URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Submission: On March 25 via api from US

Summary

This website contacted 20 IPs in 5 countries across 20 domains to perform 98 HTTP transactions. The main IP is 67.227.194.195, located in Lansing, United States and belongs to LIQUIDWEB, US. The main domain is www.hackread.com.
TLS certificate: Issued by Let's Encrypt Authority X3 on February 13th 2020. Valid for: 3 months.
This is the only time www.hackread.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
40 67.227.194.195 32244 (LIQUIDWEB)
2 2606:4700::68... 13335 (CLOUDFLAR...)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
3 2a04:fa87:fff... 2635 (AUTOMATTIC)
6 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
7 52.30.187.156 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
17 2a00:1450:400... 15169 (GOOGLE)
2 2 64.202.112.63 22075 (AS-OUTBRAIN)
2 2 185.33.223.200 29990 (ASN-APPNEX)
3 3 52.58.23.168 16509 (AMAZON-02)
3 3 18.194.31.52 16509 (AMAZON-02)
1 192.132.33.46 18568 (BIDTELLECT)
1 2 2a00:1450:400... 15169 (GOOGLE)
9 151.139.128.10 20446 (HIGHWINDS3)
1 34.201.224.52 14618 (AMAZON-AES)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 99.86.7.46 16509 (AMAZON-02)
2 2a00:1450:400... 15169 (GOOGLE)
98 20
Domain Requested by
40 www.hackread.com www.hackread.com
17 googleads.g.doubleclick.net pagead2.googlesyndication.com
7 img.revcontent.com cdn.revcontent.com
7 trends.revcontent.com www.hackread.com
trends.revcontent.com
cdn.revcontent.com
4 pagead2.googlesyndication.com www.hackread.com
pagead2.googlesyndication.com
3 rtb.mfadsrvr.com 3 redirects
3 x.bidswitch.net 3 redirects
3 secure.gravatar.com www.hackread.com
2 tpc.googlesyndication.com pagead2.googlesyndication.com
tpc.googlesyndication.com
2 cdn.revcontent.com www.hackread.com
2 www.google-analytics.com 1 redirects www.googletagmanager.com
2 ib.adnxs.com 2 redirects
2 b1sync.zemanta.com 2 redirects
2 fonts.gstatic.com ajax.googleapis.com
www.hackread.com
2 cdnjs.cloudflare.com www.hackread.com
1 cdn.amurege.com cdn.revcontent.com
1 static.earnify.com cdn.revcontent.com
1 www.google.de www.hackread.com
1 www.google.com 1 redirects
1 stats.g.doubleclick.net 1 redirects
1 ri.amurege.com www.hackread.com
1 www.googletagservices.com pagead2.googlesyndication.com
1 bttrack.com www.hackread.com
1 adservice.google.com pagead2.googlesyndication.com
1 adservice.google.de pagead2.googlesyndication.com
1 www.googletagmanager.com www.hackread.com
1 fonts.googleapis.com ajax.googleapis.com
1 ajax.googleapis.com www.hackread.com
98 28
Subject Issuer Validity Valid
hackread.com
Let's Encrypt Authority X3
2020-02-13 -
2020-05-13
3 months crt.sh
cloudflare.com
CloudFlare Inc ECC CA-2
2020-01-07 -
2020-10-09
9 months crt.sh
*.storage.googleapis.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
*.gravatar.com
COMODO RSA Domain Validation Secure Server CA
2018-09-06 -
2020-09-05
2 years crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
*.google-analytics.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
*.google.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
revcontent.com
Amazon
2019-09-19 -
2020-10-19
a year crt.sh
*.bttrack.com
Sectigo RSA Domain Validation Secure Server CA
2019-03-19 -
2021-04-13
2 years crt.sh
cdn.revcontent.com
Sectigo RSA Domain Validation Secure Server CA
2020-02-09 -
2020-05-09
3 months crt.sh
amurege.com
Amazon
2019-10-08 -
2020-11-08
a year crt.sh
www.google.de
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
ssl450535.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2020-03-18 -
2020-09-24
6 months crt.sh
img.revcontent.com
Sectigo RSA Domain Validation Secure Server CA
2020-02-09 -
2020-05-09
3 months crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh

This page contains 19 frames:

