23867.js
assets.bounceexchange.com/assets/smart-tag/versioned/
0
0

rules-p-Jjy-Cyr1NZGRz.js
rules.quantcount.com/
4 KB
2 KB
Script
General
Full URL
https://rules.quantcount.com/rules-p-Jjy-Cyr1NZGRz.js
Requested by
Host: secure.quantserve.com
URL: https://secure.quantserve.com/quant.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:f200:6:44e3:f8c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
efdbd8582066a12cf45115f1e150d2a8de06bf6b14db3feca98b116efeb9e0bb

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 02:42:07 GMT
content-encoding
gzip
last-modified
Mon, 19 Mar 2018 22:18:17 GMT
server
AmazonS3
age
3124
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=3600
x-amz-cf-pop
FRA2-C2
x-amz-cf-id
uy9nuthSKsecU3aJHMPqmSzEt628DtYjdRSWZOSOCqwUd08dHrLUpA==
via
1.1 d6b9c7bad28b271f1e800a50d49ab8a4.cloudfront.net (CloudFront)
arstechnica.com
srv-2019-11-05-03.config.parsely.com/config/
0
0

ADTECH;apid=1A237b8744-ff7d-11e9-8386-12358a211a00;cfp=1;rndc=1572924853;cmd=bid;cors=yes;v=2;misc=1572924850483;callback=window.headertag.AolHtb.adResponseCallbacks._9r3eTwsi
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1572924850483;callback=window.headertag.AolHtb.adResponseCallbacks._9r3eTwsi;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1572924853;cmd=bid;cors=yes;v=2;misc=1572924850483;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1A237b8744-ff7d-11e9-8386-12358a211a00;cfp=1;rndc=1572924853;cmd=bid;cors=yes;v=2;misc=1572924850483;callback=...
1001 B
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1A237b8744-ff7d-11e9-8386-12358a211a00;cfp=1;rndc=1572924853;cmd=bid;cors=yes;v=2;misc=1572924850483;callback=window.headertag.AolHtb.adResponseCallbacks._9r3eTwsi
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
418d6949220eb8a1fc38301a5d145d5568dd9c5f8235f77017ff7d65d121f004

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 05 Nov 2019 03:34:14 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
1001
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 05 Nov 2019 03:34:14 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1A237b8744-ff7d-11e9-8386-12358a211a00;cfp=1;rndc=1572924853;cmd=bid;cors=yes;v=2;misc=1572924850483;callback=window.headertag.AolHtb.adResponseCallbacks._9r3eTwsi
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1572924853;cmd=bid;cors=yes;v=2;misc=1572924850483;callback=window.headertag.AolHtb.adResponseCallbacks._CPVxo1Wy
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1572924850483;callback=window.headertag.AolHtb.adResponseCallbacks._CPVxo1Wy;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1572924853;cmd=bid;cors=yes;v=2;misc=1572924850483;callback=window.headertag.AolHtb.adResponseCallbacks....
1001 B
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1572924853;cmd=bid;cors=yes;v=2;misc=1572924850483;callback=window.headertag.AolHtb.adResponseCallbacks._CPVxo1Wy
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
9433057118e146896e509aed5df700bf712a810a44498314dd5d73acd643a089

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 05 Nov 2019 03:34:14 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
1001
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 05 Nov 2019 03:34:14 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1572924853;cmd=bid;cors=yes;v=2;misc=1572924850483;callback=window.headertag.AolHtb.adResponseCallbacks._CPVxo1Wy
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
cygnus
as-sec.casalemedia.com/
0
0

fastlane.json
fastlane.rubiconproject.com/a/api/
261 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=15&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&p_screen_res=1600x1200&site_id=217438&zone_id=1070068&kw=rp.fastlane&tk_flint=index&rand=0.42562468646779217&alt_size_ids=10
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.143 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
b9160f2aa3ab915841155cca76bf190a3b0bfcd7d9077785a9f6f689a8c8ff05

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 05 Nov 2019 03:34:11 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=498
Content-Length
261
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
260 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=2&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&p_screen_res=1600x1200&site_id=217438&zone_id=1070068&kw=rp.fastlane&tk_flint=index&rand=0.31867397311400447&alt_size_ids=57
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.143 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
158108f2264e468721d04da9f1d5b005365ac0cc1e8bed9e7e1c4cf09a42466b

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 05 Nov 2019 03:34:11 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=498
Content-Length
260
Expires
Wed, 17 Sep 1975 21:32:10 GMT
cygnus
as-sec.casalemedia.com/
0
0

ADTECH;apid=1A235667d4-ff7d-11e9-aebd-12bf237d14d4;cfp=1;rndc=1572924853;cmd=bid;cors=yes;v=2;misc=1572924850487;callback=window.headertag.AolHtb.adResponseCallbacks._IeiRQAIa
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1572924850487;callback=window.headertag.AolHtb.adResponseCallbacks._IeiRQAIa;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1572924853;cmd=bid;cors=yes;v=2;misc=1572924850487;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1A235667d4-ff7d-11e9-aebd-12bf237d14d4;cfp=1;rndc=1572924853;cmd=bid;cors=yes;v=2;misc=1572924850487;callback=...
1001 B
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1A235667d4-ff7d-11e9-aebd-12bf237d14d4;cfp=1;rndc=1572924853;cmd=bid;cors=yes;v=2;misc=1572924850487;callback=window.headertag.AolHtb.adResponseCallbacks._IeiRQAIa
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
5eb90c0e282d86124cba22d89f6ae944dc2a1f3330c151c99f247af9d17a0e57

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 05 Nov 2019 03:34:14 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
1001
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 05 Nov 2019 03:34:14 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1A235667d4-ff7d-11e9-aebd-12bf237d14d4;cfp=1;rndc=1572924853;cmd=bid;cors=yes;v=2;misc=1572924850487;callback=window.headertag.AolHtb.adResponseCallbacks._IeiRQAIa
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1572924853;cmd=bid;cors=yes;v=2;misc=1572924850487;callback=window.headertag.AolHtb.adResponseCallbacks._dn2fHbLo
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1572924850487;callback=window.headertag.AolHtb.adResponseCallbacks._dn2fHbLo;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1572924853;cmd=bid;cors=yes;v=2;misc=1572924850487;callback=window.headertag.AolHtb.adResponseCallbacks....
1000 B
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1572924853;cmd=bid;cors=yes;v=2;misc=1572924850487;callback=window.headertag.AolHtb.adResponseCallbacks._dn2fHbLo
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
e103fa4bd499ce31e0f2767cb78d2feaf8d5631bf267a1e6166d2051751a324c

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 05 Nov 2019 03:34:14 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
1000
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 05 Nov 2019 03:34:14 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1572924853;cmd=bid;cors=yes;v=2;misc=1572924850487;callback=window.headertag.AolHtb.adResponseCallbacks._dn2fHbLo
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
/
www.facebook.com/tr/
44 B
234 B
Image
General
Full URL
https://www.facebook.com/tr/?id=228464857488266&ev=PageView&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&rl=&if=false&ts=1572924850553&cd[SiteSection]=information%20technology&cd[PageTags]=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cd[Brand]=Pitchfork&sw=1600&sh=1200&v=2.9.5&r=stable&ec=0&o=30&fbp=fb.1.1572924850551.1672006863&it=1572924850361&coo=false&rqm=GET
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:10 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
alt-svc
h3-23=":443"; ma=3600
content-length
44
expires
Tue, 05 Nov 2019 03:34:10 GMT
iab
api.skimlinks.mgr.consensu.org/
0
0

adsct
t.co/i/
43 B
448 B
Image
General
Full URL
https://t.co/i/adsct?p_id=Twitter&p_user_id=0&txn_id=o1o49&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.133 , United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=0
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:11 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
content-length
65
x-xss-protection
0
x-response-time
105
pragma
no-cache
last-modified
Tue, 05 Nov 2019 03:34:11 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=0
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
ec073c26229ae71290d7a1432df13ea8
x-transaction
004cdf46006ea73f
expires
Tue, 31 Mar 1981 05:00:00 GMT
collect
www.google-analytics.com/
35 B
106 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j79&a=780885733&t=pageview&_s=1&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&dr=%2F&dp=%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&ul=en-us&de=UTF-8&dt=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea%20%7C%20Ars%20Technica&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=aChAgUAjAAQC~&jid=1319062663&gjid=650177328&cid=2042026595.1572924850&tid=UA-31997-1&_gid=2138006251.1572924851&gtm=2wgan1NLXNPCQ&cg1=article%7Creport&cg2=information-technology&cg3=information%20technology&cd1=GTM-NLXNPCQ&cd2=136&cd4=&cd6=Tue%20Nov%2005%202019%2004%3A34%3A10%20GMT%2B0100%20(Central%20European%20Standard%20Time)&cd7=1572924850081.zq0bm3b&cd8=-1&cd9=Mozilla%2F5.0%20(Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5)%20AppleWebKit%2F537.36%20(KHTML%2C%20like%20Gecko)%20Chrome%2F78.0.3904.70%20Safari%2F537.36&cd10=English&cd11=desktop&cd12=0&cd13=Tag%20Name%3A%20GA%20-%20Pageview%20-%20Core%20Pageview%20-%20All%20Pages&cd20=none&cd25=Sean%20Gallagher&cd26=1593135&cd27=603&cd28=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea&cd29=web&cd32=2019-10-29T15%3A47%3A47%2B00%3A00&cd34=2019-10-30T12%3A56%3A25%2B00%3A00&cd35=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cd36=web&cd43=Ars%20Technica&cd45=Adblock%20Enabled%20-%20false&cd62=https%3A%2F%2Farstechnica.com%2F%3Fp%3D1593135&cd63=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cd65=&cd72=1.0.0&cd92=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cd93=information%20technology&cd97=-1303530583&cd98=article%7Creport&cd103=&cd113=data-layer-loaded&cd3=2042026595.1572924850&z=243767611
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 01 Nov 2019 19:09:45 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
289465
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j79&tid=UA-31997-1&cid=2042026595.1572924850&jid=1319062663&gjid=650177328&_gid=2138006251.1572924851&_u=aChAgUAjAAQC~&z=2021087775
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=2042026595.1572924850&jid=1319062663&_v=j79&z=2021087775
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=2042026595.1572924850&jid=1319062663&_v=j79&z=2021087775&slf_rd=1&random=3375553316
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=2042026595.1572924850&jid=1319062663&_v=j79&z=2021087775&slf_rd=1&random=3375553316
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 05 Nov 2019 03:34:10 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 05 Nov 2019 03:34:10 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=2042026595.1572924850&jid=1319062663&_v=j79&z=2021087775&slf_rd=1&random=3375553316
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame B534
0
57 B
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjst9vvuSgQVLNQNeeLsltqFJCUGx1c-W4PM-WO7uHSc6Qz5NuSplyM2dSm1B6SzYcnskjxhsRtBPRVCWbXqTxVHvZixTh7Ic9d6YuRp3_jqPeImA8QNx4XeeErjNWXseeUapep0A2RqjA3NNAiXNo3OoPDzlrTDAWxZAr1E-uCIm1Rw98JdE65zFrzFMczEiQBh1j5_h9lkyGQZhjxyswPyt3IcfHnPaIwRunPw7xBkQc3s3ZBmHY0IRY4mJpKXrfpSR11HhaUTEFVxsKA3Tj6-nZjop&sig=Cg0ArKJSzCHDnvoDBS5TEAE&urlfix=1&adurl=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.98 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s45-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 05 Nov 2019 03:34:10 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
creative.js
static.polarcdn.com/creative/ Frame B534
311 KB
118 KB
Script
General
Full URL
https://static.polarcdn.com/creative/creative.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019103101.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:f87e , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
0a2f9e21b7b1c96d28f64ef614fc4fcddcfcb6f65596a826cafee1bb855efa06

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:10 GMT
content-encoding
gzip
cf-cache-status
HIT
age
5516
cf-ray
530bc53cafe58c92-VIE
status
200
cf-ipcountry
DE
content-type
application/javascript
content-length
120427
access-control-allow-origin
*
last-modified
Wed, 30 Oct 2019 23:01:06 GMT
server
cloudflare
etag
W/"5dba1632-4dd73"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, OPTIONS
x-varnish
1198793354 1198793284
via
1.1 varnish
access-control-expose-headers
CF-IPCountry
cache-control
max-age=10800
access-control-allow-credentials
true
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
expires
Tue, 05 Nov 2019 05:01:53 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame B534
76 KB
29 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019103101.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
15e0a9542e3b37b78841846f6d6bf8ed15e35683cb596d8ed4913e912f8362bb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1572633785634088"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
29108
x-xss-protection
0
expires
Tue, 05 Nov 2019 03:34:10 GMT
moatad.js
z.moatads.com/condenastdfp9588492144/ Frame B534
295 KB
99 KB
Script
General
Full URL
https://z.moatads.com/condenastdfp9588492144/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019103101.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
84f74a5d1633faa66de175a941f55d8b0a0cd00d3a7ff7ccae25eed6d219c9f7

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:10 GMT
Content-Encoding
gzip
Last-Modified
Mon, 04 Nov 2019 20:34:18 GMT
Server
AmazonS3
x-amz-request-id
2D843AB369039F6E
ETag
"2572e86635e18cef1b7a461da551a8bc"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=39596
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
100422
x-amz-id-2
dOIPVbh0TyjTsIVsEUFwB4sQkAH6TEZNyfyRRvFqUWyNVF7cqnuIjh8i6yqSPBA0pLMFRqlTcvk=
osd.js
www.googletagservices.com/activeview/js/current/
78 KB
29 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019103101.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
a71cc134826b38085a6d63bca1e00de7ab8518ae02f7b5e2ae46cf11781e44e5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1572633785634088"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
29301
x-xss-protection
0
expires
Tue, 05 Nov 2019 03:34:10 GMT
p-Jjy-Cyr1NZGRz.gif
pixel.quantserve.com/pixel/
35 B
494 B
Image
General
Full URL
https://pixel.quantserve.com/pixel/p-Jjy-Cyr1NZGRz.gif?labels=_campaign.media.Advertiser%20ID.1454517775.Campaign%20ID.2338761482.Line%20Item%20ID.4736014287
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.147 , United Kingdom, ASN27281 (QUANTCAST - Quantcast Corporation, US),
Reverse DNS
Software
QS /
Resource Hash
a0d3a0aff7dc3bf32d2176fc3dcda6e7aba2867c4f4d1f7af6355d2cfc6c44f8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 05 Nov 2019 03:34:10 GMT
Server
QS
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAo PSDo OUR SAMa IND COM NAV"
Cache-Control
private, no-cache, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
Fri, 04 Aug 1978 12:00:00 GMT
dwce_cheq_events
log.outbrainimg.com/loggerServices/
0
0

/
polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/ Frame F5C1
0
0
Document
General
Full URL
https://polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/
Requested by
Host: plugin.mediavoice.com
URL: https://plugin.mediavoice.com/plugin.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

:method
GET
:authority
polarcdn-terrax.com
:scheme
https
:path
/privacy/v1.0.0/html/optout/readwrite/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate

Response headers

status
200
date
Tue, 05 Nov 2019 03:34:10 GMT
content-type
text/html; charset=utf-8
content-length
1242
set-cookie
__cfduid=d2244c96fa761d97995cf5441711bb3f81572924850; expires=Wed, 04-Nov-20 03:34:10 GMT; path=/; domain=.polarcdn-terrax.com; HttpOnly
vary
Accept-Encoding
access-control-allow-headers
Authorization
access-control-expose-headers
CF-IPCountry, X-Country, CF-Ray
cache-control
max-age=900
access-control-allow-origin
*
access-control-allow-methods
GET
timing-allow-origin
*
content-encoding
gzip
x-varnish
1698859996 1698840657
via
1.1 varnish
cf-cache-status
HIT
age
374
accept-ranges
bytes
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
530bc53c5d04cbcc-VIE
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1572924849986&de=494475862807&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=_out_of_page_0&zMoatRendered=1&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=1&zMoatSafetyTargetingSet=1&zMoatEmptySlot=1&zMoatNadoDataLoadTime=Not%20Loaded&zMoatAllDataLoadTime=Not%20Loaded&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&ac=1&bq=11&f=0&zn=0&na=1776728015&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 05 Nov 2019 03:34:10 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 05 Nov 2019 03:34:10 GMT
/
infinityid.condenastdigital.com/
36 B
1 KB
XHR
General
Full URL
https://infinityid.condenastdigital.com/?rand=1572924850601
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.225.242.81 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-3-225-242-81.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
4d9d9412b672e55b147d28930b42dabaa64a043f60466eddd3d6066170426506

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

Date
Tue, 05 Nov 2019 03:34:12 GMT
content-encoding
gzip
Server
nginx/1.15.8
vary
origin,accept-encoding
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
transfer-encoding
chunked
content
4d.condenastdigital.com/
4 KB
2 KB
XHR
General
Full URL
https://4d.condenastdigital.com/content?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.209.40.151 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-3-209-40-151.compute-1.amazonaws.com
Software
/
Resource Hash
03eb10e9e55f9fc43e14d49d08d9523cd79dca421bacaa39d4a7d1d6e750e07c

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

Date
Tue, 05 Nov 2019 03:34:11 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-11-05T03%3A34%3A10.602Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cCh=information%20technology&cTi=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cCl=603&cId=1593135&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&pRt=referral&pHp=%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pWw=1600&pWh=1200&pPw=1600&pPh=3700&pSw=1600&pSh=1200&uID=52b23511-f065-4932-8175-b707cf8a0d32&uNw=1&uUq=1&sID=534fe3ef-87fc-4ec1-b3f3-9ad39166ac24&pID=b80403a4-97b9-4408-b5c2-faea5979c25d&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Finterstitial%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3Anull%2C%22campaignId%22%3Anull%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22_out_of_page_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Atrue%2C%22isFirstRequested%22%3Atrue%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22out_of_page_0%22%2C%22outOfPage%22%3Atrue%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%221x1%22%2C%22slug%22%3A%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%7D&dim3=%7B%22footerStart%22%3A1572924849743%2C%22headerStart%22%3A1572924849726%2C%22navigationStart%22%3A1572924847742%2C%22pubAdsReady%22%3A1572924850056%2C%22injected%22%3A1572924850401%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22interstitial%22%5D%2C%22ctx_slot_type%22%3A%5B%22out_of_page%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22out_of_page_0%22%5D%2C%22amznbid%22%3A%5B%220%22%5D%2C%22amznp%22%3A%5B%220%22%5D%2C%22m_data%22%3A%5B%22waiting%22%5D%2C%22m_safety%22%3A%5B%22waiting%22%5D%2C%22m_categories%22%3A%5B%22waiting%22%5D%2C%22m_mv%22%3A%5B%22waiting%22%5D%2C%22m_gv%22%3A%5B%22waiting%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%5D%2C%22cnt_tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.158.200 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-158-200.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 05 Nov 2019 03:34:10 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-11-05T03%3A34%3A10.609Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cCh=information%20technology&cTi=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cCl=603&cId=1593135&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&pRt=referral&pHp=%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pWw=1600&pWh=1200&pPw=1600&pPh=3700&pSw=1600&pSh=1200&uID=52b23511-f065-4932-8175-b707cf8a0d32&sID=534fe3ef-87fc-4ec1-b3f3-9ad39166ac24&pID=b80403a4-97b9-4408-b5c2-faea5979c25d&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fars.dart%2Finformation-technology%22%2C%22advertiserId%22%3A1454517775%2C%22campaignId%22%3A2338761482%2C%22creativeId%22%3A138237302059%2C%22elementId%22%3A%22native_xrail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Atrue%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3A4736014287%2C%22name%22%3A%22native_xrail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x140%22%2C%22slug%22%3A%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%7D&dim3=%7B%22footerStart%22%3A1572924849743%2C%22headerStart%22%3A1572924849726%2C%22navigationStart%22%3A1572924847742%2C%22pubAdsReady%22%3A1572924850056%2C%22injected%22%3A1572924850574%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22sponsor%22%5D%2C%22ctx_slot_type%22%3A%5B%22native_xrail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22native_xrail_0%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%220%22%5D%2C%22amznp%22%3A%5B%220%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22unsafe%22%5D%2C%22m_categories%22%3A%5B%22moat_unsafe%22%2C%22gv_crime%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%5D%2C%22cnt_tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%220lw01o%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22zlqtg4%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_GIOPHEv_0c_%22%5D%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.158.200 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-158-200.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 05 Nov 2019 03:34:11 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
5b27ee7e8c1abc4e7900000f
api.cnevids.com/v1/video_groups/
44 KB
8 KB
XHR
General
Full URL
https://api.cnevids.com/v1/video_groups/5b27ee7e8c1abc4e7900000f?endpoint=oo.arstechnica
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-227ecd1ec6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.220.246.137 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-3-220-246-137.compute-1.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
ca2a9c9b370cb90986b0dd715198e0b4445eea0ca984f520fb988d00b1de6976
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/*
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