Primary Page: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Frame ID: 984E7B9600FCD7F620124F12FA0B1B45
Requests: 81 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20200319/r20190131/zrt_lookup.html
Frame ID: 18CCE7FCB23F6BB5AD4E7C983C0FA4E2
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1024134837&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979541&bpp=30&bdt=726&fdt=123&idt=123&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&correlator=8014353403258&frm=20&pv=2&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=58&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=306&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=1&uci=a!1&fsb=1&xpc=6h8G7KjPhD&p=https%3A//www.hackread.com&dtd=140
Frame ID: 26161519E5908F7D66924B40C4D74F40
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=301552094&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979571&bpp=4&bdt=756&fdt=139&idt=139&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_slotnames=5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=306&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=2&uci=a!2&fsb=1&xpc=X4oimdTm3c&p=https%3A//www.hackread.com&dtd=143
Frame ID: B314C2CEEED877ABF33865D35D6B55C2
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=3012150858&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979575&bpp=3&bdt=760&fdt=143&idt=143&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_slotnames=5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=405&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=3&uci=a!3&fsb=1&xpc=kK0pLfru5R&p=https%3A//www.hackread.com&dtd=146
Frame ID: 00FB124D151BAF903C056874FF8D74BB
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1854264899&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979578&bpp=4&bdt=763&fdt=147&idt=147&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_slotnames=5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=405&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=4&uci=a!4&fsb=1&xpc=s9G4vd8gMZ&p=https%3A//www.hackread.com&dtd=151
Frame ID: FD2BFACDA24BD09B9CDE134AD9B7F7CE
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=296273166&adf=1489503786&w=300&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979582&bpp=3&bdt=767&fdt=153&idt=154&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=1162&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=5&uci=a!5&fsb=1&xpc=aSIYE9sMYn&p=https%3A//www.hackread.com&dtd=157
Frame ID: CF6CF27F5CBAE71070B74A5F47C04100
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1075612886&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979585&bpp=3&bdt=770&fdt=163&idt=163&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=1441&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=6&uci=a!6&btvi=1&fsb=1&xpc=L2UzYtPV00&p=https%3A//www.hackread.com&dtd=168
Frame ID: A7AC4ACACFAB71C14F8FFB5C65D7F252
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=4061625637&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979588&bpp=3&bdt=773&fdt=193&idt=193&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=1441&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=7&uci=a!7&btvi=2&fsb=1&xpc=p44zq6XKS9&p=https%3A//www.hackread.com&dtd=196
Frame ID: 0308719D424BCD76B66EB84BACF45D1D
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=296273166&adf=1167544308&w=300&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979591&bpp=3&bdt=776&fdt=201&idt=201&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=2202&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=8&uci=a!8&btvi=3&fsb=1&xpc=AhQwdzEnQi&p=https%3A//www.hackread.com&dtd=204
Frame ID: E89B33CDD0CFAE402614DD84DCC250C7
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=3056409154&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979594&bpp=3&bdt=779&fdt=209&idt=209&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=2481&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=9&uci=a!9&btvi=4&fsb=1&xpc=6wYUOsXg42&p=https%3A//www.hackread.com&dtd=211
Frame ID: C1EC209A68597CEBA00A17ED39BE2963
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1506880035&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979597&bpp=3&bdt=782&fdt=216&idt=216&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=2481&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=10&uci=a!a&btvi=5&fsb=1&xpc=xx17Vhthg9&p=https%3A//www.hackread.com&dtd=218
Frame ID: 18996F8885D70D28DA07B95A95B9A90F
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=296273166&adf=2095955190&w=300&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979600&bpp=3&bdt=785&fdt=223&idt=223&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=3044&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=11&uci=a!b&btvi=6&fsb=1&xpc=03oJR7h4Qq&p=https%3A//www.hackread.com&dtd=228
Frame ID: 7064704B0424AA5DC067B753DEDDFB18
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=3813488108&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979603&bpp=4&bdt=788&fdt=287&idt=287&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3002399743279103&dssz=64&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=4042&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=6657&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=12&uci=a!c&btvi=7&fsb=1&xpc=PZp2tkuxLE&p=https%3A//www.hackread.com&dtd=293
Frame ID: C42A6A5C84E649F3B22A8B4F55155B18
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&adk=1812271804&adf=3025194257&lmt=1585154979&plat=1%3A32776%2C2%3A16809992%2C8%3A134250504%2C9%3A134250504%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&ea=0&flash=0&pra=7&wgl=1&adsid=NT&dt=1585154979927&bpp=3&bdt=1112&fdt=4&idt=4&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3002399718375420&dssz=68&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=6657&pvsid=2719980998024620&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&ifi=16&uci=a!g&fsb=1&dtd=11
Frame ID: 5372231F8901851E41EDFD2AFFE99513
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=4145652818&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979607&bpp=3&bdt=792&fdt=337&idt=337&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250%2C300x250%2C300x250%2C0x0&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3002399718375420&dssz=68&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=4042&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=6657&pvsid=2719980998024620&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=13&uci=a!d&btvi=8&fsb=1&xpc=AiRKXs1dqm&p=https%3A//www.hackread.com&dtd=340
Frame ID: 76092F1F3071F13835FCD7902E68CC48
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=1082465236&adk=2250471325&adf=2036033552&w=570&fwrn=4&lmt=1585154980&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=570x90_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&fwr=0&wgl=1&adsid=NT&dt=1585154979610&bpp=4&bdt=795&fdt=407&idt=407&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250%2C300x250%2C300x250%2C0x0&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3002399718375420&dssz=68&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=458&ady=4290&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=6515&psts=ABP-KfQWQRY6sYJH6XdAfFinyCOf315T2ZlGeqtBFYzEtQXDuAPqsO-Bdj0%2CABP-KfRhEZKNeWk42hGRC6e7KSGohjUnvbgr91-KGUitpfIS46sd1gnpdU4%2CABP-KfQOEOQhiyP9oy1_UO759ANwT3D0VDd4LqPSI631u_L79DwXPkjczY0%2CABP-KfS2mu_02HgO6oUfVPwedbp7IJNGZOkH49F72YOT9-eCymEDrTgxyuk&pvsid=2719980998024620&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=14&uci=a!e&btvi=9&fsb=1&xpc=9qplYXNnDa&p=https%3A//www.hackread.com&dtd=410
Frame ID: C9F34B9E491D2F93C2C985DBD0152BDB
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=600&slotname=3047884612&adk=2945537484&adf=1398944667&w=300&lmt=1585154980&psa=0&guci=1.2.0.0.2.2.0.0&format=300x600&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979614&bpp=2&bdt=799&fdt=439&idt=439&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250%2C300x250%2C300x250%2C0x0%2C570x90_0ads_al&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1113&ady=945&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=6284&psts=ABP-KfQWQRY6sYJH6XdAfFinyCOf315T2ZlGeqtBFYzEtQXDuAPqsO-Bdj0%2CABP-KfRhEZKNeWk42hGRC6e7KSGohjUnvbgr91-KGUitpfIS46sd1gnpdU4%2CABP-KfQOEOQhiyP9oy1_UO759ANwT3D0VDd4LqPSI631u_L79DwXPkjczY0%2CABP-KfS2mu_02HgO6oUfVPwedbp7IJNGZOkH49F72YOT9-eCymEDrTgxyuk&pvsid=2719980998024620&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7Cm%7CoeE%7C&abl=NS&pfx=0&fu=16&bc=31&ifi=15&uci=a!f&fsb=1&xpc=dBEQbj0n89&p=https%3A//www.hackread.com&dtd=446
Frame ID: F073DCF8ADC1D9FC82404B00CF706208
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Frame ID: 9A4AEF07BE2E7D4FC976CE3E2B5DC277
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • script /googlesyndication\.com\//i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • script /googleapis\.com\/.+webfont/i

Page Statistics

98
Requests

100 %
HTTPS

60 %
IPv6

20
Domains

28
Subdomains

20
IPs

5
Countries

1531 kB
Transfer

3197 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 55
  • https://b1sync.zemanta.com/usersync/revcontent/?puid=NjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg%3D&cb=https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fexchange_uid%3DNjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg%253D%26bidder%3D3%26bidder_uid%3D__ZUID__&rev_dt=1585154979 HTTP 302
  • https://b1sync.zemanta.com/usersync/revcontent/?cb=https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fexchange_uid%3DNjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg%253D%26bidder%3D3%26bidder_uid%3D__ZUID__&puid=NjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg%3D&rev_dt=1585154979&s=2 HTTP 302
  • https://trends.revcontent.com/cm/pixel_sync?exchange_uid=NjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg%3D&bidder=3&bidder_uid=q-momfqoPTAmVtlzVfOO
Request Chain 56
  • https://ib.adnxs.com/getuid?https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fbidder%3D115%26bidder_uid%3D%24UID%26exchange_uid%3DNjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg%253D&geo=35&rev_dt=1585154979 HTTP 307
  • https://ib.adnxs.com/bounce?%2Fgetuid%3Fhttps%253A%252F%252Ftrends.revcontent.com%252Fcm%252Fpixel_sync%253Fbidder%253D115%2526bidder_uid%253D%2524UID%2526exchange_uid%253DNjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg%25253D%26geo%3D35%26rev_dt%3D1585154979 HTTP 302
  • https://trends.revcontent.com/cm/pixel_sync?bidder=115&bidder_uid=297032476261571954&exchange_uid=NjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg%3D&geo=35&rev_dt=1585154979
Request Chain 57
  • https://x.bidswitch.net/sync?ssp=revcontent&rev_dt=1585154979 HTTP 302
  • https://x.bidswitch.net/ul_cb/sync?ssp=revcontent&rev_dt=1585154979 HTTP 302
  • https://rtb.mfadsrvr.com/sync?ssp=bidswitch&bidswitch_ssp_id=revcontent&bsw_user_id=e2be7285-1005-40d4-9894-dd91726fcaf7 HTTP 302
  • https://x.bidswitch.net/sync?dsp_id=250&expires=14&user_id=90f1a438-cb18-43b9-a8b9-2cbd1d7e627f&ssp=revcontent HTTP 302
  • https://trends.revcontent.com/cm/pixel_sync?bidder=118&bidder_uid=e2be7285-1005-40d4-9894-dd91726fcaf7
Request Chain 59
  • https://rtb.mfadsrvr.com/sync?ssp=revcontent&ssp_user_id=NjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg%3D&rev_dt=1585154979 HTTP 302
  • https://rtb.mfadsrvr.com/ul_cb/sync?ssp=revcontent&ssp_user_id=NjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg%3D&rev_dt=1585154979 HTTP 302
  • https://trends.revcontent.com/cm/pixel_sync?exchange_uid=NjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg=&bidder=154&bidder_uid=90f1a438-cb18-43b9-a8b9-2cbd1d7e627f
Request Chain 83
  • https://www.google-analytics.com/r/collect?v=1&_v=j81&a=1631087609&t=pageview&_s=1&dl=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&ul=en-us&de=UTF-8&dt=Coronavirus%20extortion%20scam%20threatens%20to%20infect%20victim%27s%20family&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=IAhAAUAB~&jid=631001509&gjid=760449553&cid=298010948.1585154980&tid=UA-36230183-1&_gid=238068780.1585154980&_r=1&gtm=2ou3i0&z=586007954 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-36230183-1&cid=298010948.1585154980&jid=631001509&_gid=238068780.1585154980&gjid=760449553&_v=j81&z=586007954 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=298010948.1585154980&jid=631001509&_v=j81&z=586007954 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=298010948.1585154980&jid=631001509&_v=j81&z=586007954&slf_rd=1&random=2414498296

98 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
91 KB
18 KB
Document
General
Full URL
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
a519b4f7a8d96a554ffd3ec0cb3c2c5431e94e8861b83489316e7216ffae40d4

Request headers

Host
www.hackread.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document

Response headers

Date
Wed, 25 Mar 2020 16:49:37 GMT
Server
Apache
Link
<https://www.hackread.com/wp-json/>; rel="https://api.w.org/", <https://www.hackread.com/?p=76386>; rel=shortlink
Cache-Control
max-age=2592000
Expires
Fri, 24 Apr 2020 16:49:37 GMT
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
17794
Keep-Alive
timeout=2, max=100
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
style.min.css
www.hackread.com/wp-includes/css/dist/block-library/
29 KB
5 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-includes/css/dist/block-library/style.min.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
4b8fe5c3d0e5ef7a6582185cbf5c535b5d369c8df1da98c03ed69833e55f474d

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:49:38 GMT
Content-Encoding
gzip
Last-Modified
Sun, 17 Nov 2019 13:59:40 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=99
Content-Length
4767
Expires
Fri, 24 Apr 2020 16:49:38 GMT
blocks.style.build.css
www.hackread.com/wp-content/plugins/quick-adsense-reloaded/includes/gutenberg/dist/
184 B
514 B
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/plugins/quick-adsense-reloaded/includes/gutenberg/dist/blocks.style.build.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
36ed85dd058e4c2843e06146946e0ff1f9ace65760c22af5eb4f1b22319dddb5

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:49:38 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Mar 2020 22:13:31 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=98
Content-Length
155
Expires
Fri, 24 Apr 2020 16:49:38 GMT
styles.css
www.hackread.com/wp-content/plugins/contact-form-7/includes/css/
2 KB
1 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/plugins/contact-form-7/includes/css/styles.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
811e8960b8f79f14983e30df80a4ccc69d82430ccc0520d2a1a3d1405cfbb2a1

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:49:38 GMT
Content-Encoding
gzip
Last-Modified
Sat, 07 Mar 2020 22:25:04 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=100
Content-Length
677
Expires
Fri, 24 Apr 2020 16:49:38 GMT
mashsb.min.css
www.hackread.com/wp-content/plugins/mashsharer/assets/css/
46 KB
28 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/plugins/mashsharer/assets/css/mashsb.min.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
0500bd58f47403106f2f10da96d8d196941a02a4046e88611a59494557861f98

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:49:38 GMT
Content-Encoding
gzip
Last-Modified
Sun, 22 Mar 2020 12:13:59 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=100
Content-Length
28578
Expires
Fri, 24 Apr 2020 16:49:38 GMT
bootstrap.min.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/
120 KB
20 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/bootstrap.min.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
31fbd99641c212a6ad3681a2397bde13c148c0ccd98385bce6a7eb7c81417d87

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:49:38 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=100
Content-Length
19883
Expires
Fri, 24 Apr 2020 16:49:38 GMT
mip.external.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/
87 KB
18 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/mip.external.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
8afc1a2899ec2d2c29c203e17c69fe00b369d1aec1634a58653208d6db298958

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:49:38 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=100
Content-Length
17673
Expires
Fri, 24 Apr 2020 16:49:38 GMT
style.css
www.hackread.com/wp-content/themes/newsgamer/
113 KB
18 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/style.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
f9934e8ca51663923f923910d8b0ac7e849f46e87f65f75fcd513dac5e9f16d5

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:49:38 GMT
Content-Encoding
gzip
Last-Modified
Fri, 02 Nov 2018 17:34:12 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=100
Content-Length
18556
Expires
Fri, 24 Apr 2020 16:49:38 GMT
media-queries.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/
26 KB
4 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/media-queries.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
b5b0cab3bf2be0ec59bd3b301364a639d993e99d0d526e436442065b9406067b