Date
Tue, 05 Nov 2019 03:34:10 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
7336
X-XSS-Protection
1; mode=block
X-Request-Id
34025e32-8441-49d6-8572-ca2ae9d9a61b
X-Runtime
0.002998
X-Backend-Node
10.110.44.187
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
X-Frame-Options
SAMEORIGIN
ETag
W/"d4e1a39a2d0fafeab25d216ba7931440"
X-Download-Options
noopen
Vary
Accept-Encoding, Origin
Access-Control-Allow-Methods
GET, PUT, POST, DELETE, OPTIONS
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
bid
c.amazon-adsystem.com/e/dtb/
23 B
368 B
XHR
General
Full URL
https://c.amazon-adsystem.com/e/dtb/bid?src=3035&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pid=5bELD4raFvQUF&cb=0&ws=1600x1200&v=7.42.00&t=1000&slots=%5B%7B%22sd%22%3A%22siderail_0%22%2C%22s%22%3A%5B%22300x250%22%2C%22300x600%22%5D%7D%2C%7B%22sd%22%3A%22post_nav_0%22%2C%22s%22%3A%5B%22728x90%22%2C%22970x250%22%5D%7D%5D&pj=%7B%22si_section%22%3A%22information-technology%22%7D&cfgv=0&gdprl=%7B%22status%22%3A%22cmp-timeout%22%7D
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.199.29 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-199-29.fra2.r.cloudfront.net
Software
Server /
Resource Hash
745a085b52b8371ec6705413fca70a28c6d8bff0db480e6b124bd08c54e95ef8

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:10 GMT
via
1.1 69f13f852a135432abb1b7bfc5a8b421.cloudfront.net (CloudFront)
server
Server
x-amz-cf-pop
FRA2-C1
status
200
vary
User-Agent
x-cache
Miss from cloudfront
content-type
text/javascript;charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
timing-allow-origin
*
content-length
23
x-amz-cf-id
6IAjbnUZCdVU1MEo0RZr3A67zL8ejufu92o2qOt5H-68xvwXaqu68A==
i
tr.snapchat.com/cm/ Frame 492F
0
0
Document
General
Full URL
https://tr.snapchat.com/cm/i?
Requested by
Host: sc-static.net
URL: https://sc-static.net/scevent.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.186.226.184 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
184.226.186.35.bc.googleusercontent.com
Software
nginx/1.17.3 /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

:method
GET
:authority
tr.snapchat.com
:scheme
https
:path
/cm/i?
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/

Response headers

status
200
server
nginx/1.17.3
date
Tue, 05 Nov 2019 03:34:10 GMT
content-type
text/html
content-length
0
strict-transport-security
max-age=31536000; includeSubDomains
via
1.1 google
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
moment~timeline~tweet.f41b02dcb58512d8e9f6d4178eb28452.js
platform.twitter.com/js/
24 KB
8 KB
Script
General
Full URL
https://platform.twitter.com/js/moment~timeline~tweet.f41b02dcb58512d8e9f6d4178eb28452.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js?_=1572924849863
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40E1) /
Resource Hash
7c46604c0440be3fd2d6a5e217846cde699e81422afd52625b633bc28cfe3446

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:10 GMT
Content-Encoding
gzip
Last-Modified
Tue, 22 Oct 2019 22:27:17 GMT
Server
ECS (fcn/40E1)
Etag
"acaa80339e9cea48739803700d80ebfb+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-control-allow-origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
7914
tweet.25ae5aee3c2602da5d36fbf6c51215cf.js
platform.twitter.com/js/
19 KB
7 KB
Script
General
Full URL
https://platform.twitter.com/js/tweet.25ae5aee3c2602da5d36fbf6c51215cf.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js?_=1572924849863
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41AD) /
Resource Hash
bd13404866644f19bfd9bb0d8c96f58536885414ba14fcae712da48d22e74631

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:05 GMT
Content-Encoding
gzip
Last-Modified
Tue, 22 Oct 2019 22:27:17 GMT
Server
ECS (fcn/41AD)
Etag
"e76dffef1c1edce4c8dc5febdf76528c+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-control-allow-origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
6322
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=44&t=1572924849986&de=494475862807&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatRendered=1&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=1&zMoatSafetyTargetingSet=1&zMoatEmptySlot=1&zMoatNadoDataLoadTime=428&zMoatAllDataLoadTime=428&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&ac=1&bq=11&f=0&zn=0&if=428&na=2017492203&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 05 Nov 2019 03:34:10 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 05 Nov 2019 03:34:10 GMT
page
t.skimresources.com/api/v2/
22 B
383 B
XHR
General
Full URL
https://t.skimresources.com/api/v2/page
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-type
text/plain

Response headers

pragma
no-cache
date
Tue, 05 Nov 2019 03:34:11 GMT
via
1.1 google
x-content-type-options
nosniff
server
Python/3.7 aiohttp/3.5.4
access-control-allow-headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
status
200
access-control-allow-methods
GET, POST, OPTIONS
content-type
text/plain; charset=utf-8, application/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache, must-revalidate
access-control-allow-credentials
true
alt-svc
clear
content-length
22
p
tr.snapchat.com/ Frame 1BA1
0
0
Document
General
Full URL
https://tr.snapchat.com/p
Requested by
Host: sc-static.net
URL: https://sc-static.net/scevent.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.186.226.184 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
184.226.186.35.bc.googleusercontent.com
Software
nginx/1.17.3 /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

:method
POST
:authority
tr.snapchat.com
:scheme
https
:path
/p
content-length
398
pragma
no-cache
cache-control
no-cache
origin
https://arstechnica.com
upgrade-insecure-requests
1
content-type
application/x-www-form-urlencoded
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
accept-encoding
gzip, deflate, br
Origin
https://arstechnica.com
Upgrade-Insecure-Requests
1
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/

Response headers

status
200
server
nginx/1.17.3
date
Tue, 05 Nov 2019 03:34:10 GMT
content-type
text/html
content-length
0
access-control-allow-origin
*
cache-control
no-cache, no-transform
set-cookie
sc_at=v2|H4sIAAAAAAAAAAXBgQ0AIAgDsItIEN3Ec4DoFRxvi/c8DreU8cpihUQkhTNraF7AvHtg27Hl0NYPNrHhUjIAAAA=;Version=1;Comment=;Domain=.snapchat.com;Path=/;Max-Age=33696000;Secure
strict-transport-security
max-age=31536000; includeSubDomains
via
1.1 google
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
/
polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/ Frame E76C
0
0
Document
General
Full URL
https://polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

:method
GET
:authority
polarcdn-terrax.com
:scheme
https
:path
/privacy/v1.0.0/html/optout/readwrite/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
accept-encoding
gzip, deflate, br
cookie
__cfduid=d2244c96fa761d97995cf5441711bb3f81572924850
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate

Response headers

status
200
date
Tue, 05 Nov 2019 03:34:10 GMT
content-type
text/html; charset=utf-8
content-length
1242
vary
Accept-Encoding
access-control-allow-headers
Authorization
access-control-expose-headers
CF-IPCountry, X-Country, CF-Ray
cache-control
max-age=900
access-control-allow-origin
*
access-control-allow-methods
GET
timing-allow-origin
*
content-encoding
gzip
x-varnish
1698859996 1698840657
via
1.1 varnish
cf-cache-status
HIT
age
374
accept-ranges
bytes
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
530bc53e0f71cbcc-VIE
wt
polarcdn-pentos.com/ Frame B534
3 B
66 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=1&n=3&p=UNKNOWN&s=1&u=af0f9180-511b-4320-9d20-e4de95948193&v=2%2Fc74e001&w=1.162.0&y=w&z=v1.6.48&pas=asa-web&pag2=%2F3379%2Fars.dart&pai=d99dc&d=arstechnica.com&l=&pajs=&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&paio=1&pasb=1&cu=fb2d10b26919e25e37e4841e4787291b&t=arx&parcid=0979e&parid=315ec&parin=1&partm=0&par=s&maxts=0.011&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&_=1572924850862
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.193.78 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Tue, 05 Nov 2019 03:34:10 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
age
422535
cf-ray
530bc53eba0ae62c-LHR
status
200
content-length
3
x-amz-id-2
5ZGd4LvLPBIcKeUPE9TcXDaSk8UhwfajAQp6cdM1JeMw/Qz4Id/PXdRLp4NmbibNWZj8CKrT3Pw=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
x-amz-request-id
388BFAFFAA3D0CC8
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
content-type
application/octet-stream
wt
polarcdn-pentos.com/ Frame B534
3 B
599 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=2&n=3&p=UNKNOWN&s=1&u=af0f9180-511b-4320-9d20-e4de95948193&v=2%2Fc74e001&w=1.162.0&y=w&z=v1.6.48&pas=asa-web-polarpmp&pag1=conde_customcontent_market&pag2=brand_arstechnica&paenb=y&pai=d99dc&d=arstechnica.com&l=&pajs=&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&paio=1&pasb=1&cu=fb2d10b26919e25e37e4841e4787291b&t=atx&parcid=0979e&parid=8d27a&parin=2&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&_=1572924850863
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.193.78 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Tue, 05 Nov 2019 03:34:10 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
age
422535
cf-ray
530bc53eba0be62c-LHR
status
200
content-length
3
x-amz-id-2
5ZGd4LvLPBIcKeUPE9TcXDaSk8UhwfajAQp6cdM1JeMw/Qz4Id/PXdRLp4NmbibNWZj8CKrT3Pw=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
x-amz-request-id
388BFAFFAA3D0CC8
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
content-type
application/octet-stream
req
bw-prod.plrsrvcs.com/ Frame B534
2 KB
2 KB
XHR
General
Full URL
https://bw-prod.plrsrvcs.com/req
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6811:dd0f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
77b712cb9fc0263c7a8d9175fad00842e104e583a0df62637318b98a5e60c82b

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
x-openrtb-version
2.3
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors
Content-Type
application/json

Response headers

date
Tue, 05 Nov 2019 03:34:11 GMT
via
1.1 google
x-polar-trace-id
cf-cache-status
DYNAMIC
x-polar-response-id
bfee1a205a9246008f417d68b35c4aeb
status
200
cf-ipcountry
DE
x-polar-h
87134-11
x-polar-t
0.013
content-encoding
gzip
alt-svc
clear
pragma
no-cache
server
cloudflare
x-polar-misses
tq,at
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
*
access-control-expose-headers
CF-IPCountry
cache-control
no-cache, no-store, must-revalidate
cf-ray
530bc53eeb8f5952-VIE
expires
0
5d826c83bcdfff482d6d06b0.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady17632878
player.cnevids.com/script/video/
63 KB
21 KB
Script
General
Full URL
https://player.cnevids.com/script/video/5d826c83bcdfff482d6d06b0.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady17632878
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-227ecd1ec6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.51 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-51.fra2.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
e5fcc096942ef2b455b92e77ec7c052e93a44953b9c566309413fbd09589d463
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:10 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Amz-Cf-Pop
FRA2-C1
X-Cache
Miss from cloudfront
Status
200 OK
Connection
keep-alive
Content-Length
20735
X-XSS-Protection
1; mode=block
X-Request-Id
decca689-cb7a-4729-8876-a18309cf840d
X-Runtime
0.005234
X-Backend-Node
10.110.14.4
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"3c78fcb1e2db68a955b8b7aeb6232b6f"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 3aed5a4f89d72775aaf2cc5a5f642386.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Id
KUkYZ7PZpwrZBrq5mQ1Tg8GPKRuFI8rd-O-hB-HfwMNQrpv6t3Z9TA==
arstechnica_war-stories-civilization.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1569003425/
16 KB
17 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1569003425/arstechnica_war-stories-civilization.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.168.189 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-189.fra54.r.cloudfront.net
Software
cloudinary /
Resource Hash
1c7dcc8216c6f82da2998ceeac2523632c7f9bffe510824b6d082621201f2012

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Mon, 23 Sep 2019 16:41:11 GMT
Via
1.1 varnish, 1.1 fdb19a60fef99ccf6faacc3588fcd922.cloudfront.net (CloudFront)
Age
1048408
Edge-Cache-Tag
390602458176548494884398897259766670181,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
16236
X-Request-Id
e42c1874c2a1e572
X-Served-By
cache-fra19144-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Mon, 23 Sep 2019 11:27:54 GMT
Server
cloudinary
X-Timer
S1569256871.872536,VS0,VE299
ETag
"72002610618f7bf8bf0e52c760e39897"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA54
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
KH9yAKIn-Yjm61SQ6NOQC0hPJDTGSn3TlL7KJLPvuyDszUXAhFHDHQ==
X-Cache-Hits
0
arstechnica_sitrep-dod-resets-ballistic-missile-interceptor-program.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1568662260/
11 KB
11 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1568662260/arstechnica_sitrep-dod-resets-ballistic-missile-interceptor-program.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.168.189 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-189.fra54.r.cloudfront.net
Software
cloudinary /
Resource Hash
7fc88c65d46e83b3f3e9f098f05fd639480332fc3718cd714725e2e4633af4e8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Sat, 21 Sep 2019 01:02:48 GMT
Via
1.1 varnish, 1.1 fdb19a60fef99ccf6faacc3588fcd922.cloudfront.net (CloudFront)
Age
1315237
Edge-Cache-Tag
285695674967648002297586464606017083075,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
10793
X-Served-By
cache-hhn4079-HHN
Last-Modified
Tue, 17 Sep 2019 19:55:15 GMT
Server
cloudinary
X-Timer
S1569027768.066052,VS0,VE1
ETag
"0e1ff58ccf6d97759de3d774a7ff835a"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA54
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
VKRKnE6acf-EnsJnqDiJSU6i-5n8nW996bllzUEHBVQeoJcIp7-Bkg==
X-Cache-Hits
1
arstechnica_dead-cells-how-to-avoid-falling-to-your-death-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1563202921/
16 KB
17 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1563202921/arstechnica_dead-cells-how-to-avoid-falling-to-your-death-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.168.189 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-189.fra54.r.cloudfront.net
Software
cloudinary /
Resource Hash
5f760e6eaa1fd8e199a7135ae74692369612ff5de37b99eb63bcb8ee7d615568

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Fri, 19 Jul 2019 15:13:14 GMT
Via
1.1 varnish, 1.1 fdb19a60fef99ccf6faacc3588fcd922.cloudfront.net (CloudFront)
Age
1048408
Edge-Cache-Tag
512786565011436188602690990842551442357,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
16016
X-Request-Id
558da5101eeb1f1f
X-Served-By
cache-fra19150-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 19 Jul 2019 15:13:07 GMT
Server
cloudinary
X-Timer
S1563549194.385414,VS0,VE180
ETag
"4dba8e36b73a44cca8375175ae0e4b39"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA54
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
CwjbgxygA7PShSpoP2PQM2TKoZU1otzwdecMdYCD-KR53CaVX7WD4g==
X-Cache-Hits
0
arstechnica_warframe-reviews.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1561556730/
14 KB
15 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1561556730/arstechnica_warframe-reviews.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.168.189 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-189.fra54.r.cloudfront.net
Software
cloudinary /
Resource Hash
83a366075eb2387c6d9f848f42b08df0546027333eccf5813edf95ba45709be2

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 17 Sep 2019 00:57:16 GMT
Via
1.1 varnish, 1.1 14484a063800eaed878a3068abf4dfac.cloudfront.net (CloudFront)
Age
796366
Edge-Cache-Tag
409825722100045817936218917770258862228,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
14837
X-Request-Id
7761dd54fcd41be5
X-Served-By
cache-fra19174-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Thu, 27 Jun 2019 19:34:59 GMT
Server
cloudinary
X-Timer
S1568681836.778525,VS0,VE359
ETag
"1d90d6aef7585f963e1270a1a02a4dd4"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA54
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
Q1yJxip0LkKvnG-REiMjpEALIX7NjF9HrQuAH3StV_hZyr7Ottls3g==
X-Cache-Hits
0
arstechnica_war-stories-subnautica.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559747425/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559747425/arstechnica_war-stories-subnautica.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.168.189 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-189.fra54.r.cloudfront.net
Software
cloudinary /
Resource Hash
20660a9ef7ec454c15b2dc62b3db084e0cc9f74c5bb6de71a96fb1a54aef00f8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Fri, 20 Sep 2019 00:27:26 GMT
Via
1.1 varnish, 1.1 fdb19a60fef99ccf6faacc3588fcd922.cloudfront.net (CloudFront)
Age
1048408
Edge-Cache-Tag
384957005148579205807938476483146982592,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15222
X-Request-Id
e660665c575adecf
X-Served-By
cache-fra19156-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Wed, 05 Jun 2019 17:40:02 GMT
Server
cloudinary
X-Timer
S1568939246.290360,VS0,VE216
ETag
"8c45b6c645caba59f4b14d3fbdc09062"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA54
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
zurI-w2mRkBihBKFGMGXNVFbwctYvDYwQrfGze_qanNxZxY72qhU2A==
X-Cache-Hits
0
arstechnica_this-war-of-mine-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559075831/
16 KB
17 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559075831/arstechnica_this-war-of-mine-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.168.189 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-189.fra54.r.cloudfront.net
Software
cloudinary /
Resource Hash
ec84902ae04cc118d965c577e2ece816abd594431ce66bcef1afd4f745e951fd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Thu, 15 Aug 2019 19:33:45 GMT
Via
1.1 varnish, 1.1 14484a063800eaed878a3068abf4dfac.cloudfront.net (CloudFront)
Age
1048408
Edge-Cache-Tag
580474366038461196493179311799260666459,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15985
X-Request-Id
e9c3b3c122e652ae
X-Served-By
cache-fra19160-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Mon, 03 Jun 2019 18:11:08 GMT
Server
cloudinary
X-Timer
S1563305622.451318,VS0,VE215
ETag
"42bc7816573b81a73647b6f7123944c5"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA54
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
2ViOOeFkFQIueIEkEhiHKFSKiLgiwNgw8_NBJA1X1EzOkIToZkcjIg==
X-Cache-Hits
0
arstechnica_obra-dinn-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1558373184/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1558373184/arstechnica_obra-dinn-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.168.189 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-189.fra54.r.cloudfront.net
Software
cloudinary /
Resource Hash
8574074952616e0a56e5b72d9634bff0a683d658d09804c10324293811606d22

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Fri, 20 Sep 2019 00:37:40 GMT
Via
1.1 varnish, 1.1 fdb19a60fef99ccf6faacc3588fcd922.cloudfront.net (CloudFront)
Age
1141577
Edge-Cache-Tag
433557846635605494688582207268998106147,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15609
X-Request-Id
2082b9f1905380c2
X-Served-By
cache-hhn4026-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 28 May 2019 17:36:10 GMT
Server
cloudinary
X-Timer
S1568939860.305119,VS0,VE1
ETag
"8becb0d5f4f7ff3e76e89c89871f465d"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA54
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
_tJkFtXJXOqAFbgbOdIcAAOUNP8A4jnYX1u_sLis7s2tt4KeugZjwQ==
X-Cache-Hits
1
arstechnica_army-s-new-pistol-has-had-some-misfires.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556912500/
8 KB
9 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556912500/arstechnica_army-s-new-pistol-has-had-some-misfires.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.168.189 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-189.fra54.r.cloudfront.net
Software
cloudinary /
Resource Hash
a91d62b47f02a7e638d1749e3791ac328b2dd89dac630578f76e65b1ed91ed89

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Sun, 02 Jun 2019 00:09:44 GMT
Via
1.1 varnish, 1.1 14484a063800eaed878a3068abf4dfac.cloudfront.net (CloudFront)
Age
1046787
Edge-Cache-Tag
575077299308468417590234438077035908298,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
7863
X-Request-Id
19c9873a9e40bdc6
X-Served-By
cache-hhn1537-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Mon, 13 May 2019 19:11:27 GMT
Server
cloudinary
X-Timer
S1559434184.442899,VS0,VE232
ETag
"31902de995c98904a55c605571f06530"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA54
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
K8Eu48eb5WVLQusQWiOaztvVb4ajR3k5Jc_EqR_cavcLtH7FJz5o_A==
X-Cache-Hits
0
arstechnica_war-stories-slay-the-spire-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556741487/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556741487/arstechnica_war-stories-slay-the-spire-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.168.189 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-189.fra54.r.cloudfront.net
Software
cloudinary /
Resource Hash
f9d9e96c4439beeca49a1a10f9dffe6f5cd0b604d13aa13af170d0bc62d8ca1b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Fri, 20 Sep 2019 01:04:51 GMT
Via
1.1 varnish, 1.1 fdb19a60fef99ccf6faacc3588fcd922.cloudfront.net (CloudFront)
Age
3732115
Edge-Cache-Tag
515397136805965062020045600075132664421,404749671192515790889513374839386840902,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15634
X-Request-Id
006a2f92f979dc2f
X-Served-By
cache-fra19120-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Thu, 02 May 2019 18:45:52 GMT
Server
cloudinary
X-Timer
S1568941492.532075,VS0,VE1
ETag
"abee90e53f29ba0127fca9442ab50902"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA54
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
sGLvHmtbYhiBQgMAp0GBcmuI3YsTbGIggm2sRPPIwM6DNBDsUeWpyA==
X-Cache-Hits
1
arstechnica_war-stories-amnesia-the-dark-descent-the-horror-facade.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1555359865/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1555359865/arstechnica_war-stories-amnesia-the-dark-descent-the-horror-facade.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.168.189 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-189.fra54.r.cloudfront.net
Software
cloudinary /
Resource Hash
1defb6bc54a7ee9c066136908360e8455c23ee9ad0dec9924e7255d7948cd4be

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Mon, 07 Oct 2019 00:15:38 GMT
Via
1.1 varnish, 1.1 14484a063800eaed878a3068abf4dfac.cloudfront.net (CloudFront)
Age
2511406
Edge-Cache-Tag
587193118310891607619753694455047488726,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15251
X-Request-Id
ef7e1facec7e168529f375bd4cbea7d4
X-Served-By
cache-fra19148-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 16 Apr 2019 18:59:19 GMT
Server
cloudinary
X-Timer
S1570407339.895634,VS0,VE1
ETag
"3e7cdc13e718680bf5e1efa64468b560"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA54
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
4fimsmxk3uZjUObqs-vaJUnYjKUd1PvyedGAsNXQgFS8E7jDio83WA==
X-Cache-Hits
1
arstechnica_war-stories-c-and-c-tiberian-sun.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1551193450/
19 KB
19 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1551193450/arstechnica_war-stories-c-and-c-tiberian-sun.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.168.189 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-189.fra54.r.cloudfront.net
Software
cloudinary /
Resource Hash
27348ba4b98bd80f1038496ec5dea6ad865680540058fb085b8ca199b8aaf4c5

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 24 Sep 2019 00:13:40 GMT
Via
1.1 varnish, 1.1 fdb19a60fef99ccf6faacc3588fcd922.cloudfront.net (CloudFront)
Age
193436
Edge-Cache-Tag
313687566273846460968749706722669918033,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
19022
X-Request-Id
89fcf8329e847a82
X-Served-By
cache-hhn4045-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Wed, 27 Feb 2019 16:48:24 GMT
Server
cloudinary
X-Timer
S1569284021.990486,VS0,VE1
ETag
"fe52b9acd391d8bee8de15a0f429b377"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA54
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
3cXDNnOZ4vToEp0DMZ4FN2aFyNqExSOWsoKb4gwWMJ0cdwb4ImLMoQ==
X-Cache-Hits
1
arstechnica_army-s-next-vertical-lift-en-route.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550680609/
5 KB
6 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550680609/arstechnica_army-s-next-vertical-lift-en-route.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.168.189 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-189.fra54.r.cloudfront.net
Software
cloudinary /
Resource Hash
4868ca91bcd0d492c501ec5b8d44ac78d3e1226977ae14ff598f5efe78751951

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 23 Oct 2019 00:12:34 GMT
Via
1.1 varnish, 1.1 14484a063800eaed878a3068abf4dfac.cloudfront.net (CloudFront)
Age
796239
Edge-Cache-Tag
312535560964408758261298476626669868625,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
4867
X-Request-Id
fe742dfb60d64f44
X-Served-By
cache-fra19174-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Thu, 21 Feb 2019 15:50:43 GMT
Server
cloudinary
X-Timer
S1569955629.612993,VS0,VE1
ETag
"90ad4d692f7209c01596b99729f26e7b"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, no-transform, immutable, max-age=2592000
X-Amz-Cf-Pop
FRA54
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
fwZy1TWRSyOYs0parnodk5zl8cZpdvtA-rE-PxQGRPpQVNQ_M9bQtg==
X-Cache-Hits
1
arstechnica_war-stories-blade-runner-skinjobs-voxels-and-future-noir.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550244434/
18 KB
19 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550244434/arstechnica_war-stories-blade-runner-skinjobs-voxels-and-future-noir.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.168.189 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-189.fra54.r.cloudfront.net
Software
cloudinary /
Resource Hash
8b72952d3fd656ee6594f0d9735d928113ad1d590705b14f77abf75f1d4d5d69

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Mon, 15 Apr 2019 12:14:21 GMT
Via
1.1 varnish, 1.1 14484a063800eaed878a3068abf4dfac.cloudfront.net (CloudFront)
Age
1048408
Edge-Cache-Tag
292757494989914907279105994976263969890,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
18172
X-Request-Id
b67385adb4bcbe78
X-Served-By
cache-fra19183-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 15 Feb 2019 15:34:33 GMT
Server
cloudinary
X-Timer
S1555330462.663842,VS0,VE300
ETag
"32f1b8954559c8d598e9861f5b8360b9"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA54
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
PZxFQU9MQnlHztGm-WIgs3BCBk0W2h1emnOrvECdWD9bJIN-7WIt-w==
X-Cache-Hits
0
arstechnica_war-stories-dead-space-the-drag-tentacle.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1546889545/
7 KB
8 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1546889545/arstechnica_war-stories-dead-space-the-drag-tentacle.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.168.189 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-189.fra54.r.cloudfront.net
Software
cloudinary /
Resource Hash
9933997608e86beaf1e7f7188a5c657cdad8ccd9d20eb7b1a46adaa83fa850ab

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Fri, 20 Sep 2019 00:37:40 GMT
Via
1.1 varnish, 1.1 fdb19a60fef99ccf6faacc3588fcd922.cloudfront.net (CloudFront)
Age
2152074
Edge-Cache-Tag
561334743792169660751574031162860899763,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
7393
X-Served-By
cache-fra19145-FRA
Last-Modified
Tue, 08 Jan 2019 16:38:58 GMT
Server
cloudinary
X-Timer
S1568939860.343997,VS0,VE1
ETag
"17a6e4b5eb75eb12f5d8c89eb3d0ace8"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA54
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
A9LKxEG9hTfQbNKQgGgBX-Gmo_U-sk_RTgY1lopsG6McRq_bsXfybA==
X-Cache-Hits
1
arstechnica_teach-the-controversy-flat-earthers.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1541592304/
10 KB
11 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1541592304/arstechnica_teach-the-controversy-flat-earthers.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.168.189 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-189.fra54.r.cloudfront.net
Software
cloudinary /
Resource Hash
7364fcbb6c5d775f07816712af8a6419db99268f72c337a4977f706dc3423bb3

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Sun, 14 Apr 2019 18:03:24 GMT
Via
1.1 varnish, 1.1 14484a063800eaed878a3068abf4dfac.cloudfront.net (CloudFront)
Age
2575691
Edge-Cache-Tag
522150850958368321191235208678465217967,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
10595
X-Request-Id
7f8dfd3762d3205b
X-Served-By
cache-fra19174-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 09 Nov 2018 14:44:53 GMT
Server
cloudinary
X-Timer
S1555265005.959404,VS0,VE1
ETag
"6c0c4f8a9d61ed2b5863a8058c624a37"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA54
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
T1iUsx6dYo6yIZ8eP2A1Stf83fP17UORu2DyZ2D9_6_o8rYB3DGveg==
X-Cache-Hits
1
arstechnica_delta-v-the-burgeoning-world-of-small-rockets-paul-allen-s-huge-plane-and-spacex-get-s-a-crucial-green-light.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1537406983/
12 KB
13 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1537406983/arstechnica_delta-v-the-burgeoning-world-of-small-rockets-paul-allen-s-huge-plane-and-spacex-get-s-a-crucial-green-light.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.168.189 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-189.fra54.r.cloudfront.net
Software
cloudinary /
Resource Hash
16f86804dd013db340fee4020a539d3e9d6e5a03d6841e431e50c428e99c26e8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Mon, 08 Apr 2019 00:12:42 GMT
Via
1.1 varnish, 1.1 fdb19a60fef99ccf6faacc3588fcd922.cloudfront.net (CloudFront)
Age
1046787
Edge-Cache-Tag
389498626973997838808844380914497340413,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
12509
X-Request-Id
033829b9717b5c27
X-Served-By
cache-hhn1523-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 21 Sep 2018 16:51:30 GMT
Server
cloudinary
X-Timer
S1554682362.436720,VS0,VE313
ETag
"b9c502ffc902b60d0eb13698b37a945d"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA54
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
O3F1Nle6mlZjXEQee0Ycb3cOlaGEpbvH5eVQYclxAqnzllPCE7RkoQ==
X-Cache-Hits
0
arstechnica_chris-hadfield-explains-his-space-oddity-video.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1522031130/
7 KB
8 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1522031130/arstechnica_chris-hadfield-explains-his-space-oddity-video.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.168.189 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-189.fra54.r.cloudfront.net
Software
cloudinary /
Resource Hash
3ce7e824185893264ab44fbf8370a8f1262831c4c6c367b15f7d4f1e88fadc8c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Mon, 12 Aug 2019 08:21:13 GMT
Via
1.1 varnish, 1.1 14484a063800eaed878a3068abf4dfac.cloudfront.net (CloudFront)
Age
2401892
Edge-Cache-Tag
294316597633303263276952824544497226127,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
7181
X-Served-By
cache-hhn4059-HHN
Last-Modified
Fri, 06 Jul 2018 12:23:22 GMT
Server
cloudinary
X-Timer
S1563409161.815265,VS0,VE1
ETag
"0549828edcecd339d8d10ebe6119de70"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA54
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
h7PpPEXr5RHWlbDG-y1TQop8QLF4c9Fikxn6KoJ2fvLOcL9vLZf9yA==
X-Cache-Hits
1
arstechnica_apollo-mission-episode-1.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1512424612/
14 KB
15 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1512424612/arstechnica_apollo-mission-episode-1.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.168.189 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-189.fra54.r.cloudfront.net
Software
cloudinary /
Resource Hash
82cd1a97f81e5b63a621311be2993916eea0907b5eadd53bb6b280f4bb0f8391

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Fri, 18 Oct 2019 23:25:29 GMT
Via
1.1 varnish, 1.1 fdb19a60fef99ccf6faacc3588fcd922.cloudfront.net (CloudFront)
Age
195375
Edge-Cache-Tag
424632948265147424317824738369264083785,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
14040
X-Request-Id
2ff68b9eab7ff221
X-Served-By
cache-hhn4068-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 05 Dec 2017 01:52:25 GMT
Server
cloudinary
X-Timer
S1571441129.284408,VS0,VE1
ETag
"ecc047c6eed3dc571a78eab647201220"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA54
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
wQeDhJiYCIoQDuCPZHDQtHIQUOz6sc0hwQr7hfaMiJEY2CTiQ3tVAQ==
X-Cache-Hits
1
arstechnica_richard-garriot-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1513807048/
14 KB
14 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1513807048/arstechnica_richard-garriot-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.168.189 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-189.fra54.r.cloudfront.net
Software
cloudinary /
Resource Hash
4980853759711c8e9e2779239acd62e9e802fba38371763c65ecdd016a83fdbd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Sat, 13 Apr 2019 18:43:36 GMT
Via
1.1 varnish, 1.1 14484a063800eaed878a3068abf4dfac.cloudfront.net (CloudFront)
Age
1048408
Edge-Cache-Tag
489732375708630852448407029403767769375,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
13885
X-Request-Id
d793eaa840c89820
X-Served-By
cache-fra19169-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 06 Jul 2018 19:56:42 GMT
Server
cloudinary
X-Timer
S1555181016.188491,VS0,VE248
ETag
"13d45a1733ad4d2f3ae707584d6a8a32"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA54
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
uyt8kV2CBxO_5PpBlolvljmrdPYZSmemfCC6qplk71sqT52lGAH7IQ==
X-Cache-Hits
0
truncated
/
408 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c21029f21dc145723d40362da85504ee5a5bd33f5db6636beae3a01c7aba1fa2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1572924849986&de=494475862807&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=native_xrail_0&zMoatRendered=2&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=1&zMoatPageDataTargetingSet=2&zMoatSafetyTargetingSet=2&zMoatEmptySlot=1&zMoatNadoDataLoadTime=428&zMoatAllDataLoadTime=428&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&ac=1&bq=11&f=0&zn=0&if=428&na=221406468&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 05 Nov 2019 03:34:11 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 05 Nov 2019 03:34:11 GMT
truncated
/ Frame B534
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6792679623b7fca643f9bbdbbbbd900780d99aadf1d70fdfb5bfad861f953fe8

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/png
syndication
syndication.twitter.com/i/jot/
43 B
152 B
Image
General
Full URL
https://syndication.twitter.com/i/jot/syndication?l=%7B%22_category_%22%3A%22syndicated_impression%22%2C%22triggered_on%22%3A1572924850982%2C%22dnt%22%3Afalse%2C%22event_namespace%22%3A%7B%22client%22%3A%22tfw%22%2C%22page%22%3A%22tweet%22%2C%22action%22%3A%22impression%22%7D%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.136 , United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
content-length
65
x-xss-protection
0
x-response-time
117
pragma
no-cache
last-modified
Tue, 05 Nov 2019 03:34:16 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=631138519
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
302d5f714d4f7d571e441fb7eaa09412
x-transaction
00af65f100a3e52f
expires
Tue, 31 Mar 1981 05:00:00 GMT
tweets.json
cdn.syndication.twimg.com/
9 KB
3 KB
Script
General
Full URL
https://cdn.syndication.twimg.com/tweets.json?callback=__twttr.callbacks.cb0&ids=1188853620541775872&lang=en&suppress_response_codes=true&theme=light&tz=GMT%2B0100
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js?_=1572924849863
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
tsa_f /
Resource Hash
387d33f6cfbee6df322b44394f49f25d83919252699bd1628d364ee8b97b5e49
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:11 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
content-disposition
attachment; filename=jsonp.jsonp
content-length
2391
x-xss-protection
0
x-response-time
128
last-modified
Tue, 05 Nov 2019 03:34:11 GMT
server
tsa_f
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=631138519
content-type
application/javascript;charset=utf-8
cache-control
must-revalidate, max-age=60
x-connection-hash
c0fd13b6ccbe62a663fe269ba8940c08
timing-allow-origin
*
x-transaction
00cffd4500a9261e
expires
Tue, 05 Nov 2019 03:35:11 GMT
Cookie set /
www.medtargetsystem.com/beacon/portal/ Frame D198
0
0
Document
General
Full URL
https://www.medtargetsystem.com/beacon/portal/?_url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&_sid=8c6a64f3-434a-41e9-a29f-eb0e717434ea&_vid=208d0682-7f05-4e51-bbbf-b2edf2fea976&_ak=119-556-B0E9F642&_flash=false&_th=1572924850|1572924850|1
Requested by
Host: www.medtargetsystem.com
URL: https://www.medtargetsystem.com/javascript/beacon.js?v2.5.12
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.1.219.33 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-1-219-33.compute-1.amazonaws.com
Software
Apache/2.4.7 (Ubuntu) / PHP/7.0.19-1+deb.sury.org~trusty+2
Resource Hash

Request headers

Host
www.medtargetsystem.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/

Response headers

Cache-Control
no-store, no-cache, must-revalidate
Content-Encoding
gzip
Content-Type
text/html; charset=UTF-8
Date
Tue, 05 Nov 2019 03:34:11 GMT
Expires
Thu, 19 Nov 1981 08:52:00 GMT
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Pragma
no-cache
Server
Apache/2.4.7 (Ubuntu)
Set-Cookie
DMDSESSID=uqvgj35l74lfgs11a82fkes7q6; path=/; HttpOnly
Vary
X-Forwarded-Proto,Accept-Encoding
X-Powered-By
PHP/7.0.19-1+deb.sury.org~trusty+2
Content-Length
6990
Connection
keep-alive
collect.gif
www.medtargetsystem.com/analytics/
0
245 B
Image
General
Full URL
https://www.medtargetsystem.com/analytics/collect.gif?e=1&aid=&vid=208d0682-7f05-4e51-bbbf-b2edf2fea976&sid=8c6a64f3-434a-41e9-a29f-eb0e717434ea&vh=1&vt=1572924850&pt=1572924850&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&r=&t=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea%20%7C%20Ars%20Technica&p=3261.34&pm=&ab=&ak=119-556-B0E9F642
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.1.219.33 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-1-219-33.compute-1.amazonaws.com
Software
Apache/2.4.7 (Ubuntu) / PHP/7.0.19-1+deb.sury.org~trusty+2
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:11 GMT
Server
Apache/2.4.7 (Ubuntu)
Connection
keep-alive
X-Powered-By
PHP/7.0.19-1+deb.sury.org~trusty+2
Content-Length
0
Vary
X-Forwarded-Proto
Content-Type
text/html; charset=UTF-8
en.json
cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910/
34 KB
6 KB
XHR
General
Full URL
https://cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910/en.json
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (lha/8D21) /
Resource Hash
4699f0aaad4f21babd305911b532aa40bda047e43d2265d134f897b7f6140aaa

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Tue, 05 Nov 2019 03:34:15 GMT
content-encoding
gzip
content-md5
rg83PDJYKNUkLemy+CQBpg==
x-cache
HIT
status
200
content-length
6098
x-ms-lease-status
unlocked
last-modified
Fri, 25 Oct 2019 19:05:19 GMT
server
ECAcc (lha/8D21)
etag
0x8D7597E47737C99
vary
Accept-Encoding
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
ef495f88-a01e-0072-5785-93a9d8000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Tue, 05 Nov 2019 07:34:15 GMT
countrycode
geolocation.onetrust.com/cookieconsentpub/v1/geo/
27 B
319 B
Script
General
Full URL
https://geolocation.onetrust.com/cookieconsentpub/v1/geo/countrycode
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:b944 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
5c2b6fa954e718b3b0a28d55a5923ac82b3da98d65878fe86b550514b3bcd7a5

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:11 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json
status
200
cf-ray
530bc5412d8acbc0-VIE
content-length
27
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-11-05T03%3A34%3A11.057Z&_t=slot_loaded&cBr=Ars%20Technica&cKe=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cCh=information%20technology&cTi=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cCl=603&cId=1593135&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&pRt=referral&pHp=%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4200&pSw=1600&pSh=1200&uID=52b23511-f065-4932-8175-b707cf8a0d32&sID=534fe3ef-87fc-4ec1-b3f3-9ad39166ac24&pID=b80403a4-97b9-4408-b5c2-faea5979c25d&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fars.dart%2Finformation-technology%22%2C%22advertiserId%22%3A1454517775%2C%22campaignId%22%3A2338761482%2C%22creativeId%22%3A138237302059%2C%22elementId%22%3A%22native_xrail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Atrue%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Atrue%2C%22isFirstMoneyRequested%22%3Atrue%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3A4736014287%2C%22name%22%3A%22native_xrail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x140%22%2C%22slug%22%3A%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%7D&dim3=%7B%22footerStart%22%3A1572924849743%2C%22headerStart%22%3A1572924849726%2C%22navigationStart%22%3A1572924847742%2C%22pubAdsReady%22%3A1572924850056%2C%22injected%22%3A1572924850574%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A1572924851057%7D&dim4=%7B%22pos%22%3A%5B%22sponsor%22%5D%2C%22ctx_slot_type%22%3A%5B%22native_xrail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22native_xrail_0%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%220%22%5D%2C%22amznp%22%3A%5B%220%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22unsafe%22%5D%2C%22m_categories%22%3A%5B%22moat_unsafe%22%2C%22gv_crime%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%5D%2C%22cnt_tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%220lw01o%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22zlqtg4%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_GIOPHEv_0c_%22%5D%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.158.200 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-158-200.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 05 Nov 2019 03:34:11 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
57
p.ad.gt/api/v1/p/
23 KB
8 KB
Script
General
Full URL
https://p.ad.gt/api/v1/p/57
Requested by
Host: a.ad.gt
URL: https://a.ad.gt/api/v1/u/matches/57
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.210.147.177 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-210-147-177.us-west-2.compute.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
0a8db7cd568198d24386dc5b125480035ccd33a89527d18feb3ca9d44245bbc0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:11 GMT
content-encoding
gzip
last-modified
Sat, 02 Nov 2019 03:40:18 GMT
server
nginx/1.14.1
etag
W/"1572666018.0-23948-2545748540"
status
200
access-control-allow-methods
GET, POST, OPTIONS
content-type
application/javascript
access-control-allow-origin
*
access-control-expose-headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Range,Range
cache-control
public, max-age=43200
access-control-allow-headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Range,Range
expires
Tue, 05 Nov 2019 15:34:11 GMT
match
ids.ad.gt/api/v1/
Redirect Chain
  • https://secure.adnxs.com/getuid?https://ids.ad.gt/api/v1/match?id=3770c5c8-e8d3-4d1f-b991-a6d9329552c8&adnxs_id=$UID
  • https://secure.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fmatch%3Fid%3D3770c5c8-e8d3-4d1f-b991-a6d9329552c8%26adnxs_id%3D%24UID
  • https://ids.ad.gt/api/v1/match?id=3770c5c8-e8d3-4d1f-b991-a6d9329552c8&adnxs_id=5098920238496472947
43 B
612 B
Image
General
Full URL
https://ids.ad.gt/api/v1/match?id=3770c5c8-e8d3-4d1f-b991-a6d9329552c8&adnxs_id=5098920238496472947
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.167.98.6 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-167-98-6.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:13 GMT
Cache-Control
public, max-age=43200
Expires
Tue, 05 Nov 2019 15:34:13 GMT
Server
nginx/1.8.1
Connection
keep-alive
transfer-encoding
chunked
Content-Type
image/gif