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:49:38 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=97
Content-Length
3798
Expires
Fri, 24 Apr 2020 16:49:38 GMT
dynamic.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/
308 KB
12 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/dynamic.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
3ac3228e00d2bbbcb08bb7c5586e8744512c0c43c3cf13b2b5df10cd75e6040a

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:49:38 GMT
Content-Encoding
gzip
Last-Modified
Wed, 25 Mar 2020 16:13:49 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=99
Content-Length
12196
Expires
Fri, 24 Apr 2020 16:49:38 GMT
typography.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/
19 KB
2 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/typography.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
106d020c501875011ff5aab5034da42ba83e096c17f901fda9e8f4c92ecde8b4

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:49:38 GMT
Content-Encoding
gzip
Last-Modified
Wed, 25 Mar 2020 16:13:49 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=96
Content-Length
1771
Expires
Fri, 24 Apr 2020 16:49:38 GMT
jquery.js
www.hackread.com/wp-includes/js/jquery/
95 KB
33 KB
Script
General
Full URL
https://www.hackread.com/wp-includes/js/jquery/jquery.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
1db21d816296e6939ba1f42962496e4134ae2b0081e26970864c40c6d02bb1df

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:49:38 GMT
Content-Encoding
gzip
Last-Modified
Wed, 22 May 2019 07:16:05 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=99
Content-Length
33776
Expires
Fri, 24 Apr 2020 16:49:38 GMT
jquery-migrate.min.js
www.hackread.com/wp-includes/js/jquery/
10 KB
4 KB
Script
General
Full URL
https://www.hackread.com/wp-includes/js/jquery/jquery-migrate.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
48eb8b500ae6a38617b5738d2b3faec481922a7782246e31d2755c034a45cd5d

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:49:38 GMT
Content-Encoding
gzip
Last-Modified
Tue, 21 Jun 2016 19:13:07 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=99
Content-Length
4014
Expires
Fri, 24 Apr 2020 16:49:38 GMT
cookieconsent.min.css
cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/
4 KB
1 KB
Stylesheet
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4004 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
79b378e8f3c1fece39a1472a2e7d920ab80eb5881525a1622d9dbaa954aa23c3
Security Headers
Name Value
Strict-Transport-Security max-age=15780000; includeSubDomains

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Wed, 25 Mar 2020 16:49:38 GMT
content-encoding
br
cf-cache-status
HIT
age
4139070
cf-ray
579a2059a8b91f29-FRA
status
200
strict-transport-security
max-age=15780000; includeSubDomains
alt-svc
h3-27=":443"; ma=86400, h3-25=":443"; ma=86400, h3-24=":443"; ma=86400, h3-23=":443"; ma=86400
last-modified
Tue, 17 Jul 2018 12:30:51 GMT
server
cloudflare
etag
W/"5b4de17b-fe0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
access-control-allow-origin
*
expires
Mon, 15 Mar 2021 16:49:38 GMT
cache-control
public, max-age=30672000
timing-allow-origin
*
served-in-seconds
0.001
cookieconsent.min.js
cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/
20 KB
6 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4004 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
cb41292903f6bd996333bdfe6fbc58e1dbdb6109074505ee3ea46373bb23be70
Security Headers
Name Value
Strict-Transport-Security max-age=15780000; includeSubDomains

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:49:38 GMT
content-encoding
br
cf-cache-status
HIT
age
4091502
cf-ray
579a2059a8be1f29-FRA
status
200
strict-transport-security
max-age=15780000; includeSubDomains
alt-svc
h3-27=":443"; ma=86400, h3-25=":443"; ma=86400, h3-24=":443"; ma=86400, h3-23=":443"; ma=86400
last-modified
Tue, 17 Jul 2018 12:30:51 GMT
server
cloudflare
etag
W/"5b4de17b-5148"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
expires
Mon, 15 Mar 2021 16:49:38 GMT
cache-control
public, max-age=30672000
timing-allow-origin
*
served-in-seconds
0.001
hackread-logo.png
www.hackread.com/wp-content/uploads/2015/12/
5 KB
6 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2015/12/hackread-logo.png
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
c89ff58885f6c99c896f0d833df56bd3ffd048276624c7b31b934cadc9e57ee1

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:49:38 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 23:37:46 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=99
Content-Length
5519
Expires
Thu, 25 Mar 2021 16:49:38 GMT
webfont.js
ajax.googleapis.com/ajax/libs/webfont/1.5.3/
17 KB
7 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/webfont/1.5.3/webfont.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
36ef095d011c4ced97b0acef551ca36d76b95299518595dc1acab792a2344601
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Fri, 06 Mar 2020 05:04:17 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1683921
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
6791
x-xss-protection
0
last-modified
Tue, 20 Dec 2016 18:17:03 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 06 Mar 2021 05:04:17 GMT
wp-emoji-release.min.js
www.hackread.com/wp-includes/js/
14 KB
5 KB
Script
General
Full URL
https://www.hackread.com/wp-includes/js/wp-emoji-release.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
f4799ef2939b8377cf33f07b07b6d90a4a245adbf1c6eaf47ee3b0fcefcc07fe

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:49:38 GMT
Content-Encoding
gzip
Last-Modified
Sun, 17 Nov 2019 13:59:40 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=99
Content-Length
4622
Expires
Fri, 24 Apr 2020 16:49:38 GMT
css
fonts.googleapis.com/
4 KB
815 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto%7CRoboto+Slab&subset=latin
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/webfont/1.5.3/webfont.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
6a0c466dd72e7d2fdd6ed71f97d8b6901714d154c572aeee1f18685ff30c92f2
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
x-xss-protection
0
last-modified
Wed, 25 Mar 2020 16:49:38 GMT
server
ESF
date
Wed, 25 Mar 2020 16:49:38 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Wed, 25 Mar 2020 16:49:38 GMT
b46fad0ee0dc124087b9a350e249485f
secure.gravatar.com/avatar/
4 KB
4 KB
Image
General
Full URL
https://secure.gravatar.com/avatar/b46fad0ee0dc124087b9a350e249485f?s=100&d=mm&r=g
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
63f0d921cde3442ee319b51ae162fe49f1e28d0dd19ba634f235e71119a01055