Redirect headers

Pragma
no-cache
Date
Tue, 05 Nov 2019 03:34:13 GMT
X-Proxy-Origin
89.39.105.128; 89.39.105.128; 302.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.222.247:80
AN-X-Request-Uuid
9daa950f-f534-4d56-ac94-6c5c70dd074f
Server
nginx/1.13.4
Access-Control-Allow-Origin
*
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Location
https://ids.ad.gt/api/v1/match?id=3770c5c8-e8d3-4d1f-b991-a6d9329552c8&adnxs_id=5098920238496472947
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
t_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=8gkxb6n&ttd_tpi=1&gpdr=0&ttd_puid=3770c5c8-e8d3-4d1f-b991-a6d9329552c8
  • https://ids.ad.gt/api/v1/t_match?tdid=5780cc30-ee93-4947-a121-516e0e6f4c0c&id=3770c5c8-e8d3-4d1f-b991-a6d9329552c8
43 B
603 B
Image
General
Full URL
https://ids.ad.gt/api/v1/t_match?tdid=5780cc30-ee93-4947-a121-516e0e6f4c0c&id=3770c5c8-e8d3-4d1f-b991-a6d9329552c8
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.167.98.6 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-167-98-6.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:12 GMT
Cache-Control
public, max-age=43200
Expires
Tue, 05 Nov 2019 15:34:12 GMT
Server
nginx/1.8.1
Connection
keep-alive
Content-Length
43
Content-Type
image/gif

Redirect headers

pragma
no-cache
date
Tue, 05 Nov 2019 03:34:11 GMT
x-aspnet-version
4.0.30319
status
302
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
location
https://ids.ad.gt/api/v1/t_match?tdid=5780cc30-ee93-4947-a121-516e0e6f4c0c&id=3770c5c8-e8d3-4d1f-b991-a6d9329552c8
cache-control
private,no-cache, must-revalidate
content-type
text/html
content-length
259
pbm_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3D3770c5c8-e8d3-4d1f-b991-a6d9329552c8
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?ird=1&rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3D3770c5c8-e8d3-4d1f-b991-a6d9329552c8
  • https://ids.ad.gt/api/v1/pbm_match?pbm=4A4C5D02-0557-4A07-A92A-EA63988A6036&id=3770c5c8-e8d3-4d1f-b991-a6d9329552c8
0
0

g_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://cm.g.doubleclick.net/pixel?google_nid=audigent_w_appnexus_3985&google_cm&google_sc&google_ula=450542624&id=3770c5c8-e8d3-4d1f-b991-a6d9329552c8
  • https://ids.ad.gt/api/v1/g_match?id=3770c5c8-e8d3-4d1f-b991-a6d9329552c8&google_gid=CAESEKp4UOsWRwZH90ut1bvsZdk&google_cver=1&google_ula=450542624,0
43 B
620 B
Image
General
Full URL
https://ids.ad.gt/api/v1/g_match?id=3770c5c8-e8d3-4d1f-b991-a6d9329552c8&google_gid=CAESEKp4UOsWRwZH90ut1bvsZdk&google_cver=1&google_ula=450542624,0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.167.98.6 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-167-98-6.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:13 GMT
Cache-Control
public, max-age=43200
Expires
Tue, 05 Nov 2019 15:34:13 GMT
Server
nginx/1.8.1
Connection
keep-alive
transfer-encoding
chunked
Content-Type
image/gif

Redirect headers

pragma
no-cache
date
Tue, 05 Nov 2019 03:34:11 GMT
server
HTTP server (unknown)
status
302
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
location
https://ids.ad.gt/api/v1/g_match?id=3770c5c8-e8d3-4d1f-b991-a6d9329552c8&google_gid=CAESEKp4UOsWRwZH90ut1bvsZdk&google_cver=1&google_ula=450542624,0
cache-control
no-cache, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
357
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
emx_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://cs.emxdgt.com/um?redirect=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Femx_match%3Femxid%3D%24UID%26id%3D3770c5c8-e8d3-4d1f-b991-a6d9329552c8
  • https://ib.adnxs.com/getuid?https://cs.emxdgt.com/umcheck?apnxid=$UID&redirect=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Femx_match%3Femxid%3D%24EMXUID%26id%3D3770c5c8-e8d3-4d1f-b991-a6d9329552c8
  • https://cs.emxdgt.com/umcheck?apnxid=5098920238496472947&redirect=https://ids.ad.gt/api/v1/emx_match?emxid=$EMXUID&id=3770c5c8-e8d3-4d1f-b991-a6d9329552c8
  • https://ids.ad.gt/api/v1/emx_match?emxid=5098920238496472947brt35321572924852045373f1
43 B
596 B
Image
General
Full URL
https://ids.ad.gt/api/v1/emx_match?emxid=5098920238496472947brt35321572924852045373f1
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.167.98.6 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-167-98-6.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:13 GMT
Cache-Control
public, max-age=43200
Expires
Tue, 05 Nov 2019 15:34:13 GMT
Server
nginx/1.8.1
Connection
keep-alive
transfer-encoding
chunked
Content-Type
image/gif

Redirect headers

status
302
date
Tue, 05 Nov 2019 03:34:11 GMT
content-length
0
location
https://ids.ad.gt/api/v1/emx_match?emxid=5098920238496472947brt35321572924852045373f1
content-type
text/html
cm
p.rfihub.com/
0
0

/
www.facebook.com/tr/ Frame 50C5
0
0
Document
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

:method
POST
:authority
www.facebook.com
:scheme
https
:path
/tr/
content-length
2480
pragma
no-cache
cache-control
no-cache
origin
https://arstechnica.com
upgrade-insecure-requests
1
content-type
application/x-www-form-urlencoded
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
accept-encoding
gzip, deflate, br
cookie
fr=0xw3mg1JNLate502B..BdwO2y...1.0.BdwO2y.
Origin
https://arstechnica.com
Upgrade-Insecure-Requests
1
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/

Response headers

status
200
content-type
text/plain
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
strict-transport-security
max-age=31536000; includeSubDomains
content-length
0
server
proxygen-bolt
alt-svc
h3-23=":443"; ma=3600
date
Tue, 05 Nov 2019 03:34:11 GMT
get
odb.outbrain.com/utils/
16 KB
10 KB
Script
General
Full URL
https://odb.outbrain.com/utils/get?url=http%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&srcUrl=http%3A%2F%2Ffeeds.arstechnica.com%2Farstechnica%2Findex%2F&settings=true&recs=true&widgetJSId=JS_1&key=NANOWDGT01&idx=0&version=104065&apv=false&sig=2mMor1eT&format=vjapi&va=true&rand=35012&pdobuid=-1&osLang=en-US&winW=1600&winH=1200&scrW=1600&scrH=1200&adblck=false&secured=true&cmpStat=1&ref=
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1572924849862
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
aad0633e0ca558c17c9b28e3ab9d788504fe3a0f9e13d26c791d4e93034aa38a
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

strict-transport-security
max-age=0; includeSubDomains;
content-encoding
gzip
traffic-path
CHIDC2, MDW, HHN, Europe2
x-cache
MISS, MISS
p3p
policyref="http://www.outbrain.com/w3c/p3p.xml",CP="NOI NID CURa DEVa TAIa PSAa PSDa OUR IND UNI"
status
200
x-cache-hits
0, 0
x-traceid
92db5cd2e285aeaba9b31ef0368aa57c
content-length
9200
x-served-by
cache-mdw17339-MDW, cache-hhn4059-HHN
pragma
no-cache
x-timer
S1572924852.933696,VS0,VE165
date
Tue, 05 Nov 2019 03:34:12 GMT
vary
Accept-Encoding, User-Agent
content-type
text/x-json; charset=UTF-8
via
1.1 varnish, 1.1 varnish
cache-control
no-cache
backend-ip
157.52.75.39
accept-ranges
bytes, bytes
expires
Thu, 01 Jan 1970 00:00:00 GMT
embed-api.json
player.cnevids.com/
6 KB
3 KB
Fetch
General
Full URL
https://player.cnevids.com/embed-api.json?videoId=5d826c83bcdfff482d6d06b0&embedLocation=arstechnica
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5d826c83bcdfff482d6d06b0.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady17632878
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.51 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-51.fra2.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
9b1664c232b04784e459b6bcf3c576974066e0ca8420cc66b8c8be6484a52adc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:11 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Amz-Cf-Pop
FRA2-C1
X-Cache
Miss from cloudfront
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
2081
X-XSS-Protection
1; mode=block
X-Request-Id
0542c163-51cc-4f81-abe8-d0fdf923f6b8
X-Runtime
0.015678
X-Backend-Node
10.110.120.110
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"4c8a1113ee42c7fc6b60e643a8bebb45"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Access-Control-Allow-Methods
GET, OPTIONS
Content-Type
application/json; charset=utf-8
Via
1.1 c7f7b4cf7fd5efe64bac95586db3f62b.cloudfront.net (CloudFront)
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
Access-Control-Allow-Origin
*
X-Amz-Cf-Id
BZwmDLXQAGmFkCoNkS2S6u_F-9wJW4srSsn6OSMtb75zczuUsNSN2A==
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 1AC4
272 KB
93 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5d826c83bcdfff482d6d06b0.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady17632878
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
c5ce02d4faa9333de3e11f24c4cb2f335edb64ff6c0e9174365e8a34c550e75b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
94526
x-xss-protection
0
expires
Tue, 05 Nov 2019 03:34:12 GMT
gpt_proxy.js
imasdk.googleapis.com/js/sdkloader/
74 KB
27 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/gpt_proxy.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5d826c83bcdfff482d6d06b0.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady17632878
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
5735874647dad715c28636225f46b89c6a2c7113180ead64dddb120e6bc3143e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:26:55 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 31 Oct 2019 20:01:14 GMT
server
sffe
age
437
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27181
x-xss-protection
0
expires
Tue, 05 Nov 2019 03:41:55 GMT
player-style-3b3a013ac40046610e8f2fefe02c3b07.css
d2c8v52ll5s99u.cloudfront.net/player/ Frame 1AC4
74 KB
12 KB
Stylesheet
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-3b3a013ac40046610e8f2fefe02c3b07.css
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5d826c83bcdfff482d6d06b0.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady17632878
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.168.123 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-123.fra54.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
596b76b93c7801ba85fb53f2f6e2281d4dbffc96ddc18bb056e8cb0e94be34fd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 05 Jun 2019 16:07:32 GMT
Content-Encoding
gzip
Age
13174001
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
11365
Last-Modified
Wed, 05 Jun 2019 16:03:54 GMT
Server
AmazonS3
ETag
"cff060eda5015972d532696ec91d375b"
Content-Type
text/css; charset=utf-8
Via
1.1 7419ebe6dc61a036c7f081375facfd52.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
X-Amz-Cf-Pop
FRA54
Accept-Ranges
bytes
X-Amz-Cf-Id
cbwQrfrG-VeGfsWuxJvNBmYwNDi9mCPYPGfOcPiFclfCpBiUgnqZHg==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
main-cab2b85e1b200eef70e6.js
d2c8v52ll5s99u.cloudfront.net/player/ Frame 1AC4
915 KB
230 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5d826c83bcdfff482d6d06b0.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady17632878
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.168.123 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-123.fra54.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
ccdae88a27f5cdd02c7c8e2525a1eeca05eb0a1cf0efd524379091a7ed2a6ede

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 15 Oct 2019 20:17:06 GMT
Content-Encoding
gzip
Age
1049733
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
234888
Last-Modified
Thu, 10 Oct 2019 18:39:09 GMT
Server
AmazonS3
ETag
"ba04c8e2bdec7ec3d534dc59cce1c2f4"
Content-Type
application/javascript
Via
1.1 7419ebe6dc61a036c7f081375facfd52.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
X-Amz-Cf-Pop
FRA54
Accept-Ranges
bytes
X-Amz-Cf-Id
auXBTgWqgX9u51OfHe1ykr2sSRcTAF8PL3ftLWRpH554KmovjSJyGA==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/png
wt
polarcdn-pentos.com/ Frame B534
3 B
197 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=3&n=3&p=UNKNOWN&s=1&u=af0f9180-511b-4320-9d20-e4de95948193&v=2%2Fc74e001&w=1.162.0&y=w&z=v1.6.48&pas=asa-web-polarpmp&pag1=conde_customcontent_market&pag2=brand_arstechnica&paenb=y&paena=a.af3a9240-60db-4345-8e53-c64d3524b903.bfee1a&paensm=n&pai=d99dc&d=arstechnica.com&l=&pajs=&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&paio=1&pasb=1&cu=fb2d10b26919e25e37e4841e4787291b&t=arx&parcid=0979e&parid=8d27a&parin=2&partm=1&par=s&maxts=0.257&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&_=1572924850864
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.193.78 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Tue, 05 Nov 2019 03:34:11 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
age
422536
cf-ray
530bc53fccaae62c-LHR
status
200
content-length
3
x-amz-id-2
5ZGd4LvLPBIcKeUPE9TcXDaSk8UhwfajAQp6cdM1JeMw/Qz4Id/PXdRLp4NmbibNWZj8CKrT3Pw=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
x-amz-request-id
388BFAFFAA3D0CC8
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
content-type
application/octet-stream
1093f68654a04762b5851194ccd20712
polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/creative/ Frame B534
15 KB
4 KB
XHR
General
Full URL
https://polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/creative/1093f68654a04762b5851194ccd20712?order=4416eecf72b543d28b6f8d24b6338e52
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
7d204d10ce1e06c64250c57fddd8bd8ab65cfcd62de195c48affc989b714c8c1

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

timing-allow-origin
*
date
Tue, 05 Nov 2019 03:34:11 GMT
content-encoding
gzip
server
cloudflare
status
200
etag
W/"4725d075f9f18ec8455f517857aa6b8e"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-Country, CF-Ray
cache-control
max-age=900
x-country
DE
cf-ray
530bc53fcb958cb0-VIE
wt
polarcdn-pentos.com/ Frame B534
3 B
67 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=4&n=3&p=NA-ARSTECH-11238837&s=1&u=af0f9180-511b-4320-9d20-e4de95948193&v=2%2Fc74e001&w=1.162.0&y=w&z=v1.6.48&pas=asa-web-polarpmp&pag1=conde_customcontent_market&pag2=brand_arstechnica&paenb=y&paena=a.af3a9240-60db-4345-8e53-c64d3524b903.bfee1a&paenli=19cd92073d5649d39973010253748202&paenlip=d57b9684eb874247863be631fb7330bc&paeno=4416eecf72b543d28b6f8d24b6338e52&paenop=0e57501a9cdf4b33afca49250c7f2cb7&paes=fd9a1a7c3cf24f9fb674bbc3a4ebe163&paensm=n&pai=d99dc&d=arstechnica.com&l=Key-native_xrail+%5BXrail%5D&pajs=body&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&paio=1&pasb=1&pecy=DE&c=e0c41da1b9f746449b9588be331fa01d&pacexp=1cfe1ba85f674243bd4950db9aebfbcc&t=i&pasp=6fe1dded4b5f4d1a8a01dfa8492cbdab&papss=a&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&_=1572924850865
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.193.78 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Tue, 05 Nov 2019 03:34:11 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
age
422536
cf-ray
530bc5413ff3e62c-LHR
status
200
content-length
3
x-amz-id-2
5ZGd4LvLPBIcKeUPE9TcXDaSk8UhwfajAQp6cdM1JeMw/Qz4Id/PXdRLp4NmbibNWZj8CKrT3Pw=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
x-amz-request-id
388BFAFFAA3D0CC8
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
content-type
application/octet-stream
5cf597ed5159acc4ec916bc9
polarcdn-terrax.com/image/v1.0.0/bin/
7 KB
7 KB
Image
General
Full URL
https://polarcdn-terrax.com/image/v1.0.0/bin/5cf597ed5159acc4ec916bc9?v=a860e&w=300
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
16a1ef4e1165cab9885c002398110ab7343f6df1bb3b15c7743ce33d0d9bdfb1

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:11 GMT
via
1.1 varnish
vary
Accept-Encoding
cf-cache-status
HIT
age
31081
status
200
content-type
image/jpeg
content-length
7276
timing-allow-origin
*
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
432000
access-control-allow-methods
GET
x-varnish
1698023156 1697930044
access-control-allow-origin
*
cache-control
public, max-age=432000
accept-ranges
bytes
cf-ray
530bc5413af9cbcc-VIE
store
match.deepintent.com/usersync/114/
0
230 B
Image
General
Full URL
https://match.deepintent.com/usersync/114/store?id=UNK&ext1=8c6a64f3-434a-41e9-a29f-eb0e717434ea
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.71.111.112 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-71-111-112.compute-1.amazonaws.com
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

status
200
date
Tue, 05 Nov 2019 03:34:14 GMT
server
nginx
content-type
image/gif
content-length
0
p3p
policyref='http://cdn.deepintent.com/p3p.xml', CP='NON CUR DEV TAI'
ads
securepubads.g.doubleclick.net/gampad/
12 KB
7 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2975460448728257&correlator=4477059840655887&output=ldjh&impl=fifs&adsid=NT&eid=21063205%2C21065018&vrg=2019103101&guci=1.2.0.0.2.2.0.0&plat=1%3A536903688%2C2%3A536903688%2C8%3A134250504&sc=1&sfv=1-0-36&ecs=20191105&iu_parts=3379%2Cconde.ars%2Crail%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=300x250%7C300x600&prev_scp=pos%3Drail%26ctx_slot_type%3Dsiderail%26ctx_slot_rn%3D0%26m_mv%3DslotNoHistData%26m_gv%3DslotNoHistData%26amznbid%3D2%26amznp%3D2%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dsiderail_0&eri=1&cust_params=m_data%3D1%26m_safety%3Dunsafe%26m_categories%3Dmoat_unsafe%252Cgv_crime%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.30.9%26ctx_page_slug%3Dindian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%26cnt_tags%3Ddtrack%252Cindia%252Cnorth-korea%252Cnuclear-energy%252Cnuclear-reactor-control-systems%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3Dmalware%252Cpukhraj_singh%252Cindia%252Cpage_layout%252Cindian%252Ckudankulam_nuclear_power_plant%252Cnorth_korea%252Cnuclear_reactor%252Ccyber_attack%252Cnuke%252Ckudankulam%252Ckknpp%252Cdtrack%252Cvirustotal%252Csean_gallagher%252Ctweet%252Cutc%252Crussia%252Cn._korea%252Chard-code%26vnd_4d_ctx_entities%3Dmalware%252Cpukhraj_singh%252Cindia%252Cpage_layout%252Cindian%252Ckudankulam_nuclear_power_plant%252Cnorth_korea%252Cnuclear_reactor%252Ccyber_attack%252Cnuke%252Ckudankulam%252Ckknpp%252Cdtrack%252Cvirustotal%252Csean_gallagher%252Ctweet%252Cutc%252Crussia%252Cn._korea%252Chard-code%26vnd_4d_ctx_keywords%3Dmalware%252Cpukhraj_singh%252Cindia%252Cpage_layout%252Cindian%252Ckudankulam_nuclear_power_plant%252Cnorth_korea%252Cnuclear_reactor%252Ccyber_attack%252Cnuke%252Ckudankulam%252Ccontrol%252Chttps%253A%252F%252Ft.co%252Frfateoszrw_pic.twitter.com%252Fomvvmwizsi_%25E2%2580%2594%252Ckknpp%252Cdtrack%252Cinformation%252Ccontroller-level_access%252Cnetwork%252Cplant%252Cvirustotal%26vnd_4d_usr_topics%3D%26vnd_prx_segments%3D300003%252C112200%252C121100%252C131100%252C112216%252C210000%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252Cqx7745%252C0lw01o%252Cwmhp4i%252Cdcxr0c%252C2hkgm5%252Czlqtg4%252Cap05we%252Cfdf1wd%252C65f9pd%252Cuas8ja%252Cgiophev_0c%26ctx_advertisers%3D1454517775%26ctx_line_items%3D4736014287%26ctx_creatives%3D138237302059%26vnd_4d_sid%3D534fe3ef-87fc-4ec1-b3f3-9ad39166ac24%26vnd_4d_pid%3Db80403a4-97b9-4408-b5c2-faea5979c25d&cookie=ID%3D998416d74a37b026%3AT%3D1572924850%3AS%3DALNI_MasQzpfhKsOcL3UvQf_km-HlPIniA&cookie_enabled=1&bc=31&abxe=1&lmt=1572924851&dt=1572924851466&dlt=1572924849621&idt=398&frm=20&biw=1585&bih=1200&oid=3&adxs=1063&adys=370&adks=1483574547&ucis=3&ifi=3&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&dssz=75&icsg=739146691772416&mso=262144&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=300x250&msz=300x250&ga_vid=2042026595.1572924850&ga_sid=1572924850&ga_hid=780885733&fws=516&ohw=300
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019103101.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.98 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s45-in-f2.1e100.net
Software
cafe /
Resource Hash
b56a2a0bed994af7fe9e091efbae4d3da858e99490b7b4d7d961a389a178b6fa
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:11 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
6861
x-xss-protection
0
google-lineitem-id
-1
pragma
no-cache
server
cafe
google-creative-id
-1
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
12 KB
7 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2975460448728257&correlator=4477059840655887&output=ldjh&impl=fifs&adsid=NT&eid=21063205%2C21065018&vrg=2019103101&guci=1.2.0.0.2.2.0.0&plat=1%3A536903688%2C2%3A536903688%2C8%3A134250504&sc=1&sfv=1-0-36&ecs=20191105&iu_parts=3379%2Cconde.ars%2Chero%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=728x90%7C970x250%7C9x1%7C10x1&prev_scp=pos%3Dhero%26ctx_slot_type%3Dpost_nav%26ctx_slot_rn%3D0%26m_mv%3DslotNoHistData%26m_gv%3DslotNoHistData%26amznbid%3D2%26amznp%3D2%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dpost_nav_0&eri=1&cust_params=m_data%3D1%26m_safety%3Dunsafe%26m_categories%3Dmoat_unsafe%252Cgv_crime%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.30.9%26ctx_page_slug%3Dindian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%26cnt_tags%3Ddtrack%252Cindia%252Cnorth-korea%252Cnuclear-energy%252Cnuclear-reactor-control-systems%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3Dmalware%252Cpukhraj_singh%252Cindia%252Cpage_layout%252Cindian%252Ckudankulam_nuclear_power_plant%252Cnorth_korea%252Cnuclear_reactor%252Ccyber_attack%252Cnuke%252Ckudankulam%252Ckknpp%252Cdtrack%252Cvirustotal%252Csean_gallagher%252Ctweet%252Cutc%252Crussia%252Cn._korea%252Chard-code%26vnd_4d_ctx_entities%3Dmalware%252Cpukhraj_singh%252Cindia%252Cpage_layout%252Cindian%252Ckudankulam_nuclear_power_plant%252Cnorth_korea%252Cnuclear_reactor%252Ccyber_attack%252Cnuke%252Ckudankulam%252Ckknpp%252Cdtrack%252Cvirustotal%252Csean_gallagher%252Ctweet%252Cutc%252Crussia%252Cn._korea%252Chard-code%26vnd_4d_ctx_keywords%3Dmalware%252Cpukhraj_singh%252Cindia%252Cpage_layout%252Cindian%252Ckudankulam_nuclear_power_plant%252Cnorth_korea%252Cnuclear_reactor%252Ccyber_attack%252Cnuke%252Ckudankulam%252Ccontrol%252Chttps%253A%252F%252Ft.co%252Frfateoszrw_pic.twitter.com%252Fomvvmwizsi_%25E2%2580%2594%252Ckknpp%252Cdtrack%252Cinformation%252Ccontroller-level_access%252Cnetwork%252Cplant%252Cvirustotal%26vnd_4d_usr_topics%3D%26vnd_prx_segments%3D300003%252C112200%252C121100%252C131100%252C112216%252C210000%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252Cqx7745%252C0lw01o%252Cwmhp4i%252Cdcxr0c%252C2hkgm5%252Czlqtg4%252Cap05we%252Cfdf1wd%252C65f9pd%252Cuas8ja%252Cgiophev_0c%26ctx_advertisers%3D1454517775%26ctx_line_items%3D4736014287%26ctx_creatives%3D138237302059%26vnd_4d_sid%3D534fe3ef-87fc-4ec1-b3f3-9ad39166ac24%26vnd_4d_pid%3Db80403a4-97b9-4408-b5c2-faea5979c25d&cookie=ID%3D998416d74a37b026%3AT%3D1572924850%3AS%3DALNI_MasQzpfhKsOcL3UvQf_km-HlPIniA&cookie_enabled=1&bc=31&abxe=1&lmt=1572924851&dt=1572924851472&dlt=1572924849621&idt=398&frm=20&biw=1585&bih=1200&oid=3&adxs=0&adys=80&adks=2385402828&ucis=4&ifi=4&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&dssz=75&icsg=739146691772416&mso=262144&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1585x90&msz=1585x90&ga_vid=2042026595.1572924850&ga_sid=1572924850&ga_hid=780885733&fws=4&ohw=1585
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019103101.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.98 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s45-in-f2.1e100.net
Software
cafe /
Resource Hash
5281cc1e282c081029cb62306dca2ec70c95c8f4ac994d96c2b1fbadb942cd80
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:11 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
6641
x-xss-protection
0
google-lineitem-id
-1
pragma
no-cache
server
cafe
google-creative-id
-1
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=321388&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 05 Nov 2019 03:34:11 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Tue, 05 Nov 2019 03:34:11 GMT
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=321388&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 05 Nov 2019 03:34:11 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Tue, 05 Nov 2019 03:34:11 GMT
tweet.a4ac5782325ad1b5e51c8b06daf47853.light.ltr.css
platform.twitter.com/css/
51 KB
12 KB
Stylesheet
General
Full URL
https://platform.twitter.com/css/tweet.a4ac5782325ad1b5e51c8b06daf47853.light.ltr.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js?_=1572924849863
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FC) /
Resource Hash
458031c1beb286b351738608cbd8513550fb9f1330a80c9b3a31ef43edde2028

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:11 GMT
Content-Encoding
gzip
Last-Modified
Tue, 22 Oct 2019 22:27:14 GMT
Server
ECS (fcn/40FC)
Etag
"280518989f85e11c9f154ac8f0c806ff+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-control-allow-origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
text/css; charset=utf-8
Content-Length
11430
tweet.a4ac5782325ad1b5e51c8b06daf47853.light.ltr.css
platform.twitter.com/css/
51 KB
51 KB
Image
General
Full URL
https://platform.twitter.com/css/tweet.a4ac5782325ad1b5e51c8b06daf47853.light.ltr.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js?_=1572924849863
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FC) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:13 GMT
Content-Encoding
gzip
Last-Modified
Tue, 22 Oct 2019 22:27:14 GMT
Server
ECS (fcn/40FC)
Etag
"280518989f85e11c9f154ac8f0c806ff+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-control-allow-origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
text/css; charset=utf-8
Content-Length
11430
container.html
tpc.googlesyndication.com/safeframe/1-0-36/html/ Frame 17AD
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-36/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019103101.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-36/html/container.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
3516
date
Tue, 05 Nov 2019 00:55:55 GMT
expires
Wed, 04 Nov 2020 00:55:55 GMT
last-modified
Wed, 16 Oct 2019 15:42:04 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
9496
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CONDENAST_PREBID_HEADER1&hp=1&wf=1&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=11&f=0&j=&t=1572924849986&de=571007378814&rx=513012227008&m=0&ar=29bb202-clean&iw=81ef8f7&q=4&cb=0&cu=1572924849986&ll=2&lm=0&ln=0&em=0&en=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&id=1&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&fd=1&ac=1&it=500&fs=173485&na=2031628427&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 05 Nov 2019 03:34:12 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 05 Nov 2019 03:34:12 GMT
p-Jjy-Cyr1NZGRz.gif
pixel.quantserve.com/pixel/
35 B
292 B
Image
General
Full URL
https://pixel.quantserve.com/pixel/p-Jjy-Cyr1NZGRz.gif?labels=_campaign.media.Advertiser%20ID.4660981638.Campaign%20ID.2443012271.Line%20Item%20ID.programmatic
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.147 , United Kingdom, ASN27281 (QUANTCAST - Quantcast Corporation, US),
Reverse DNS
Software
QS /
Resource Hash
a0d3a0aff7dc3bf32d2176fc3dcda6e7aba2867c4f4d1f7af6355d2cfc6c44f8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 05 Nov 2019 03:34:12 GMT
Server
QS
Content-Type
image/gif
Cache-Control
private, no-cache, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
35
Expires
Fri, 04 Aug 1978 12:00:00 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-11-05T03%3A34%3A11.748Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cCh=information%20technology&cTi=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987&cEnt=malware%2C%20pukhraj%20singh%2C%20india%2C%20page%20layout%2C%20indian%2C%20kudankulam%20nuclear%20power%20plant%2C%20north%20korea%2C%20nuclear%20reactor%2C%20cyber%20attack%2C%20nuke%2C%20kudankulam%2C%20kknpp%2C%20dtrack%2C%20virustotal%2C%20sean%20gallagher%2C%20tweet%2C%20utc%2C%20russia%2C%20n.%20korea%2C%20hard-code&cEnw=1%2C%200.8255536731720152%2C%200.8201141909758349%2C%200.75492212464432%2C%200.7341758074191788%2C%200.6714534723000154%2C%200.6687820840003413%2C%200.6650238496076891%2C%200.6530561133369807%2C%200.650136661350706%2C%200.6354726487306158%2C%200.5843496852891271%2C%200.554155780228185%2C%200.48718460536731334%2C%200.46683186332244486%2C%200.4631320408912447%2C%200.4310110895429227%2C%200.42888257765169263%2C%200.4165649852936842%2C%200.41446991250354753&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cCl=603&cId=1593135&cPd=2019-10-29T15%3A47%3A47.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&pRt=referral&pHp=%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4200&pSw=1600&pSh=1200&uID=52b23511-f065-4932-8175-b707cf8a0d32&sID=534fe3ef-87fc-4ec1-b3f3-9ad39166ac24&pID=b80403a4-97b9-4408-b5c2-faea5979c25d&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22siderail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22siderail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x600%22%2C%22slug%22%3A%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%7D&dim3=%7B%22footerStart%22%3A1572924849743%2C%22headerStart%22%3A1572924849726%2C%22navigationStart%22%3A1572924847742%2C%22pubAdsReady%22%3A1572924850056%2C%22injected%22%3A1572924851748%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22rail%22%5D%2C%22ctx_slot_type%22%3A%5B%22siderail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22siderail_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22unsafe%22%5D%2C%22m_categories%22%3A%5B%22moat_unsafe%22%2C%22gv_crime%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%5D%2C%22cnt_tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22malware%22%2C%22pukhraj_singh%22%2C%22india%22%2C%22page_layout%22%2C%22indian%22%2C%22kudankulam_nuclear_power_plant%22%2C%22north_korea%22%2C%22nuclear_reactor%22%2C%22cyber_attack%22%2C%22nuke%22%2C%22kudankulam%22%2C%22kknpp%22%2C%22dtrack%22%2C%22virustotal%22%2C%22sean_gallagher%22%2C%22tweet%22%2C%22utc%22%2C%22russia%22%2C%22n._korea%22%2C%22hard-code%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22malware%22%2C%22pukhraj_singh%22%2C%22india%22%2C%22page_layout%22%2C%22indian%22%2C%22kudankulam_nuclear_power_plant%22%2C%22north_korea%22%2C%22nuclear_reactor%22%2C%22cyber_attack%22%2C%22nuke%22%2C%22kudankulam%22%2C%22kknpp%22%2C%22dtrack%22%2C%22virustotal%22%2C%22sean_gallagher%22%2C%22tweet%22%2C%22utc%22%2C%22russia%22%2C%22n._korea%22%2C%22hard-code%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22malware%22%2C%22pukhraj_singh%22%2C%22india%22%2C%22page_layout%22%2C%22indian%22%2C%22kudankulam_nuclear_power_plant%22%2C%22north_korea%22%2C%22nuclear_reactor%22%2C%22cyber_attack%22%2C%22nuke%22%2C%22kudankulam%22%2C%22control%22%2C%22https%3A%2F%2Ft.co%2Frfateoszrw_pic.twitter.com%2Fomvvmwizsi_%E2%80%94%22%2C%22kknpp%22%2C%22dtrack%22%2C%22information%22%2C%22controller-level_access%22%2C%22network%22%2C%22plant%22%2C%22virustotal%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%220lw01o%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22zlqtg4%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22giophev_0c%22%5D%2C%22ctx_advertisers%22%3A%5B%221454517775%22%5D%2C%22ctx_line_items%22%3A%5B%224736014287%22%5D%2C%22ctx_creatives%22%3A%5B%22138237302059%22%5D%2C%22vnd_4d_sid%22%3A%5B%22534fe3ef-87fc-4ec1-b3f3-9ad39166ac24%22%5D%2C%22vnd_4d_pid%22%3A%5B%22b80403a4-97b9-4408-b5c2-faea5979c25d%22%5D%7D&cKh=malware%2Cpukhraj%20singh%2Cindia%2Cpage%20layout%2Cindian%2Ckudankulam%20nuclear%20power%20plant%2Cnorth%20korea%2Cnuclear%20reactor%2Ccyber%20attack%2Cnuke%2Ckudankulam%2Ccontrol%2Chttps%3A%2F%2Ft.co%2Frfateoszrw%20pic.twitter.com%2Fomvvmwizsi%2C%E2%80%94
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.158.200 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-158-200.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 05 Nov 2019 03:34:13 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
container.html
tpc.googlesyndication.com/safeframe/1-0-36/html/ Frame 7F59
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-36/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019103101.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-36/html/container.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
3516
date
Tue, 05 Nov 2019 00:55:55 GMT
expires
Wed, 04 Nov 2020 00:55:55 GMT
last-modified
Wed, 16 Oct 2019 15:42:04 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
9496
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-11-05T03%3A34%3A11.945Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cCh=information%20technology&cTi=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987&cEnt=malware%2C%20pukhraj%20singh%2C%20india%2C%20page%20layout%2C%20indian%2C%20kudankulam%20nuclear%20power%20plant%2C%20north%20korea%2C%20nuclear%20reactor%2C%20cyber%20attack%2C%20nuke%2C%20kudankulam%2C%20kknpp%2C%20dtrack%2C%20virustotal%2C%20sean%20gallagher%2C%20tweet%2C%20utc%2C%20russia%2C%20n.%20korea%2C%20hard-code&cEnw=1%2C%200.8255536731720152%2C%200.8201141909758349%2C%200.75492212464432%2C%200.7341758074191788%2C%200.6714534723000154%2C%200.6687820840003413%2C%200.6650238496076891%2C%200.6530561133369807%2C%200.650136661350706%2C%200.6354726487306158%2C%200.5843496852891271%2C%200.554155780228185%2C%200.48718460536731334%2C%200.46683186332244486%2C%200.4631320408912447%2C%200.4310110895429227%2C%200.42888257765169263%2C%200.4165649852936842%2C%200.41446991250354753&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cCl=603&cId=1593135&cPd=2019-10-29T15%3A47%3A47.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&pRt=referral&pHp=%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4200&pSw=1600&pSh=1200&uID=52b23511-f065-4932-8175-b707cf8a0d32&sID=534fe3ef-87fc-4ec1-b3f3-9ad39166ac24&pID=b80403a4-97b9-4408-b5c2-faea5979c25d&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22post_nav_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22post_nav_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22970x250%22%2C%22slug%22%3A%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%7D&dim3=%7B%22footerStart%22%3A1572924849743%2C%22headerStart%22%3A1572924849726%2C%22navigationStart%22%3A1572924847742%2C%22pubAdsReady%22%3A1572924850056%2C%22injected%22%3A1572924851945%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22hero%22%5D%2C%22ctx_slot_type%22%3A%5B%22post_nav%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22post_nav_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22unsafe%22%5D%2C%22m_categories%22%3A%5B%22moat_unsafe%22%2C%22gv_crime%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%5D%2C%22cnt_tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22malware%22%2C%22pukhraj_singh%22%2C%22india%22%2C%22page_layout%22%2C%22indian%22%2C%22kudankulam_nuclear_power_plant%22%2C%22north_korea%22%2C%22nuclear_reactor%22%2C%22cyber_attack%22%2C%22nuke%22%2C%22kudankulam%22%2C%22kknpp%22%2C%22dtrack%22%2C%22virustotal%22%2C%22sean_gallagher%22%2C%22tweet%22%2C%22utc%22%2C%22russia%22%2C%22n._korea%22%2C%22hard-code%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22malware%22%2C%22pukhraj_singh%22%2C%22india%22%2C%22page_layout%22%2C%22indian%22%2C%22kudankulam_nuclear_power_plant%22%2C%22north_korea%22%2C%22nuclear_reactor%22%2C%22cyber_attack%22%2C%22nuke%22%2C%22kudankulam%22%2C%22kknpp%22%2C%22dtrack%22%2C%22virustotal%22%2C%22sean_gallagher%22%2C%22tweet%22%2C%22utc%22%2C%22russia%22%2C%22n._korea%22%2C%22hard-code%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22malware%22%2C%22pukhraj_singh%22%2C%22india%22%2C%22page_layout%22%2C%22indian%22%2C%22kudankulam_nuclear_power_plant%22%2C%22north_korea%22%2C%22nuclear_reactor%22%2C%22cyber_attack%22%2C%22nuke%22%2C%22kudankulam%22%2C%22control%22%2C%22https%3A%2F%2Ft.co%2Frfateoszrw_pic.twitter.com%2Fomvvmwizsi_%E2%80%94%22%2C%22kknpp%22%2C%22dtrack%22%2C%22information%22%2C%22controller-level_access%22%2C%22network%22%2C%22plant%22%2C%22virustotal%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%220lw01o%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22zlqtg4%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22giophev_0c%22%5D%2C%22ctx_advertisers%22%3A%5B%221454517775%22%5D%2C%22ctx_line_items%22%3A%5B%224736014287%22%5D%2C%22ctx_creatives%22%3A%5B%22138237302059%22%5D%2C%22vnd_4d_sid%22%3A%5B%22534fe3ef-87fc-4ec1-b3f3-9ad39166ac24%22%5D%2C%22vnd_4d_pid%22%3A%5B%22b80403a4-97b9-4408-b5c2-faea5979c25d%22%5D%7D&cKh=malware%2Cpukhraj%20singh%2Cindia%2Cpage%20layout%2Cindian%2Ckudankulam%20nuclear%20power%20plant%2Cnorth%20korea%2Cnuclear%20reactor%2Ccyber%20attack%2Cnuke%2Ckudankulam%2Ccontrol%2Chttps%3A%2F%2Ft.co%2Frfateoszrw%20pic.twitter.com%2Fomvvmwizsi%2C%E2%80%94
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.158.200 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-158-200.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 05 Nov 2019 03:34:14 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
obUserSync.html
widgets.outbrain.com/widgetOBUserSync/ Frame 5016
0
0
Document
General
Full URL
https://widgets.outbrain.com/widgetOBUserSync/obUserSync.html
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1572924849862
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.190 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-190.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Host
widgets.outbrain.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Accept-Encoding
gzip, deflate, br
Cookie
akacd_widgets_routing=3750377649~rv=79~id=1c5719e01774f8c88f24636977daf194; recs_87201111fc52e6bf4015555c21cd8a57=0B2218461765A2262793391A2443705321A2406928944A2214957895A2193899666ACD1; obuid=76722683-4980-44a2-b7a5-a0c057793993
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/