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

x-nc
MISS lb8.dfw.gravatar.com, MISS fra 4
date
Wed, 25 Mar 2020 16:49:39 GMT
last-modified
Fri, 02 Aug 2019 19:27:46 GMT
server
nginx
access-control-allow-origin
*
content-type
image/jpeg
status
200
cache-control
max-age=300
content-disposition
inline; filename="b46fad0ee0dc124087b9a350e249485f.jpeg"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/b46fad0ee0dc124087b9a350e249485f?s=100&d=mm&r=g>; rel="canonical"
content-length
4096
expires
Wed, 25 Mar 2020 16:54:39 GMT
410njbnz9ol_go1_icon.ico
www.hackread.com/wp-content/uploads/2015/12/
37 KB
3 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2015/12/410njbnz9ol_go1_icon.ico
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
a83b6dc4e04e6e657a3c36c83d61e410ac5ef9615e0c3dfcf3c454cde68bf243

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:49:39 GMT
Content-Encoding
gzip
Last-Modified
Thu, 08 Aug 2019 11:48:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/x-icon
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=97
Content-Length
2909
Expires
Thu, 25 Mar 2021 16:49:39 GMT
adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/
107 KB
38 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
3c005dba1d518d8fcd6bb8b0cd5264947d7c8c5b53363556d98c453428a376ef
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:49:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
39033
x-xss-protection
0
server
cafe
etag
13352514705584774431
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Wed, 25 Mar 2020 16:49:39 GMT
Sextortion-mail-sample.jpg
www.hackread.com/wp-content/uploads/2020/03/
41 KB
38 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/Sextortion-mail-sample.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
0841e797e3cdaa7b96e012d02451295da6c035e6c61733ff162f6cfac7dd24ba

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:49:39 GMT
Content-Encoding
gzip
Last-Modified
Mon, 23 Mar 2020 12:36:31 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=96
Content-Length
38965
Expires
Thu, 25 Mar 2021 16:49:39 GMT
b46fad0ee0dc124087b9a350e249485f
secure.gravatar.com/avatar/
5 KB
5 KB
Image
General
Full URL
https://secure.gravatar.com/avatar/b46fad0ee0dc124087b9a350e249485f?s=115&d=mm&r=g
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
90c59d72a87cb9ded609ce96b3752908e2ac97c6d199d8f2e815f270ce5c5f53

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

x-nc
MISS lb7.dfw.gravatar.com, HIT fra 4
date
Wed, 25 Mar 2020 16:49:39 GMT
last-modified
Fri, 02 Aug 2019 19:27:46 GMT
server
nginx
access-control-allow-origin
*
content-type
image/jpeg
status
200
cache-control
max-age=300
content-disposition
inline; filename="b46fad0ee0dc124087b9a350e249485f.jpeg"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/b46fad0ee0dc124087b9a350e249485f?s=115&d=mm&r=g>; rel="canonical"
content-length
4889
expires
Wed, 25 Mar 2020 16:54:39 GMT
who-becomes-target-of-live-hack-attack-277x190.jpg
www.hackread.com/wp-content/uploads/2020/03/
11 KB
11 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/who-becomes-target-of-live-hack-attack-277x190.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
56800b0f8b907015c53a2337585f8a6a12ad6a51e6501c347ceb17055641e999

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:49:39 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Mar 2020 21:00:15 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=96
Content-Length
10941
Expires
Thu, 25 Mar 2021 16:49:39 GMT
coronavirus-sextortion-scam-277x190.jpg
www.hackread.com/wp-content/uploads/2020/03/
13 KB
13 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/coronavirus-sextortion-scam-277x190.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
ca78abe6a4c7431cdfdcead48913da3139b1d54bf09eea0582513954c2d2f1d1

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:49:39 GMT
Content-Encoding
gzip
Last-Modified
Mon, 23 Mar 2020 14:00:42 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=95
Content-Length
13208
Expires
Thu, 25 Mar 2021 16:49:39 GMT
hackers-launch-coronavirus-sale-to-sell-hacking-tools-at-low-cost-277x190.jpg
www.hackread.com/wp-content/uploads/2020/03/
14 KB
14 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/hackers-launch-coronavirus-sale-to-sell-hacking-tools-at-low-cost-277x190.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
5e98805013c507fe66d11c49fb428e28546821dc69c00cf0d4caea227542e7b9

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:49:39 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Mar 2020 18:56:47 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=94
Content-Length
13932
Expires
Thu, 25 Mar 2021 16:49:39 GMT
f002df08b025d37deabffc0b5b88b6ea
secure.gravatar.com/avatar/
1 KB
2 KB
Image
General
Full URL
https://secure.gravatar.com/avatar/f002df08b025d37deabffc0b5b88b6ea?s=75&d=mm&r=g
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
37cca5e57f95b1b176e0f578b882175174b47204739b81b4ef52e66383eb5da3

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

x-nc
HIT lb8.dfw.gravatar.com, BYPASS fra 4
date
Wed, 25 Mar 2020 16:49:39 GMT
last-modified
Wed, 11 Jan 1984 08:00:00 GMT
server
nginx
access-control-allow-origin
*
content-type
image/jpeg
status
200
cache-control
max-age=300
content-disposition
inline; filename="f002df08b025d37deabffc0b5b88b6ea.png"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/f002df08b025d37deabffc0b5b88b6ea?s=75&d=mm&r=g>; rel="canonical"
content-length
1340
expires
Wed, 25 Mar 2020 16:54:39 GMT
who-becomes-target-of-live-hack-attack-350x245.jpg
www.hackread.com/wp-content/uploads/2020/03/
17 KB
17 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/who-becomes-target-of-live-hack-attack-350x245.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
e1240b4fff3ba45047d409abd5d38143700a153ae349b17cea437e16e3a71fc1

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:49:39 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Mar 2020 21:00:14 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=95
Content-Length
17555
Expires
Thu, 25 Mar 2021 16:49:39 GMT
hackers-are-exploiting-a-critical-unpatched-flaw-in-windows-1-350x245.jpg
www.hackread.com/wp-content/uploads/2020/03/
12 KB
13 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/hackers-are-exploiting-a-critical-unpatched-flaw-in-windows-1-350x245.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
c30768df1b5c99e68664ae0ed7db9b2bc95e1c89e9e5c01b5ef92a408c3e6b13

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:49:39 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Mar 2020 18:08:13 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=95
Content-Length
12519
Expires
Thu, 25 Mar 2021 16:49:39 GMT
malware-family-generated-fake-ad-clicks-in-66-apps-on-android-2-350x245.jpg
www.hackread.com/wp-content/uploads/2020/03/
18 KB
19 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/malware-family-generated-fake-ad-clicks-in-66-apps-on-android-2-350x245.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
c4289b26e4f32f2fdd514a4d1deb6aa6dca1f4e8e9989c1dc042eb20b29df57b