Response headers

Server
Apache
ETag
"92a540925bae013b3eb0aec73fff0e65:1572781658"
Last-Modified
Sun, 03 Nov 2019 11:44:44 GMT
Accept-Ranges
bytes
Content-Type
text/html
Vary
Accept-Encoding
Content-Encoding
gzip
Cache-Control
max-age=604800
Date
Tue, 05 Nov 2019 03:34:12 GMT
Content-Length
3504
Connection
keep-alive
Timing-Allow-Origin
*
Access-Control-Allow-Credentials
false
Access-Control-Allow-Methods
GET,POST
Access-Control-Allow-Origin
*
l
mcdp-chidc2.outbrain.com/
4 B
377 B
XHR
General
Full URL
https://mcdp-chidc2.outbrain.com/l?token=e7b6dc3a1a5ed163bcedfca5d633fd76_6817_1572924852035&tm=1742&eT=0&wRV=104065&pVis=0&lsd=76722683-4980-44a2-b7a5-a0c057793993&eIdx=&cheq=0&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1572924849862
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.74.236.127 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
chi.outbrain.com
Software
/
Resource Hash
c48b5b1a9776c84602de2306d7903a7241158a5077e7a8519af75c33441b8334
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:13 GMT
content-encoding
gzip
Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
content-range
Connection
close
X-TraceId
4a1cf4ef38405a23f23be5a4ce93db25
Content-Length
30
eyJpdSI6IjhiMzIyMDk2ODVhMWQ3NDg1MzgzN2IzNjg5NWI5MDdmMDYyODE0OGQ0ZmVmNTlhZTEwOWI4MmNhZjI1MTBiODYiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
9 KB
10 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjhiMzIyMDk2ODVhMWQ3NDg1MzgzN2IzNjg5NWI5MDdmMDYyODE0OGQ0ZmVmNTlhZTEwOWI4MmNhZjI1MTBiODYiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b8f3107a234af11f634da6ea4ff852e18a85298583ad68ae8a21a3d11243ccf0
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Wed, 09 Oct 2019 07:31:49 GMT
Date
Tue, 05 Nov 2019 03:34:16 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2181303
Connection
keep-alive
X-TraceId
f6edd237143b524097b20379b3307057
Timing-Allow-Origin
*
Content-Length
9614
eyJpdSI6IjNhZWIyYmZkOWY4NjM2NjI0N2FkZTBkMGFkNjI0YWIxNDJkZjEwNDNmZGU3MzRmYWM5Yjk3YmEyY2Q4YzNhYTkiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
10 KB
10 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjNhZWIyYmZkOWY4NjM2NjI0N2FkZTBkMGFkNjI0YWIxNDJkZjEwNDNmZGU3MzRmYWM5Yjk3YmEyY2Q4YzNhYTkiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
951c4758d1a410c1cd4250a633c7835f2a9e49304112c93e1538a027be0f4fa7
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Fri, 18 Oct 2019 08:09:46 GMT
Date
Tue, 05 Nov 2019 03:34:16 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2462400
Connection
keep-alive
X-TraceId
7bd0676ab0c8f4bbb43f800f782f72a8
Timing-Allow-Origin
*
Content-Length
9782
eyJpdSI6ImNjMjBiYTQ3MjRjZDJjMjQ1ZWJmMWVkMDMxMjdiZjNkZmIxZGUwY2I5NTRlYzJmZmVhM2M3ODFlODY2MDcxZDkiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
10 KB
10 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImNjMjBiYTQ3MjRjZDJjMjQ1ZWJmMWVkMDMxMjdiZjNkZmIxZGUwY2I5NTRlYzJmZmVhM2M3ODFlODY2MDcxZDkiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
2d1541984cf39bb7530c51a7ad2ecb34db946b93e5ac0572168414fe2dc95200
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Mon, 21 Oct 2019 10:34:26 GMT
Date
Tue, 05 Nov 2019 03:34:16 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2260995
Connection
keep-alive
X-TraceId
9dad5da9670a32025590557322e00c34
Timing-Allow-Origin
*
Content-Length
9880
eyJpdSI6ImQ0Y2FlNTEwM2YyY2EyYTM0YmM3NjM4NzUzMmEzMWIyMTI0ZWE1YTNkMzMyYTk3NzZmZjVjOGJmYjRhMTc4NjgiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
13 KB
14 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImQ0Y2FlNTEwM2YyY2EyYTM0YmM3NjM4NzUzMmEzMWIyMTI0ZWE1YTNkMzMyYTk3NzZmZjVjOGJmYjRhMTc4NjgiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4b0cab7db7f6e5ee290ebae97f5ac83c596853d21a86c8951f8e322918b07e12
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Thu, 03 Oct 2019 08:23:37 GMT
Date
Tue, 05 Nov 2019 03:34:16 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2462400
Connection
keep-alive
X-TraceId
fecc800fd23ad1b54d3a6289194e305b
Timing-Allow-Origin
*
Content-Length
13594
eyJpdSI6IjAxOGU5ZDk3ZTliNTdkYjQyODJlMzY4Yzc5NzdkZmU4YzI3ZTQ1YzA0NjI3ZmIxYTkzYWJmZWZiYzc5NGMyZDQiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
4 KB
4 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjAxOGU5ZDk3ZTliNTdkYjQyODJlMzY4Yzc5NzdkZmU4YzI3ZTQ1YzA0NjI3ZmIxYTkzYWJmZWZiYzc5NGMyZDQiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
ca90bab019678e69d409daf79fb481453ee6e8bea8e97ac6134485a3ebd91a4b
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Sat, 02 Nov 2019 06:24:47 GMT
Date
Tue, 05 Nov 2019 03:34:16 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2389648
Connection
keep-alive
X-TraceId
97f3db14324c8a5b083b0152416f6f84
Timing-Allow-Origin
*
Content-Length
4170
eyJpdSI6IjZhOTI5ZDZmMDcxYmM5NzY1MWJlMDY2ZjdjZWYwOTlkNDJhYmZiZGViZDYzODBjNTQ1OGQxNTQ3YjI4ZGRmOTkiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
7 KB
8 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjZhOTI5ZDZmMDcxYmM5NzY1MWJlMDY2ZjdjZWYwOTlkNDJhYmZiZGViZDYzODBjNTQ1OGQxNTQ3YjI4ZGRmOTkiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
34130b421301955044d5c028c30f2ff766ec2ebb8c983a254fe22c3451794823
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Sat, 05 Oct 2019 06:06:49 GMT
Date
Tue, 05 Nov 2019 03:34:16 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2462400
Connection
keep-alive
X-TraceId
9468b632ae5c2c75250d5055ec495111
Timing-Allow-Origin
*
Content-Length
7566
c0ec9ad1-2005-4163-b0fd-8f89fa080db2
https://arstechnica.com/ Frame 1AC4
31 B
0
Other
General
Full URL
blob:https://arstechnica.com/c0ec9ad1-2005-4163-b0fd-8f89fa080db2
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7725538fe2f71147bffeba7452b434c826aef9009666cb4360c605d0b2a91d1d

Request headers

Sec-Fetch-Mode
same-origin
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Length
31
Content-Type
application/javascript
sf-ui-display-medium-webfont.woff2
d2c8v52ll5s99u.cloudfront.net/assets/fonts/ Frame 1AC4
29 KB
30 KB
Font
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/assets/fonts/sf-ui-display-medium-webfont.woff2
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.168.123 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-123.fra54.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
d281c9d6bae645f3da6d2f0769a2cf0668709fd28e2021ce74821cdd8c7117b3

Request headers

Sec-Fetch-Mode
cors
Referer
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-3b3a013ac40046610e8f2fefe02c3b07.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:16 GMT
Content-Encoding
gzip
Vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
X-Amz-Cf-Pop
FRA54
X-Cache
RefreshHit from cloudfront
Connection
keep-alive
Content-Length
29632
Access-Control-Allow-Origin
*
Last-Modified
Mon, 26 Jun 2017 15:24:42 GMT
Server
AmazonS3
ETag
"7d18db04f980971f2a9c5026bbc34bed"
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET
Content-Type
application/font-woff2
Via
1.1 14484a063800eaed878a3068abf4dfac.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
Accept-Ranges
bytes
X-Amz-Cf-Id
nlq0se9aU37GsWwqMcDosebsIGrr-gjV6vvBuT0Eal2kfo3bSHlrgw==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
bridge3.347.1_en.html
imasdk.googleapis.com/js/core/ Frame 7677
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.347.1_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.347.1_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
195277
date
Sat, 02 Nov 2019 21:00:54 GMT
expires
Sun, 01 Nov 2020 21:00:54 GMT
last-modified
Thu, 31 Oct 2019 19:57:32 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
196398
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
client.js
s0.2mdn.net/instream/video/ Frame 1AC4
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10523
x-xss-protection
0
expires
Tue, 05 Nov 2019 03:34:12 GMT
integrator.js
adservice.google.com/adsid/ Frame 1AC4
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 05 Nov 2019 03:34:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
fbevents.js
connect.facebook.net/en_US/ Frame 1AC4
103 KB
22 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
b02eb6a63bca577aa26a3d54c450cd179dab7b63e08cb8830411bca8f853c002
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-23=":443"; ma=3600
content-length
22456
x-xss-protection
0
pragma
public
x-fb-debug
funwytVQQLL6F8u5CvLYn5XYHl+SHcpRvg6uKgVyZ2A4ZOfEqoEZlVTk2jtclzP0NamuD9/04JjrY7ABNxIH7w==
x-fb-trip-id
975780461
x-frame-options
DENY
date
Tue, 05 Nov 2019 03:34:16 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
comscore-min.js
d2c8v52ll5s99u.cloudfront.net/player/ Frame 1AC4
0
0

collect
www.google-analytics.com/r/
0
0

infinityid
infinityid.condenastdigital.com/ Frame 1AC4
36 B
638 B
XHR
General
Full URL
https://infinityid.condenastdigital.com/infinityid
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.225.242.81 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-3-225-242-81.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
4d9d9412b672e55b147d28930b42dabaa64a043f60466eddd3d6066170426506

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:12 GMT
content-encoding
gzip
Server
nginx/1.15.8
vary
origin,accept-encoding
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
transfer-encoding
chunked
track
capture.condenastdigital.com/ Frame 1AC4
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-11-05T03%3A34%3A12.546Z&_c=&_t=Player%20Requested&sID=534fe3ef-87fc-4ec1-b3f3-9ad39166ac24&pID=b80403a4-97b9-4408-b5c2-faea5979c25d&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.158.200 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-158-200.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 05 Nov 2019 03:34:16 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
arstechnica_war-stories-civilization.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1569003425/ Frame 1AC4
65 KB
66 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1569003425/arstechnica_war-stories-civilization.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.168.189 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-189.fra54.r.cloudfront.net
Software
cloudinary /
Resource Hash
f513c914f8f3cf4975bf34937100375c4b4164ec77ec011488b643452f6ae22f

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Mon, 23 Sep 2019 15:55:10 GMT
Via
1.1 varnish, 1.1 2db316290386960b489a2a16c0a63643.cloudfront.net (CloudFront)
Age
1048412
Edge-Cache-Tag
390602458176548494884398897259766670181,316951410886732526360935603098811400471,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
66728
X-Request-Id
67c1ef73c3958b40
X-Served-By
cache-hhn4060-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Mon, 23 Sep 2019 15:00:59 GMT
Server
cloudinary
X-Timer
S1569254110.301622,VS0,VE267
ETag
"c43a026bdd689dfa9ab341b71ae2cd02"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA54
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
WLay_-MTMS-GUfRXaxbzpDK-qjvdy6URy4zMF0cjkDhRwG6KwBWwTg==
X-Cache-Hits
0
user
4d.condenastdigital.com/
67 B
428 B
XHR
General
Full URL
https://4d.condenastdigital.com/user?xid=0db3d769-1042-48a5-8212-8d50877d1861
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.209.40.151 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-3-209-40-151.compute-1.amazonaws.com
Software
/
Resource Hash
afe17465cadf7d75a78d007c6898d9f537d51c12fd501662690a7ff55dd824e4

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

Date
Tue, 05 Nov 2019 03:34:16 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
34483233-a98f-4020-929a-0a3b80c0b769thumbs.mp4
dp8hsntg6do36.cloudfront.net/5d826c83bcdfff482d6d06b0/ Frame 1AC4
0
0

34483233-a98f-4020-929a-0a3b80c0b769thumbs.mp4
dp8hsntg6do36.cloudfront.net/5d826c83bcdfff482d6d06b0/ Frame 1AC4
0
0

track
capture.condenastdigital.com/ Frame 1AC4
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-11-05T03%3A34%3A12.792Z&_c=Player%20Event&_t=Player%20Loaded&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=https%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Fwar-stories-civilization%2F&cId=5d826c83bcdfff482d6d06b0&cKe=&cPd=2019-09-23T15%3A00%3A00%2B00%3A00&cTi=Civilization%3A%20It%27s%20good%20to%20take%20turns%20%7C%20War%20Stories&mDu=734&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pID=b80403a4-97b9-4408-b5c2-faea5979c25d&pWw=540&pWh=303.75&sID=534fe3ef-87fc-4ec1-b3f3-9ad39166ac24&uId=52b23511-f065-4932-8175-b707cf8a0d32&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22gitBranch%22%3A%22master%22%2C%22gitSha%22%3A%22e42798c%22%2C%22guid%22%3A%223c1b6468-a896-4440-3323-46276457f025%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A2984.9375%2C%22playerType%22%3A%22video-continuous%22%2C%22playsOnPage%22%3A0%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22isRightRail%22%3Afalse%2C%22tabStatus%22%3A%22active%22%2C%22versoPageType%22%3A%22article%7Creport%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3Anull%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%2C%22podIndex%22%3A%22%22%7D&adId=&pageType=article%7Creport
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.158.200 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-158-200.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 05 Nov 2019 03:34:16 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
52f9fbb3-4ad9-4258-b669-28815f96dbf3
https://arstechnica.com/ Frame 1AC4
5 KB
0
Other
General
Full URL
blob:https://arstechnica.com/52f9fbb3-4ad9-4258-b669-28815f96dbf3
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d5f3418a3fa657175d5341b5e032be036cb4d5818de5d1497f2175be5a7e3701

Request headers

Sec-Fetch-Mode
same-origin
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Length
5463
Content-Type
application/javascript
34483233-a98f-4020-929a-0a3b80c0b769manifest-ios.m3u8
dp8hsntg6do36.cloudfront.net/5d826c83bcdfff482d6d06b0/ Frame 1AC4
918 B
1 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5d826c83bcdfff482d6d06b0/34483233-a98f-4020-929a-0a3b80c0b769manifest-ios.m3u8?videoIndex=0&requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.76 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-76.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
174dec2e7da4b324c72c1d5fd1591832b170024d71fec278f94554452cea9f53

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Mon, 04 Nov 2019 16:39:27 GMT
Via
1.1 b83a899c16a2f53127e152fe5fc783a4.cloudfront.net (CloudFront)
Vary
Origin
Age
39289
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
918
Last-Modified
Wed, 18 Sep 2019 17:45:26 GMT
Server
AmazonS3
ETag
"43f83b685faa046cc9c39efc39fc5eb7"
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
X-Amz-Cf-Id
j1OvOpYGvcg1KODv0d66CRmoks2srqdrCErHV_R7ZF__UEFXBve46A==
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1572924849986&de=494475862807&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=siderail_0&zMoatRendered=3&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=2&zMoatPageDataTargetingSet=3&zMoatSafetyTargetingSet=3&zMoatEmptySlot=1&zMoatNadoDataLoadTime=428&zMoatAllDataLoadTime=428&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&ac=1&bq=11&f=0&zn=0&if=428&na=823754775&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 05 Nov 2019 03:34:17 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 05 Nov 2019 03:34:17 GMT
f2XJwbPb_normal.jpg
pbs.twimg.com/profile_images/1186662491935260672/
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/1186662491935260672/f2XJwbPb_normal.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41AE) /
Resource Hash
06839cb3cd2581780fbb4f63e123e52301ff8ff25449276d26ba11c13b167c9c
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:17 GMT
x-content-type-options
nosniff
x-cache
HIT
status
200
content-length
2111
x-response-time
121
surrogate-key
profile_images profile_images/bucket/6 profile_images/1186662491935260672
last-modified
Tue, 22 Oct 2019 15:13:59 GMT
server
ECS (fcn/41AE)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
3051ca7da74ee98e7fd5ce9bfeeaa086
accept-ranges
bytes
EH-oECEVUAA-FXE
pbs.twimg.com/media/
19 KB
19 KB
Image
General
Full URL
https://pbs.twimg.com/media/EH-oECEVUAA-FXE?format=jpg&name=small
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/418E) /
Resource Hash
ba584a1f12efcf17f424b1684d23bd833e241e24b720d51e021bdd8d6c8e5661
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:29 GMT
x-content-type-options
nosniff
x-cache
HIT
status
200
content-length
19584
x-response-time
119
surrogate-key
media media/bucket/1 media/1188853613877088256
last-modified
Mon, 28 Oct 2019 16:20:44 GMT
server
ECS (fcn/418E)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
164db1bd4cdffdb49b4fe1ad1695230b
accept-ranges
bytes
truncated
/
825 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4468e35646c229b518e5f398c5a3d6b15ba1351a71ef22692129bb32f5030ac0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
572 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0341a4478ce861ef85c819b913fa0a2501836a6a2ffda8643e95e39f4a2a7de0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
512 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
49c2a3cf0f363bf387c06a35a4a4e6c7255799b3776bed55914862136d783028

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
600 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c50a17e8272b9359e4b62e0f305e201f359cb5bd2245671c115d031f2b7f68d0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
323 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c3531ed2c934e5daee80955db42a0245d666131e6322c6ec6985992922520ab4

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-11-05T03%3A34%3A12.892Z&_t=slot_impression_viewable&cBr=Ars%20Technica&cKe=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cCh=information%20technology&cTi=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987&cEnt=malware%2C%20pukhraj%20singh%2C%20india%2C%20page%20layout%2C%20indian%2C%20kudankulam%20nuclear%20power%20plant%2C%20north%20korea%2C%20nuclear%20reactor%2C%20cyber%20attack%2C%20nuke%2C%20kudankulam%2C%20kknpp%2C%20dtrack%2C%20virustotal%2C%20sean%20gallagher%2C%20tweet%2C%20utc%2C%20russia%2C%20n.%20korea%2C%20hard-code&cEnw=1%2C%200.8255536731720152%2C%200.8201141909758349%2C%200.75492212464432%2C%200.7341758074191788%2C%200.6714534723000154%2C%200.6687820840003413%2C%200.6650238496076891%2C%200.6530561133369807%2C%200.650136661350706%2C%200.6354726487306158%2C%200.5843496852891271%2C%200.554155780228185%2C%200.48718460536731334%2C%200.46683186332244486%2C%200.4631320408912447%2C%200.4310110895429227%2C%200.42888257765169263%2C%200.4165649852936842%2C%200.41446991250354753&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cCl=603&cId=1593135&cPd=2019-10-29T15%3A47%3A47.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&pRt=referral&pHp=%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4300&pSw=1600&pSh=1200&uID=52b23511-f065-4932-8175-b707cf8a0d32&sID=534fe3ef-87fc-4ec1-b3f3-9ad39166ac24&pID=b80403a4-97b9-4408-b5c2-faea5979c25d&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22siderail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstImpressionViewable%22%3Atrue%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpressionViewable%22%3Atrue%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22siderail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x600%22%2C%22slug%22%3A%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%7D&dim3=%7B%22footerStart%22%3A1572924849743%2C%22headerStart%22%3A1572924849726%2C%22navigationStart%22%3A1572924847742%2C%22pubAdsReady%22%3A1572924850056%2C%22injected%22%3A1572924851748%2C%22viewable%22%3A1572924852892%2C%22viewport%22%3A1572924851794%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22rail%22%5D%2C%22ctx_slot_type%22%3A%5B%22siderail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22siderail_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22unsafe%22%5D%2C%22m_categories%22%3A%5B%22moat_unsafe%22%2C%22gv_crime%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%5D%2C%22cnt_tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22malware%22%2C%22pukhraj_singh%22%2C%22india%22%2C%22page_layout%22%2C%22indian%22%2C%22kudankulam_nuclear_power_plant%22%2C%22north_korea%22%2C%22nuclear_reactor%22%2C%22cyber_attack%22%2C%22nuke%22%2C%22kudankulam%22%2C%22kknpp%22%2C%22dtrack%22%2C%22virustotal%22%2C%22sean_gallagher%22%2C%22tweet%22%2C%22utc%22%2C%22russia%22%2C%22n._korea%22%2C%22hard-code%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22malware%22%2C%22pukhraj_singh%22%2C%22india%22%2C%22page_layout%22%2C%22indian%22%2C%22kudankulam_nuclear_power_plant%22%2C%22north_korea%22%2C%22nuclear_reactor%22%2C%22cyber_attack%22%2C%22nuke%22%2C%22kudankulam%22%2C%22kknpp%22%2C%22dtrack%22%2C%22virustotal%22%2C%22sean_gallagher%22%2C%22tweet%22%2C%22utc%22%2C%22russia%22%2C%22n._korea%22%2C%22hard-code%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22malware%22%2C%22pukhraj_singh%22%2C%22india%22%2C%22page_layout%22%2C%22indian%22%2C%22kudankulam_nuclear_power_plant%22%2C%22north_korea%22%2C%22nuclear_reactor%22%2C%22cyber_attack%22%2C%22nuke%22%2C%22kudankulam%22%2C%22control%22%2C%22https%3A%2F%2Ft.co%2Frfateoszrw_pic.twitter.com%2Fomvvmwizsi_%E2%80%94%22%2C%22kknpp%22%2C%22dtrack%22%2C%22information%22%2C%22controller-level_access%22%2C%22network%22%2C%22plant%22%2C%22virustotal%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%220lw01o%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22zlqtg4%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22giophev_0c%22%5D%2C%22ctx_advertisers%22%3A%5B%221454517775%22%5D%2C%22ctx_line_items%22%3A%5B%224736014287%22%5D%2C%22ctx_creatives%22%3A%5B%22138237302059%22%5D%2C%22vnd_4d_sid%22%3A%5B%22534fe3ef-87fc-4ec1-b3f3-9ad39166ac24%22%5D%2C%22vnd_4d_pid%22%3A%5B%22b80403a4-97b9-4408-b5c2-faea5979c25d%22%5D%7D&cKh=malware%2Cpukhraj%20singh%2Cindia%2Cpage%20layout%2Cindian%2Ckudankulam%20nuclear%20power%20plant%2Cnorth%20korea%2Cnuclear%20reactor%2Ccyber%20attack%2Cnuke%2Ckudankulam%2Ccontrol%2Chttps%3A%2F%2Ft.co%2Frfateoszrw%20pic.twitter.com%2Fomvvmwizsi%2C%E2%80%94
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.158.200 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-158-200.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 05 Nov 2019 03:34:17 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
events
wren.condenastdigital.com/1.0/conde/
0
0

jot.html
platform.twitter.com/ Frame 9B72
Redirect Chain
  • https://syndication.twitter.com/i/jot
  • https://platform.twitter.com/jot.html
0
0
Document
General
Full URL
https://platform.twitter.com/jot.html
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js?_=1572924849863
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40D7) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
Origin
https://arstechnica.com
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate

Response headers

Accept-Ranges
bytes
Access-Control-Allow-Methods
GET
Access-control-allow-origin
*
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Tue, 05 Nov 2019 03:34:22 GMT
Etag
"d9592a6c704736fa4da218d4357976dd"
Last-Modified
Tue, 22 Oct 2019 23:03:20 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/40D7)
X-Cache
HIT
Content-Length
80