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:49:39 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Mar 2020 14:52:49 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=96
Content-Length
18605
Expires
Thu, 25 Mar 2021 16:49:39 GMT
coronavirus-sextortion-scam-350x245.jpg
www.hackread.com/wp-content/uploads/2020/03/
20 KB
21 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/coronavirus-sextortion-scam-350x245.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
81d1aa922759e01b41a5290dcf461e8664d016d18cc24da57bfa6a06c98a8786

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:49:39 GMT
Content-Encoding
gzip
Last-Modified
Mon, 23 Mar 2020 14:00:42 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=94
Content-Length
20630
Expires
Thu, 25 Mar 2021 16:49:39 GMT
hackread-logo.png
www.hackread.com/wp-content/uploads/2015/12/
5 KB
6 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2015/12/hackread-logo.png?x62286
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
c89ff58885f6c99c896f0d833df56bd3ffd048276624c7b31b934cadc9e57ee1

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:49:39 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 23:37:46 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=94
Content-Length
5519
Expires
Thu, 25 Mar 2021 16:49:39 GMT
scripts.js
www.hackread.com/wp-content/plugins/contact-form-7/includes/js/
14 KB
4 KB
Script
General
Full URL
https://www.hackread.com/wp-content/plugins/contact-form-7/includes/js/scripts.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
b7e17926b30342edecee8b3a93029ac51462e2b479277d8e077ba57173eb1900

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:49:38 GMT
Content-Encoding
gzip
Last-Modified
Sat, 07 Mar 2020 22:25:04 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=98
Content-Length
3993
Expires
Fri, 24 Apr 2020 16:49:38 GMT
mashsb.min.js
www.hackread.com/wp-content/plugins/mashsharer/assets/js/
4 KB
2 KB
Script
General
Full URL
https://www.hackread.com/wp-content/plugins/mashsharer/assets/js/mashsb.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
a13a1fe4a87c09c6e9122834b5351f80012e2c539b32bc1d33c6982efab21b4b

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:49:38 GMT
Content-Encoding
gzip
Last-Modified
Sun, 22 Mar 2020 12:13:59 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=98
Content-Length
1533
Expires
Fri, 24 Apr 2020 16:49:38 GMT
ta.js
www.hackread.com/wp-content/plugins/thirstyaffiliates/js/app/
10 KB
3 KB
Script
General
Full URL
https://www.hackread.com/wp-content/plugins/thirstyaffiliates/js/app/ta.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
31c020e98d623d9d86a904d64f4b923726a1ab664bff40a7550866ea2d4f5e03

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:49:38 GMT
Content-Encoding
gzip
Last-Modified
Fri, 21 Feb 2020 18:34:40 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=98
Content-Length
2584
Expires
Fri, 24 Apr 2020 16:49:38 GMT
bootstrap.min.js
www.hackread.com/wp-content/themes/newsgamer/assets/js/
36 KB
10 KB
Script
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/js/bootstrap.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
4a4de7903ea62d330e17410ea4db6c22bcbeb350ac6aa402d6b54b4c0cbed327

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:49:38 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=98
Content-Length
9745
Expires
Fri, 24 Apr 2020 16:49:38 GMT
mip.external.min.js
www.hackread.com/wp-content/themes/newsgamer/assets/js/
135 KB
42 KB
Script
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/js/mip.external.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
cd605c7d4107ef5b9d511b13cb1e053db59d2daa7df99e1e5754e54c0c7cec87

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:49:38 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=95
Content-Length
42900
Expires
Fri, 24 Apr 2020 16:49:38 GMT
functions.js
www.hackread.com/wp-content/themes/newsgamer/assets/js/
17 KB
5 KB
Script
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/js/functions.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
afe9c8752a20b726104d37ce2f099e89eba3b62bb31a3307c5a9bbf9de3c2e2d

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:49:38 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=98
Content-Length
4438
Expires
Fri, 24 Apr 2020 16:49:38 GMT
wp-embed.min.js
www.hackread.com/wp-includes/js/
1 KB
1 KB
Script
General
Full URL
https://www.hackread.com/wp-includes/js/wp-embed.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
2152557cac69e2bd7d6debef5037a9f554f9209cc305b8141b3329acb10c42b7

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:49:39 GMT
Content-Encoding
gzip
Last-Modified
Sun, 17 Nov 2019 13:59:40 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=96
Content-Length
753
Expires
Fri, 24 Apr 2020 16:49:39 GMT
form.js
www.hackread.com/wp-content/plugins/akismet/_inc/
700 B
691 B
Script
General
Full URL
https://www.hackread.com/wp-content/plugins/akismet/_inc/form.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
0515cbd1f8aee97e1c8e0d1d015ca96c86def13e90d2e73bf813072ccc23d531

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:49:39 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Mar 2020 22:13:36 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=95
Content-Length
318
Expires
Fri, 24 Apr 2020 16:49:39 GMT
comment-reply.min.js
www.hackread.com/wp-includes/js/
2 KB
1 KB
Script
General
Full URL
https://www.hackread.com/wp-includes/js/comment-reply.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
31cb76c05cbf5d71466f93078e8ba0f6e39cd92d0acc86d385b8cf2899963695

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:49:39 GMT
Content-Encoding
gzip
Last-Modified
Sun, 17 Nov 2019 13:59:40 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=96
Content-Length
1093
Expires
Fri, 24 Apr 2020 16:49:39 GMT
js
www.googletagmanager.com/gtag/
75 KB
28 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=UA-36230183-1
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
1392c66fd47cf940b980aa04cf6aad81b7bba5dc75894f692ba806ef2a3a5eb6
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:49:39 GMT
content-encoding
br
status
200
strict-transport-security
max-age=31536000; includeSubDomains
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
28642
x-xss-protection
0
last-modified
Wed, 25 Mar 2020 15:00:00 GMT
server
Google Tag Manager
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Wed, 25 Mar 2020 16:49:39 GMT
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v20/
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v20/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/webfont/1.5.3/webfont.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5d1bc9b443f3f81fa4b4ad4634c1bb9702194c1898e3a9de0ab5e2cdc0e9f479
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/css?family=Roboto%7CRoboto+Slab&subset=latin
Origin
https://www.hackread.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 27 Feb 2020 08:47:06 GMT
x-content-type-options
nosniff
last-modified
Wed, 24 Jul 2019 01:18:50 GMT
server
sffe
age
2361752
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
11016
x-xss-protection
0
expires
Fri, 26 Feb 2021 08:47:06 GMT
dynamic.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/
64 KB
64 KB
Image
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/dynamic.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/dynamic.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:49:38 GMT
Content-Encoding
gzip
Last-Modified
Wed, 25 Mar 2020 16:13:49 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=97
Content-Length
12196
Expires
Fri, 24 Apr 2020 16:49:38 GMT
fontawesome-webfont.woff2
www.hackread.com/wp-content/themes/newsgamer/assets/fonts/
75 KB
76 KB
Font
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/fonts/fontawesome-webfont.woff2?v=4.7.0
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe

Request headers

Referer
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/mip.external.css
Origin
https://www.hackread.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 25 Mar 2020 16:49:38 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
font/woff2
Cache-Control
max-age=2592000
Transfer-Encoding
chunked
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=97
Expires
Fri, 24 Apr 2020 16:49:38 GMT
vertical-right-shadow.png
www.hackread.com/wp-content/themes/newsgamer/images/
3 KB
2 KB
Image
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/images/vertical-right-shadow.png
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
dfbf744b87270c5e4148371216220d1421d01dfdbf7ad35afff64763cb852484

Request headers

Referer
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/dynamic.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:49:39 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:34 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=97
Content-Length
1777
Expires
Thu, 25 Mar 2021 16:49:39 GMT
top-left-shadow.png
www.hackread.com/wp-content/themes/newsgamer/images/
2 KB
2 KB
Image
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/images/top-left-shadow.png
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
3329ee5bb1edc52b18015e9bdedd275415080788f9c1fdd7165bca609874c9c5

Request headers

Referer
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/dynamic.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:49:39 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:34 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=97
Content-Length
1599
Expires
Thu, 25 Mar 2021 16:49:39 GMT
BngbUXZYTXPIvIBgJJSb6s3BzlRRfKOFbvjojISmb2RlV9Su1cai.woff
fonts.gstatic.com/s/robotoslab/v11/
15 KB
15 KB
Font
General
Full URL
https://fonts.gstatic.com/s/robotoslab/v11/BngbUXZYTXPIvIBgJJSb6s3BzlRRfKOFbvjojISmb2RlV9Su1cai.woff
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
ce677696c57a6b97fee81d149546716b76f236cf7bb35845fa771feb91914f95
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/css?family=Roboto%7CRoboto+Slab&subset=latin
Origin
https://www.hackread.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 27 Feb 2020 14:02:43 GMT
x-content-type-options
nosniff
last-modified
Tue, 04 Feb 2020 23:46:05 GMT
server
sffe
age
2342816
content-type
font/woff
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
15244
x-xss-protection
0
expires
Fri, 26 Feb 2021 14:02:43 GMT
truncated
/
11 KB
11 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
745caffca4b97cf5cf2374d82c6dfb6fb7c7b694e85432f92ec4dcb35f4418c9

Request headers

Origin
https://www.hackread.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
application/octet-stream
serve.js.php
trends.revcontent.com/
4 KB
2 KB
Script
General
Full URL
https://trends.revcontent.com/serve.js.php?w=3420&t=rc_43&c=1585154979531&width=1600&referer=https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.30.187.156 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-30-187-156.eu-west-1.compute.amazonaws.com
Software
Apache/2.4.25 (Debian) /
Resource Hash
964d0008f6d3472606af70a59f4f4bf6f447153d6a2c28593db148dc018c5282
Security Headers
Name Value
Strict-Transport-Security max-age=931536000; includeSubDomains

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:49:39 GMT
content-encoding
gzip
server
Apache/2.4.25 (Debian)
access-control-allow-origin
https://www.hackread.com
vary
Accept-Encoding
p3p
CP="NOI DSP COR NID ADM DEV OUR NOR CNT"
status
200
access-control-allow-credentials
true
strict-transport-security
max-age=931536000; includeSubDomains
content-type
text/html; charset=UTF-8
integrator.js
adservice.google.de/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.hackread.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:49:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.hackread.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:49:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
104
x-xss-protection
0
show_ads_impl_fy2019.js
pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/
224 KB
84 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
1fea51227a0d0a882dcf26ad5791bdf3bbb79958e076630e86427a8266300a2a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:49:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
85515
x-xss-protection
0
server
cafe
etag
13950792502640807200
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Wed, 25 Mar 2020 16:49:39 GMT
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20200319/r20190131/ Frame 18CC
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/html/r20200319/r20190131/zrt_lookup.html
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/html/r20200319/r20190131/zrt_lookup.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
vary
Accept-Encoding
date
Sat, 21 Mar 2020 14:49:24 GMT
expires
Sat, 04 Apr 2020 14:49:24 GMT
content-type
text/html; charset=UTF-8
etag
17714563530871986051
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
4497
x-xss-protection
0
cache-control
public, max-age=1209600
age
352815
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
serve.js.php
trends.revcontent.com/
125 KB
40 KB
XHR
General
Full URL
https://trends.revcontent.com/serve.js.php?w=3420&t=rc_43&c=1585154979531&width=1600&site_url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&referer=&skip_demand=true
Requested by
Host: trends.revcontent.com
URL: https://trends.revcontent.com/serve.js.php?w=3420&t=rc_43&c=1585154979531&width=1600&referer=https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.30.187.156 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-30-187-156.eu-west-1.compute.amazonaws.com
Software
Apache/2.4.25 (Debian) /
Resource Hash
51dfbf19eea0f3a749e241af1b6693349aa084ae67286a4d35dbbfec744d4a95
Security Headers
Name Value
Strict-Transport-Security max-age=931536000; includeSubDomains

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

date
Wed, 25 Mar 2020 16:49:39 GMT
content-encoding
gzip
server
Apache/2.4.25 (Debian)
status
200
strict-transport-security
max-age=931536000; includeSubDomains
p3p
CP="NOI DSP COR NID ADM DEV OUR NOR CNT"
access-control-allow-origin
https://www.hackread.com
access-control-allow-credentials
true
content-type
text/javascript; charset=utf-8
pixel_sync
trends.revcontent.com/cm/
Redirect Chain
  • https://b1sync.zemanta.com/usersync/revcontent/?puid=NjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg%3D&cb=https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fexchange_uid%3DNjBjYTdkYTRmZTZlMGY2Zjl...
  • https://b1sync.zemanta.com/usersync/revcontent/?cb=https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fexchange_uid%3DNjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg%253D%26bidder%3D3%26bidder_uid%...
  • https://trends.revcontent.com/cm/pixel_sync?exchange_uid=NjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg%3D&bidder=3&bidder_uid=q-momfqoPTAmVtlzVfOO
35 B
213 B
Image
General
Full URL
https://trends.revcontent.com/cm/pixel_sync?exchange_uid=NjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg%3D&bidder=3&bidder_uid=q-momfqoPTAmVtlzVfOO
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.30.187.156 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-30-187-156.eu-west-1.compute.amazonaws.com
Software
/ Express
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Wed, 25 Mar 2020 16:49:40 GMT
x-powered-by
Express
content-length
35
content-type
image/gif