Redirect headers

status
302 302 Found
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
content-length
0
content-type
text/html;charset=utf-8
date
Tue, 05 Nov 2019 03:34:16 GMT
expires
Tue, 31 Mar 1981 05:00:00 GMT
last-modified
Tue, 05 Nov 2019 03:34:16 GMT
location
https://platform.twitter.com/jot.html
pragma
no-cache
server
tsa_o
strict-transport-security
max-age=631138519
x-connection-hash
302d5f714d4f7d571e441fb7eaa09412
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-response-time
116
x-transaction
0053321a00028ee4
x-tsa-request-body-time
0
x-twitter-response-tags
BouncerCompliant
x-xss-protection
0
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-11-05T03%3A34%3A13.094Z&_t=slot_impression_viewable&cBr=Ars%20Technica&cKe=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cCh=information%20technology&cTi=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987&cEnt=malware%2C%20pukhraj%20singh%2C%20india%2C%20page%20layout%2C%20indian%2C%20kudankulam%20nuclear%20power%20plant%2C%20north%20korea%2C%20nuclear%20reactor%2C%20cyber%20attack%2C%20nuke%2C%20kudankulam%2C%20kknpp%2C%20dtrack%2C%20virustotal%2C%20sean%20gallagher%2C%20tweet%2C%20utc%2C%20russia%2C%20n.%20korea%2C%20hard-code&cEnw=1%2C%200.8255536731720152%2C%200.8201141909758349%2C%200.75492212464432%2C%200.7341758074191788%2C%200.6714534723000154%2C%200.6687820840003413%2C%200.6650238496076891%2C%200.6530561133369807%2C%200.650136661350706%2C%200.6354726487306158%2C%200.5843496852891271%2C%200.554155780228185%2C%200.48718460536731334%2C%200.46683186332244486%2C%200.4631320408912447%2C%200.4310110895429227%2C%200.42888257765169263%2C%200.4165649852936842%2C%200.41446991250354753&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cCl=603&cId=1593135&cPd=2019-10-29T15%3A47%3A47.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&pRt=referral&pHp=%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=52b23511-f065-4932-8175-b707cf8a0d32&sID=534fe3ef-87fc-4ec1-b3f3-9ad39166ac24&pID=b80403a4-97b9-4408-b5c2-faea5979c25d&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22post_nav_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstImpressionViewable%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpressionViewable%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22post_nav_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22970x250%22%2C%22slug%22%3A%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%7D&dim3=%7B%22footerStart%22%3A1572924849743%2C%22headerStart%22%3A1572924849726%2C%22navigationStart%22%3A1572924847742%2C%22pubAdsReady%22%3A1572924850056%2C%22injected%22%3A1572924851945%2C%22viewable%22%3A1572924853094%2C%22viewport%22%3A1572924851996%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22hero%22%5D%2C%22ctx_slot_type%22%3A%5B%22post_nav%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22post_nav_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22unsafe%22%5D%2C%22m_categories%22%3A%5B%22moat_unsafe%22%2C%22gv_crime%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%5D%2C%22cnt_tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22malware%22%2C%22pukhraj_singh%22%2C%22india%22%2C%22page_layout%22%2C%22indian%22%2C%22kudankulam_nuclear_power_plant%22%2C%22north_korea%22%2C%22nuclear_reactor%22%2C%22cyber_attack%22%2C%22nuke%22%2C%22kudankulam%22%2C%22kknpp%22%2C%22dtrack%22%2C%22virustotal%22%2C%22sean_gallagher%22%2C%22tweet%22%2C%22utc%22%2C%22russia%22%2C%22n._korea%22%2C%22hard-code%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22malware%22%2C%22pukhraj_singh%22%2C%22india%22%2C%22page_layout%22%2C%22indian%22%2C%22kudankulam_nuclear_power_plant%22%2C%22north_korea%22%2C%22nuclear_reactor%22%2C%22cyber_attack%22%2C%22nuke%22%2C%22kudankulam%22%2C%22kknpp%22%2C%22dtrack%22%2C%22virustotal%22%2C%22sean_gallagher%22%2C%22tweet%22%2C%22utc%22%2C%22russia%22%2C%22n._korea%22%2C%22hard-code%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22malware%22%2C%22pukhraj_singh%22%2C%22india%22%2C%22page_layout%22%2C%22indian%22%2C%22kudankulam_nuclear_power_plant%22%2C%22north_korea%22%2C%22nuclear_reactor%22%2C%22cyber_attack%22%2C%22nuke%22%2C%22kudankulam%22%2C%22control%22%2C%22https%3A%2F%2Ft.co%2Frfateoszrw_pic.twitter.com%2Fomvvmwizsi_%E2%80%94%22%2C%22kknpp%22%2C%22dtrack%22%2C%22information%22%2C%22controller-level_access%22%2C%22network%22%2C%22plant%22%2C%22virustotal%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%220lw01o%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22zlqtg4%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22giophev_0c%22%5D%2C%22ctx_advertisers%22%3A%5B%221454517775%22%5D%2C%22ctx_line_items%22%3A%5B%224736014287%22%5D%2C%22ctx_creatives%22%3A%5B%22138237302059%22%5D%2C%22vnd_4d_sid%22%3A%5B%22534fe3ef-87fc-4ec1-b3f3-9ad39166ac24%22%5D%2C%22vnd_4d_pid%22%3A%5B%22b80403a4-97b9-4408-b5c2-faea5979c25d%22%5D%7D&cKh=malware%2Cpukhraj%20singh%2Cindia%2Cpage%20layout%2Cindian%2Ckudankulam%20nuclear%20power%20plant%2Cnorth%20korea%2Cnuclear%20reactor%2Ccyber%20attack%2Cnuke%2Ckudankulam%2Ccontrol%2Chttps%3A%2F%2Ft.co%2Frfateoszrw%20pic.twitter.com%2Fomvvmwizsi%2C%E2%80%94
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.158.200 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-158-200.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 05 Nov 2019 03:34:17 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
truncated
/
817 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
db311174b0e3c340727b63c055cfb5b317808e909503e1bda11cc58af444f12b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/svg+xml
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CONDENAST_PREBID_HEADER1&hp=1&wf=1&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=11&f=0&j=&t=1572924849986&de=54091048459&rx=513012227008&m=0&ar=29bb202-clean&iw=81ef8f7&q=5&cb=0&cu=1572924849986&ll=2&lm=0&ln=0&em=0&en=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&id=1&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&fd=1&ac=1&it=500&fs=173485&na=1661348052&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 05 Nov 2019 03:34:17 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 05 Nov 2019 03:34:17 GMT
track
capture.condenastdigital.com/
0
0

ads
pubads.g.doubleclick.net/gampad/ Frame 1AC4
6 KB
2 KB
XHR
General
Full URL
https://pubads.g.doubleclick.net/gampad/ads?sz=640x480|480x70&iu=/3379/conde.ars/player/information-technology/article&ciu_szs=300x60&gdfp_req=1&env=vp&output=vmap&unviewed_position_start=1&cust_params=m_data%3D1%26m_safety%3Dunsafe%26m_categories%3Dmoat_unsafe%252Cgv_crime%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.30.9%26ctx_page_slug%3Dindian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%26cnt_tags%3Ddtrack%252Cindia%252Cnorth-korea%252Cnuclear-energy%252Cnuclear-reactor-control-systems%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3Dmalware%252Cpukhraj_singh%252Cindia%252Cpage_layout%252Cindian%252Ckudankulam_nuclear_power_plant%252Cnorth_korea%252Cnuclear_reactor%252Ccyber_attack%252Cnuke%252Ckudankulam%252Ckknpp%252Cdtrack%252Cvirustotal%252Csean_gallagher%252Ctweet%252Cutc%252Crussia%252Cn._korea%252Chard-code%26vnd_4d_ctx_entities%3Dmalware%252Cpukhraj_singh%252Cindia%252Cpage_layout%252Cindian%252Ckudankulam_nuclear_power_plant%252Cnorth_korea%252Cnuclear_reactor%252Ccyber_attack%252Cnuke%252Ckudankulam%252Ckknpp%252Cdtrack%252Cvirustotal%252Csean_gallagher%252Ctweet%252Cutc%252Crussia%252Cn._korea%252Chard-code%26vnd_4d_ctx_keywords%3Dmalware%252Cpukhraj_singh%252Cindia%252Cpage_layout%252Cindian%252Ckudankulam_nuclear_power_plant%252Cnorth_korea%252Cnuclear_reactor%252Ccyber_attack%252Cnuke%252Ckudankulam%252Ccontrol%252Chttps%253A%252F%252Ft.co%252Frfateoszrw_pic.twitter.com%252Fomvvmwizsi_%25E2%2580%2594%252Ckknpp%252Cdtrack%252Cinformation%252Ccontroller-level_access%252Cnetwork%252Cplant%252Cvirustotal%26vnd_4d_usr_topics%3D%26vnd_prx_segments%3D300003%252C112200%252C121100%252C131100%252C112216%252C210000%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252Cqx7745%252C0lw01o%252Cwmhp4i%252Cdcxr0c%252C2hkgm5%252Czlqtg4%252Cap05we%252Cfdf1wd%252C65f9pd%252Cuas8ja%252Cgiophev_0c%26ctx_advertisers%3D1454517775%26ctx_line_items%3D4736014287%26ctx_creatives%3D138237302059%26vnd_4d_sid%3D534fe3ef-87fc-4ec1-b3f3-9ad39166ac24%26vnd_4d_pid%3Db80403a4-97b9-4408-b5c2-faea5979c25d%26height%3D304%26muted%3D0%26right_rail%3D0%26sensitive%3D0%26series%3D5c82bd18bcdfff6f1f2fc5e7%26width%3D540&correlator=4477059840655887&description_url=https%3A%2F%2Fthescene.com%2Fwatch%2Farstechnica%2Fwar-stories-civilization&vid=5d826c83bcdfff482d6d06b0&cmsid=1495&ppid=0db3d769104248a582128d50877d1861
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
cafe /
Resource Hash
d1a2ccca5313bc9528c7cefc2b6aac573a1d92716a83a91e59c86ad7688fdc6d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 03:34:15 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
1407
x-xss-protection
0
google-lineitem-id
0
pragma
no-cache
server
cafe
google-creative-id
0
content-type
text/xml; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
track
capture.condenastdigital.com/ Frame 1AC4
0
0

collect
www.google-analytics.com/
0
0

moatvideo.js
z.moatads.com/condenastjsvideocontent160527792519/ Frame 1AC4
282 KB
94 KB
Script
General
Full URL
https://z.moatads.com/condenastjsvideocontent160527792519/moatvideo.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
986a0497ee1868674495c262db7f3718c7afbf8f062df9fdc721a1951894f11c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Tue, 05 Nov 2019 03:34:17 GMT
Content-Encoding
gzip
Last-Modified
Sat, 19 Oct 2019 00:50:50 GMT
Server
AmazonS3
x-amz-request-id
64BFDC8426F08910
ETag
"740eae5d5ac4f0c2001ed2f19f6ea91b"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=49562
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
95903
x-amz-id-2
PNTCI3eCKIbmLosm6Tg5uUNPsShenoZYMTu+4Xx8830/VPNaBTFnnJcui2gK55HHz5r77jiPlnM=
track
capture.condenastdigital.com/ Frame 1AC4
0
0

34483233-a98f-4020-929a-0a3b80c0b769file-1422k-128-48000-768.m3u8
dp8hsntg6do36.cloudfront.net/5d826c83bcdfff482d6d06b0/ Frame 1AC4
10 KB
1 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5d826c83bcdfff482d6d06b0/34483233-a98f-4020-929a-0a3b80c0b769file-1422k-128-48000-768.m3u8?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.76 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-76.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
3495e9f8299dc6ef6234bf69cea0e36741cf4613cd8e1d30763105546305999d

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Mon, 04 Nov 2019 17:34:00 GMT
Content-Encoding
gzip
Vary
Origin
Age
36017
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Access-Control-Allow-Origin
*
Last-Modified
Wed, 18 Sep 2019 17:49:17 GMT
Server
AmazonS3
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Via
1.1 b83a899c16a2f53127e152fe5fc783a4.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA50-C1
X-Amz-Cf-Id
xjEGb-Efh88nSfBd4ihF_mZJnUh-I6gUUhVJEmBjKW8IMpQYQeUzZQ==
05654e4b-1c22-41f8-a336-437bfcd0f640
https://arstechnica.com/ Frame 1AC4
64 KB
0
Other
General
Full URL
blob:https://arstechnica.com/05654e4b-1c22-41f8-a336-437bfcd0f640
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4b188a568fa90fa61d4bbe76dd6cf523abe65787e0ac3dc6b5c44db5e823685b

Request headers

Sec-Fetch-Mode
same-origin
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Length
65790
Content-Type
application/javascript
events
wren.condenastdigital.com/1.0/conde/
0
0

34483233-a98f-4020-929a-0a3b80c0b769file-1422k-128-48000-768-00001.ts
dp8hsntg6do36.cloudfront.net/5d826c83bcdfff482d6d06b0/ Frame 1AC4
596 KB
577 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5d826c83bcdfff482d6d06b0/34483233-a98f-4020-929a-0a3b80c0b769file-1422k-128-48000-768-00001.ts?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.76 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-76.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
c4b1dd4bb7210351cac5fd51aaf55a2220532739c042c15ae3667aa3d1198079

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Mon, 04 Nov 2019 17:34:00 GMT
Content-Encoding
gzip
Vary
Origin
Age
36017
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Access-Control-Allow-Origin
*
Last-Modified
Wed, 18 Sep 2019 17:49:12 GMT
Server
AmazonS3
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Via
1.1 b83a899c16a2f53127e152fe5fc783a4.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA50-C1
X-Amz-Cf-Id
YGZKLjrnbxR0WNkjOkBLRIxt92sCYk02qZgQfzXmo5fMGtq1Ib06RA==
track
capture.condenastdigital.com/
0
0

1663130473914833
connect.facebook.net/signals/config/ Frame 1AC4
0
0

track
capture.condenastdigital.com/
0
0

pixel.gif
px.moatads.com/
0
0

jot.html
platform.twitter.com/ Frame A25D
Redirect Chain
  • https://syndication.twitter.com/i/jot
  • https://platform.twitter.com/jot.html
0
0
Document
General
Full URL
https://platform.twitter.com/jot.html
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js?_=1572924849863
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40B5) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
Origin
https://arstechnica.com
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate

Response headers

Accept-Ranges
bytes
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Tue, 05 Nov 2019 03:34:17 GMT
Etag
"d9592a6c704736fa4da218d4357976dd"
Last-Modified
Tue, 22 Oct 2019 23:03:20 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/40B5)
X-Cache
HIT
Content-Length
80

Redirect headers

status
302 302 Found
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
content-length
0
content-type
text/html;charset=utf-8
date
Tue, 05 Nov 2019 03:34:17 GMT
expires
Tue, 31 Mar 1981 05:00:00 GMT
last-modified
Tue, 05 Nov 2019 03:34:17 GMT
location
https://platform.twitter.com/jot.html
pragma
no-cache
server
tsa_o
strict-transport-security
max-age=631138519
x-connection-hash
302d5f714d4f7d571e441fb7eaa09412
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-response-time
118
x-transaction
00f5bf4600a39853
x-tsa-request-body-time
0
x-twitter-response-tags
BouncerCompliant
x-xss-protection
0
events
wren.condenastdigital.com/1.0/conde/
0
0

arstechnica_war-stories-civilization.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1569003425/ Frame 1AC4
0
0

arstechnica_war-stories-civilization.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1569003425/ Frame 1AC4
65 KB
66 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1569003425/arstechnica_war-stories-civilization.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.168.189 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-168-189.fra54.r.cloudfront.net
Software
cloudinary /
Resource Hash
f513c914f8f3cf4975bf34937100375c4b4164ec77ec011488b643452f6ae22f

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Mon, 23 Sep 2019 15:55:10 GMT
Via
1.1 varnish, 1.1 2db316290386960b489a2a16c0a63643.cloudfront.net (CloudFront)
Age
1048412
Edge-Cache-Tag
390602458176548494884398897259766670181,316951410886732526360935603098811400471,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
66728
X-Request-Id
67c1ef73c3958b40
X-Served-By
cache-hhn4060-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Mon, 23 Sep 2019 15:00:59 GMT
Server
cloudinary
X-Timer
S1569254110.301622,VS0,VE267
ETag
"c43a026bdd689dfa9ab341b71ae2cd02"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA54
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
kfke2cFdc_DfB5_-y81i78Uc3hIj4ocUWKDKGoInM-mgJ1pyORAcsg==
X-Cache-Hits
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
api.rlcdn.com
URL
https://api.rlcdn.com/api/identity?pid=2&rt=envelope
Domain
mid.rkdms.com
URL
https://mid.rkdms.com/idsv2?ptk=17c1789b-e660-493b-aa74-3c8fb990dc5f&pubid=CONDENAST
Domain
assets.bounceexchange.com
URL
https://assets.bounceexchange.com/assets/smart-tag/versioned/ijs_all_modules_388015b95703e0f662a36d527ea23867.js
Domain
srv-2019-11-05-03.config.parsely.com
URL
https://srv-2019-11-05-03.config.parsely.com/config/arstechnica.com
Domain
as-sec.casalemedia.com
URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=321388&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A19193230%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2233%22%2C%22siteID%22%3A%22375863%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2231%22%2C%22siteID%22%3A%22375863%22%7D%2C%22id%22%3A%222%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%2C%22user%22%3A%7B%22eids%22%3A%5B%7B%22source%22%3A%22adserver.org%22%2C%22uids%22%3A%5B%7B%22id%22%3A%225780cc30-ee93-4947-a121-516e0e6f4c0c%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID%22%7D%7D%2C%7B%22id%22%3A%22FALSE%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_LOOKUP%22%7D%7D%2C%7B%22id%22%3A%222019-11-05T03%3A34%3A10%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_CREATED_AT%22%7D%7D%5D%7D%5D%7D%7D
Domain
as-sec.casalemedia.com
URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=321388&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A36149470%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%227%22%2C%22siteID%22%3A%22375847%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%228%22%2C%22siteID%22%3A%22375847%22%7D%2C%22id%22%3A%222%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%2C%22user%22%3A%7B%22eids%22%3A%5B%7B%22source%22%3A%22adserver.org%22%2C%22uids%22%3A%5B%7B%22id%22%3A%225780cc30-ee93-4947-a121-516e0e6f4c0c%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID%22%7D%7D%2C%7B%22id%22%3A%22FALSE%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_LOOKUP%22%7D%7D%2C%7B%22id%22%3A%222019-11-05T03%3A34%3A10%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_CREATED_AT%22%7D%7D%5D%7D%5D%7D%7D
Domain
api.skimlinks.mgr.consensu.org
URL
https://api.skimlinks.mgr.consensu.org/iab?nocache=1572924850556
Domain
log.outbrainimg.com
URL
https://log.outbrainimg.com/loggerServices/dwce_cheq_events?timestamp=1572924850577&sessionId=b5d8adc4-79f9-5be4-d37e-a90aaa258d88&url=arstechnica.com&cheqSource=1&cheqEvent=0&exitReason=2
Domain
ids.ad.gt
URL
https://ids.ad.gt/api/v1/pbm_match?pbm=4A4C5D02-0557-4A07-A92A-EA63988A6036&id=3770c5c8-e8d3-4d1f-b991-a6d9329552c8
Domain
p.rfihub.com
URL
https://p.rfihub.com/cm?pub=38725&userid=3770c5c8-e8d3-4d1f-b991-a6d9329552c8&in=1&forward=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fszm_match%3Fszm%3D{userid}%26id%3D3770c5c8-e8d3-4d1f-b991-a6d9329552c8
Domain
d2c8v52ll5s99u.cloudfront.net
URL
https://d2c8v52ll5s99u.cloudfront.net/player/comscore-min.js
Domain
www.google-analytics.com
URL
https://www.google-analytics.com/r/collect
Domain
dp8hsntg6do36.cloudfront.net
URL
https://dp8hsntg6do36.cloudfront.net/5d826c83bcdfff482d6d06b0/34483233-a98f-4020-929a-0a3b80c0b769thumbs.mp4
Domain
dp8hsntg6do36.cloudfront.net
URL
https://dp8hsntg6do36.cloudfront.net/5d826c83bcdfff482d6d06b0/34483233-a98f-4020-929a-0a3b80c0b769thumbs.mp4
Domain
wren.condenastdigital.com
URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Domain
capture.condenastdigital.com
URL
https://capture.condenastdigital.com/track?_ts=2019-11-05T03%3A34%3A15.026Z&_t=slot_loaded&cBr=Ars%20Technica&cKe=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cCh=information%20technology&cTi=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987&cEnt=malware%2C%20pukhraj%20singh%2C%20india%2C%20page%20layout%2C%20indian%2C%20kudankulam%20nuclear%20power%20plant%2C%20north%20korea%2C%20nuclear%20reactor%2C%20cyber%20attack%2C%20nuke%2C%20kudankulam%2C%20kknpp%2C%20dtrack%2C%20virustotal%2C%20sean%20gallagher%2C%20tweet%2C%20utc%2C%20russia%2C%20n.%20korea%2C%20hard-code&cEnw=1%2C%200.8255536731720152%2C%200.8201141909758349%2C%200.75492212464432%2C%200.7341758074191788%2C%200.6714534723000154%2C%200.6687820840003413%2C%200.6650238496076891%2C%200.6530561133369807%2C%200.650136661350706%2C%200.6354726487306158%2C%200.5843496852891271%2C%200.554155780228185%2C%200.48718460536731334%2C%200.46683186332244486%2C%200.4631320408912447%2C%200.4310110895429227%2C%200.42888257765169263%2C%200.4165649852936842%2C%200.41446991250354753&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cCl=603&cId=1593135&cPd=2019-10-29T15%3A47%3A47.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&pRt=referral&pHp=%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=52b23511-f065-4932-8175-b707cf8a0d32&sID=534fe3ef-87fc-4ec1-b3f3-9ad39166ac24&pID=b80403a4-97b9-4408-b5c2-faea5979c25d&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22siderail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Afalse%2C%22isFirstImpressionViewable%22%3Atrue%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Afalse%2C%22isFirstMoneyImpressionViewable%22%3Atrue%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22siderail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x600%22%2C%22slug%22%3A%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%7D&dim3=%7B%22footerStart%22%3A1572924849743%2C%22headerStart%22%3A1572924849726%2C%22navigationStart%22%3A1572924847742%2C%22pubAdsReady%22%3A1572924850056%2C%22injected%22%3A1572924851748%2C%22viewable%22%3A1572924852892%2C%22viewport%22%3A1572924851794%2C%22impression%22%3A1572924855025%7D&dim4=%7B%22pos%22%3A%5B%22rail%22%5D%2C%22ctx_slot_type%22%3A%5B%22siderail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22siderail_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22unsafe%22%5D%2C%22m_categories%22%3A%5B%22moat_unsafe%22%2C%22gv_crime%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%5D%2C%22cnt_tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22malware%22%2C%22pukhraj_singh%22%2C%22india%22%2C%22page_layout%22%2C%22indian%22%2C%22kudankulam_nuclear_power_plant%22%2C%22north_korea%22%2C%22nuclear_reactor%22%2C%22cyber_attack%22%2C%22nuke%22%2C%22kudankulam%22%2C%22kknpp%22%2C%22dtrack%22%2C%22virustotal%22%2C%22sean_gallagher%22%2C%22tweet%22%2C%22utc%22%2C%22russia%22%2C%22n._korea%22%2C%22hard-code%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22malware%22%2C%22pukhraj_singh%22%2C%22india%22%2C%22page_layout%22%2C%22indian%22%2C%22kudankulam_nuclear_power_plant%22%2C%22north_korea%22%2C%22nuclear_reactor%22%2C%22cyber_attack%22%2C%22nuke%22%2C%22kudankulam%22%2C%22kknpp%22%2C%22dtrack%22%2C%22virustotal%22%2C%22sean_gallagher%22%2C%22tweet%22%2C%22utc%22%2C%22russia%22%2C%22n._korea%22%2C%22hard-code%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22malware%22%2C%22pukhraj_singh%22%2C%22india%22%2C%22page_layout%22%2C%22indian%22%2C%22kudankulam_nuclear_power_plant%22%2C%22north_korea%22%2C%22nuclear_reactor%22%2C%22cyber_attack%22%2C%22nuke%22%2C%22kudankulam%22%2C%22control%22%2C%22https%3A%2F%2Ft.co%2Frfateoszrw_pic.twitter.com%2Fomvvmwizsi_%E2%80%94%22%2C%22kknpp%22%2C%22dtrack%22%2C%22information%22%2C%22controller-level_access%22%2C%22network%22%2C%22plant%22%2C%22virustotal%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%220lw01o%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22zlqtg4%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22giophev_0c%22%5D%2C%22ctx_advertisers%22%3A%5B%221454517775%22%5D%2C%22ctx_line_items%22%3A%5B%224736014287%22%5D%2C%22ctx_creatives%22%3A%5B%22138237302059%22%5D%2C%22vnd_4d_sid%22%3A%5B%22534fe3ef-87fc-4ec1-b3f3-9ad39166ac24%22%5D%2C%22vnd_4d_pid%22%3A%5B%22b80403a4-97b9-4408-b5c2-faea5979c25d%22%5D%7D&cKh=malware%2Cpukhraj%20singh%2Cindia%2Cpage%20layout%2Cindian%2Ckudankulam%20nuclear%20power%20plant%2Cnorth%20korea%2Cnuclear%20reactor%2Ccyber%20attack%2Cnuke%2Ckudankulam%2Ccontrol%2Chttps%3A%2F%2Ft.co%2Frfateoszrw%20pic.twitter.com%2Fomvvmwizsi%2C%E2%80%94
Domain
capture.condenastdigital.com
URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-11-05T03%3A34%3A15.618Z&_c=timedOut&_t=gptData&sID=534fe3ef-87fc-4ec1-b3f3-9ad39166ac24&pID=b80403a4-97b9-4408-b5c2-faea5979c25d&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&dim1=%7B%22adBlocked%22%3Afalse%2C%22adUnits%22%3A%5B%223379%2Fconde.ars%2Finterstitial%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F2%22%2C%223379%2Fars.dart%2Finformation-technology%22%5D%2C%22embedLocation%22%3A%22arstechnica%22%2C%22error%22%3A%22%22%2C%22lineItems%22%3A%5B%224736014287%22%5D%2C%22publicaEnabled%22%3Afalse%2C%22videoId%22%3A%225d826c83bcdfff482d6d06b0%22%7D
Domain
www.google-analytics.com
URL
https://www.google-analytics.com/collect
Domain
capture.condenastdigital.com
URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-11-05T03%3A34%3A15.746Z&_c=Video%20Ad&_t=Ad%20Call%20Made&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=https%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Fwar-stories-civilization%2F&cId=5d826c83bcdfff482d6d06b0&cKe=&cPd=2019-09-23T15%3A00%3A00%2B00%3A00&cTi=Civilization%3A%20It%27s%20good%20to%20take%20turns%20%7C%20War%20Stories&cTy=%2F3379%2Fconde.ars%2Fplayer%2Finformation-technology%2Farticle&mDu=734&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pID=b80403a4-97b9-4408-b5c2-faea5979c25d&pWw=540&pWh=303.75&sID=534fe3ef-87fc-4ec1-b3f3-9ad39166ac24&uId=52b23511-f065-4932-8175-b707cf8a0d32&xid=0db3d769-1042-48a5-8212-8d50877d1861&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22gitBranch%22%3A%22master%22%2C%22gitSha%22%3A%22e42798c%22%2C%22guid%22%3A%223c1b6468-a896-4440-3323-46276457f025%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A2984.9375%2C%22playerType%22%3A%22video-continuous%22%2C%22playsOnPage%22%3A0%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22isRightRail%22%3Afalse%2C%22tabStatus%22%3A%22active%22%2C%22versoPageType%22%3A%22article%7Creport%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3A%22OUT_OF_VIEWPORT%22%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%2C%22podIndex%22%3A%22%22%7D&videoViews=1&adId=&pageType=article%7Creport
Domain
wren.condenastdigital.com
URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Domain
capture.condenastdigital.com
URL
https://capture.condenastdigital.com/track?_ts=2019-11-05T03%3A34%3A16.267Z&_t=pageview&cBr=Ars%20Technica&cKe=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cCh=information%20technology&cTi=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987&cEnt=malware%2C%20pukhraj%20singh%2C%20india%2C%20page%20layout%2C%20indian%2C%20kudankulam%20nuclear%20power%20plant%2C%20north%20korea%2C%20nuclear%20reactor%2C%20cyber%20attack%2C%20nuke%2C%20kudankulam%2C%20kknpp%2C%20dtrack%2C%20virustotal%2C%20sean%20gallagher%2C%20tweet%2C%20utc%2C%20russia%2C%20n.%20korea%2C%20hard-code&cEnw=1%2C%200.8255536731720152%2C%200.8201141909758349%2C%200.75492212464432%2C%200.7341758074191788%2C%200.6714534723000154%2C%200.6687820840003413%2C%200.6650238496076891%2C%200.6530561133369807%2C%200.650136661350706%2C%200.6354726487306158%2C%200.5843496852891271%2C%200.554155780228185%2C%200.48718460536731334%2C%200.46683186332244486%2C%200.4631320408912447%2C%200.4310110895429227%2C%200.42888257765169263%2C%200.4165649852936842%2C%200.41446991250354753&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cCl=603&cId=1593135&cPd=2019-10-29T15%3A47%3A47.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&pRt=referral&pHp=%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pWw=1600&pWh=1200&pPw=1600&pPh=5000&pSw=1600&pSh=1200&uID=52b23511-f065-4932-8175-b707cf8a0d32&sID=534fe3ef-87fc-4ec1-b3f3-9ad39166ac24&pID=b80403a4-97b9-4408-b5c2-faea5979c25d&uDt=desktop&_o=ars-technica&_c=general&xID=0db3d769-1042-48a5-8212-8d50877d1861&cKh=malware%2Cpukhraj%20singh%2Cindia%2Cpage%20layout%2Cindian%2Ckudankulam%20nuclear%20power%20plant%2Cnorth%20korea%2Cnuclear%20reactor%2Ccyber%20attack%2Cnuke%2Ckudankulam%2Ccontrol%2Chttps%3A%2F%2Ft.co%2Frfateoszrw%20pic.twitter.com%2Fomvvmwizsi%2C%E2%80%94
Domain
connect.facebook.net
URL
https://connect.facebook.net/signals/config/1663130473914833?v=2.9.5&r=stable
Domain
capture.condenastdigital.com
URL
https://capture.condenastdigital.com/track?_ts=2019-11-05T03%3A34%3A16.353Z&_t=slot_loaded&cBr=Ars%20Technica&cKe=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cCh=information%20technology&cTi=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.35957638383045976%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987%2C%200.18340897717646987&cEnt=malware%2C%20pukhraj%20singh%2C%20india%2C%20page%20layout%2C%20indian%2C%20kudankulam%20nuclear%20power%20plant%2C%20north%20korea%2C%20nuclear%20reactor%2C%20cyber%20attack%2C%20nuke%2C%20kudankulam%2C%20kknpp%2C%20dtrack%2C%20virustotal%2C%20sean%20gallagher%2C%20tweet%2C%20utc%2C%20russia%2C%20n.%20korea%2C%20hard-code&cEnw=1%2C%200.8255536731720152%2C%200.8201141909758349%2C%200.75492212464432%2C%200.7341758074191788%2C%200.6714534723000154%2C%200.6687820840003413%2C%200.6650238496076891%2C%200.6530561133369807%2C%200.650136661350706%2C%200.6354726487306158%2C%200.5843496852891271%2C%200.554155780228185%2C%200.48718460536731334%2C%200.46683186332244486%2C%200.4631320408912447%2C%200.4310110895429227%2C%200.42888257765169263%2C%200.4165649852936842%2C%200.41446991250354753&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cCl=603&cId=1593135&cPd=2019-10-29T15%3A47%3A47.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&pRt=referral&pHp=%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pWw=1600&pWh=1200&pPw=1600&pPh=5100&pSw=1600&pSh=1200&uID=52b23511-f065-4932-8175-b707cf8a0d32&sID=534fe3ef-87fc-4ec1-b3f3-9ad39166ac24&pID=b80403a4-97b9-4408-b5c2-faea5979c25d&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&xID=0db3d769-1042-48a5-8212-8d50877d1861&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22post_nav_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Afalse%2C%22isFirstImpressionViewable%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Afalse%2C%22isFirstMoneyImpressionViewable%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22post_nav_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22970x250%22%2C%22slug%22%3A%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%7D&dim3=%7B%22footerStart%22%3A1572924849743%2C%22headerStart%22%3A1572924849726%2C%22navigationStart%22%3A1572924847742%2C%22pubAdsReady%22%3A1572924850056%2C%22injected%22%3A1572924851945%2C%22viewable%22%3A1572924853094%2C%22viewport%22%3A1572924851996%2C%22impression%22%3A1572924856353%7D&dim4=%7B%22pos%22%3A%5B%22hero%22%5D%2C%22ctx_slot_type%22%3A%5B%22post_nav%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22post_nav_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22unsafe%22%5D%2C%22m_categories%22%3A%5B%22moat_unsafe%22%2C%22gv_crime%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%5D%2C%22cnt_tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22malware%22%2C%22pukhraj_singh%22%2C%22india%22%2C%22page_layout%22%2C%22indian%22%2C%22kudankulam_nuclear_power_plant%22%2C%22north_korea%22%2C%22nuclear_reactor%22%2C%22cyber_attack%22%2C%22nuke%22%2C%22kudankulam%22%2C%22kknpp%22%2C%22dtrack%22%2C%22virustotal%22%2C%22sean_gallagher%22%2C%22tweet%22%2C%22utc%22%2C%22russia%22%2C%22n._korea%22%2C%22hard-code%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22malware%22%2C%22pukhraj_singh%22%2C%22india%22%2C%22page_layout%22%2C%22indian%22%2C%22kudankulam_nuclear_power_plant%22%2C%22north_korea%22%2C%22nuclear_reactor%22%2C%22cyber_attack%22%2C%22nuke%22%2C%22kudankulam%22%2C%22kknpp%22%2C%22dtrack%22%2C%22virustotal%22%2C%22sean_gallagher%22%2C%22tweet%22%2C%22utc%22%2C%22russia%22%2C%22n._korea%22%2C%22hard-code%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22malware%22%2C%22pukhraj_singh%22%2C%22india%22%2C%22page_layout%22%2C%22indian%22%2C%22kudankulam_nuclear_power_plant%22%2C%22north_korea%22%2C%22nuclear_reactor%22%2C%22cyber_attack%22%2C%22nuke%22%2C%22kudankulam%22%2C%22control%22%2C%22https%3A%2F%2Ft.co%2Frfateoszrw_pic.twitter.com%2Fomvvmwizsi_%E2%80%94%22%2C%22kknpp%22%2C%22dtrack%22%2C%22information%22%2C%22controller-level_access%22%2C%22network%22%2C%22plant%22%2C%22virustotal%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%220lw01o%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22zlqtg4%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22giophev_0c%22%5D%2C%22ctx_advertisers%22%3A%5B%221454517775%22%5D%2C%22ctx_line_items%22%3A%5B%224736014287%22%5D%2C%22ctx_creatives%22%3A%5B%22138237302059%22%5D%2C%22vnd_4d_sid%22%3A%5B%22534fe3ef-87fc-4ec1-b3f3-9ad39166ac24%22%5D%2C%22vnd_4d_pid%22%3A%5B%22b80403a4-97b9-4408-b5c2-faea5979c25d%22%5D%7D&cKh=malware%2Cpukhraj%20singh%2Cindia%2Cpage%20layout%2Cindian%2Ckudankulam%20nuclear%20power%20plant%2Cnorth%20korea%2Cnuclear%20reactor%2Ccyber%20attack%2Cnuke%2Ckudankulam%2Ccontrol%2Chttps%3A%2F%2Ft.co%2Frfateoszrw%20pic.twitter.com%2Fomvvmwizsi%2C%E2%80%94
Domain
px.moatads.com
URL
https://px.moatads.com/pixel.gif?e=43&t=1572924849986&de=494475862807&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=post_nav_0&zMoatRendered=4&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=3&zMoatPageDataTargetingSet=4&zMoatSafetyTargetingSet=4&zMoatEmptySlot=1&zMoatNadoDataLoadTime=428&zMoatAllDataLoadTime=428&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&ac=1&bq=11&f=0&zn=0&if=428&na=1416499554&cs=0
Domain
wren.condenastdigital.com
URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Domain
dwgyu36up6iuz.cloudfront.net
URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1569003425/arstechnica_war-stories-civilization.jpg

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

4d.condenastdigital.com
a.ad.gt
adserver-us.adtech.advertising.com
adservice.google.com
adservice.google.de
ak.sail-horizon.com
ampcid.google.com
ampcid.google.de
api.cnevids.com
api.rlcdn.com
api.skimlinks.mgr.consensu.org
arstechnica.com
as-sec.casalemedia.com
assets.bounceexchange.com
bw-prod.plrsrvcs.com
c.amazon-adsystem.com
capture.condenastdigital.com
cdn.arstechnica.net
cdn.cookielaw.org
cdn.mediavoice.com
cdn.syndication.twimg.com
click.email.sans.org
cm.everesttech.net
cm.g.doubleclick.net
condenast.demdex.net
connect.facebook.net
cs.emxdgt.com
d.turn.com
d1z2jf7jlzjs58.cloudfront.net
d2c8v52ll5s99u.cloudfront.net
dp8hsntg6do36.cloudfront.net
dpm.demdex.net
dwgyu36up6iuz.cloudfront.net
embed.actionbutton.co
fastlane.rubiconproject.com
geolocation.onetrust.com
ib.adnxs.com
ids.ad.gt
images.outbrainimg.com
imasdk.googleapis.com
infinityid.condenastdigital.com
js-sec.indexww.com
log.outbrainimg.com
match.adsrvr.org
match.deepintent.com
mb.moatads.com
mcdp-chidc2.outbrain.com
mid.rkdms.com
odb.outbrain.com
p.ad.gt
p.rfihub.com
p.skimresources.com
pbs.twimg.com
pixel.condenastdigital.com
pixel.quantserve.com
pixel.tapad.com
platform.twitter.com
player.cnevids.com
plugin.mediavoice.com
polarcdn-pentos.com
polarcdn-terrax.com
prod-native.actionbutton.co
pubads.g.doubleclick.net
px.ads.linkedin.com
px.moatads.com
r.skimresources.com
rules.quantcount.com
s.skimresources.com
s0.2mdn.net
sb.scorecardresearch.com
sc-static.net
secure.adnxs.com
secure.quantserve.com
securepubads.g.doubleclick.net
segment-data.zqtk.net
snap.licdn.com
srv-2019-11-05-03.config.parsely.com
sstats.arstechnica.com
static.ads-twitter.com
static.criteo.net
static.polarcdn.com
stats.g.doubleclick.net
syndication.twitter.com
t.co
t.skimresources.com
tag.bounceexchange.com
tcheck.outbrainimg.com
tpc.googlesyndication.com
tr.snapchat.com
widgets.outbrain.com
wren.condenastdigital.com
www.facebook.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
www.linkedin.com
www.medtargetsystem.com
z.moatads.com
api.rlcdn.com
api.skimlinks.mgr.consensu.org
as-sec.casalemedia.com
assets.bounceexchange.com
capture.condenastdigital.com
connect.facebook.net
d2c8v52ll5s99u.cloudfront.net
dp8hsntg6do36.cloudfront.net
dwgyu36up6iuz.cloudfront.net
ids.ad.gt
log.outbrainimg.com
mid.rkdms.com
p.rfihub.com
px.moatads.com
srv-2019-11-05-03.config.parsely.com
wren.condenastdigital.com
www.google-analytics.com
104.17.193.78
104.244.42.133
104.244.42.136
13.224.196.51
13.224.199.29
13.225.78.106
13.225.78.4
136.147.189.155
143.204.101.45
143.204.101.76
143.204.98.108
151.101.114.2
151.101.12.157
151.101.12.239
151.139.128.10
152.195.132.202
152.199.21.89
172.217.16.130
172.217.23.162
172.217.23.98
172.227.124.249
178.250.0.130
18.195.155.181
185.33.223.197
2.18.232.28
2.18.234.190
2.18.234.21
2.18.235.40
205.234.175.175
2600:9000:200d:a000:11:8cf6:b500:93a1
2600:9000:21f3:f200:6:44e3:f8c0:93a1
2606:2800:134:1a0d:1429:742:782:b6
2606:2800:134:fa2:1627:1fe:edb:1665
2606:2800:234:59:254c:406:2366:268c
2606:4700:10::6814:b944
2606:4700::6811:4132
2606:4700::6811:dd0f
2606:4700::6813:d983
2606:4700::6813:f87e
2a00:1450:4001:806::200e
2a00:1450:4001:808::200a
2a00:1450:4001:809::2001
2a00:1450:4001:80b::2002
2a00:1450:4001:80b::2003
2a00:1450:4001:815::2008
2a00:1450:4001:81a::2002
2a00:1450:4001:81c::200e
2a00:1450:4001:81d::2002
2a00:1450:4001:821::2006
2a00:1450:4001:825::2004
2a00:1450:400c:c00::9b
2a02:26f0:6c00:295::25ea
2a03:2880:f01c:8012:face:b00c:0:3
2a03:2880:f11c:8183:face:b00c:0:25de
2a05:f500:11:101::b93f:9001
2a05:f500:11:101::b93f:9005
3.10.47.75
3.209.40.151
3.220.246.137
3.225.242.81
34.210.147.177
34.240.143.140
35.165.247.37
35.167.98.6
35.186.226.184
35.190.59.101
35.190.92.63
35.201.67.47
35.227.248.159
37.252.173.62
46.228.164.13
50.31.169.131
52.1.219.33
52.19.1.241
52.206.158.200
52.222.168.123
52.222.168.189
52.48.158.117
52.71.111.112
54.77.236.71
63.140.41.50
64.74.236.127
66.117.28.86
69.173.144.143
91.228.74.146
91.228.74.147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