Redirect headers

Pragma
no-cache
Date
Wed, 25 Mar 2020 16:49:40 GMT
P3p
CP="We do not support P3P header."
Location
https://trends.revcontent.com/cm/pixel_sync?exchange_uid=NjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg%3D&bidder=3&bidder_uid=q-momfqoPTAmVtlzVfOO
Cache-Control
no-cache, no-store, must-revalidate
Content-Type
text/html; charset=utf-8
Content-Length
175
Expires
Thu, 01 Dec 1994 16:00:00 GMT
pixel_sync
trends.revcontent.com/cm/
Redirect Chain
  • https://ib.adnxs.com/getuid?https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fbidder%3D115%26bidder_uid%3D%24UID%26exchange_uid%3DNjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg%253D&geo=35&rev_d...
  • https://ib.adnxs.com/bounce?%2Fgetuid%3Fhttps%253A%252F%252Ftrends.revcontent.com%252Fcm%252Fpixel_sync%253Fbidder%253D115%2526bidder_uid%253D%2524UID%2526exchange_uid%253DNjBjYTdkYTRmZTZlMGY2ZjlkN...
  • https://trends.revcontent.com/cm/pixel_sync?bidder=115&bidder_uid=297032476261571954&exchange_uid=NjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg%3D&geo=35&rev_dt=1585154979
35 B
215 B
Image
General
Full URL
https://trends.revcontent.com/cm/pixel_sync?bidder=115&bidder_uid=297032476261571954&exchange_uid=NjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg%3D&geo=35&rev_dt=1585154979
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.30.187.156 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-30-187-156.eu-west-1.compute.amazonaws.com
Software
/ Express
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Wed, 25 Mar 2020 16:49:39 GMT
x-powered-by
Express
content-length
35
content-type
image/gif

Redirect headers

Pragma
no-cache
Date
Wed, 25 Mar 2020 16:49:41 GMT
AN-X-Request-Uuid
6f4b3fb1-894a-45ad-b352-77b4a1ad86da
Content-Type
text/html; charset=utf-8
Server
nginx/1.13.4
Location
https://trends.revcontent.com/cm/pixel_sync?bidder=115&bidder_uid=297032476261571954&exchange_uid=NjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg%3D&geo=35&rev_dt=1585154979
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
*
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
X-Proxy-Origin
185.16.206.62; 185.16.206.62; 308.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.223.138:80
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
pixel_sync
trends.revcontent.com/cm/
Redirect Chain
  • https://x.bidswitch.net/sync?ssp=revcontent&rev_dt=1585154979
  • https://x.bidswitch.net/ul_cb/sync?ssp=revcontent&rev_dt=1585154979
  • https://rtb.mfadsrvr.com/sync?ssp=bidswitch&bidswitch_ssp_id=revcontent&bsw_user_id=e2be7285-1005-40d4-9894-dd91726fcaf7
  • https://x.bidswitch.net/sync?dsp_id=250&expires=14&user_id=90f1a438-cb18-43b9-a8b9-2cbd1d7e627f&ssp=revcontent
  • https://trends.revcontent.com/cm/pixel_sync?bidder=118&bidder_uid=e2be7285-1005-40d4-9894-dd91726fcaf7
35 B
215 B
Image
General
Full URL
https://trends.revcontent.com/cm/pixel_sync?bidder=118&bidder_uid=e2be7285-1005-40d4-9894-dd91726fcaf7
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.30.187.156 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-30-187-156.eu-west-1.compute.amazonaws.com
Software
/ Express
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Wed, 25 Mar 2020 16:49:40 GMT
x-powered-by
Express
content-length
35
content-type
image/gif

Redirect headers

status
302
date
Wed, 25 Mar 2020 16:49:39 GMT
cache-control
no-cache, no-store, must-revalidate
content-length
0
location
//trends.revcontent.com/cm/pixel_sync?bidder=118&bidder_uid=e2be7285-1005-40d4-9894-dd91726fcaf7
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
cookiesync
bttrack.com/pixel/
35 B
380 B
Image
General
Full URL
https://bttrack.com/pixel/cookiesync?source=0b0edea9-c9fe-4b9c-9bcd-a51022f2873f&publisherid=NjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg%253D&pushdata=109&secure=1&rev_dt=1585154979
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
192.132.33.46 , United States, ASN18568 (BIDTELLECT, US),
Reverse DNS
46.bidtellect.com
Software
Microsoft-IIS/8.5 /
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

X-ServerName
Track001-dc3
Pragma
no-cache
Date
Wed, 25 Mar 2020 16:49:39 GMT
X-AspNetMvc-Version
5.2
Server
Microsoft-IIS/8.5
X-AspNet-Version
4.0.30319
P3P
CP="CAO DSP COR ADMo DEVo PSAo PSDo HISo IVAo IVDo OUR IND OTC"
Cache-Control
private,no-cache
Content-Type
image/gif
Content-Length
35
Expires
-1
pixel_sync
trends.revcontent.com/cm/
Redirect Chain
  • https://rtb.mfadsrvr.com/sync?ssp=revcontent&ssp_user_id=NjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg%3D&rev_dt=1585154979
  • https://rtb.mfadsrvr.com/ul_cb/sync?ssp=revcontent&ssp_user_id=NjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg%3D&rev_dt=1585154979
  • https://trends.revcontent.com/cm/pixel_sync?exchange_uid=NjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg=&bidder=154&bidder_uid=90f1a438-cb18-43b9-a8b9-2cbd1d7e627f
35 B
215 B
Image
General
Full URL
https://trends.revcontent.com/cm/pixel_sync?exchange_uid=NjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg=&bidder=154&bidder_uid=90f1a438-cb18-43b9-a8b9-2cbd1d7e627f
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.30.187.156 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-30-187-156.eu-west-1.compute.amazonaws.com
Software
/ Express
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Wed, 25 Mar 2020 16:49:39 GMT
x-powered-by
Express
content-length
35
content-type
image/gif

Redirect headers

Location
//trends.revcontent.com/cm/pixel_sync?exchange_uid=NjBjYTdkYTRmZTZlMGY2ZjlkNDhmMGFmNGRhNWFjMTg=&bidder=154&bidder_uid=90f1a438-cb18-43b9-a8b9-2cbd1d7e627f
Date
Wed, 25 Mar 2020 16:49:39 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Length
0
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
ads
googleads.g.doubleclick.net/pagead/ Frame 2616
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1024134837&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979541&bpp=30&bdt=726&fdt=123&idt=123&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&correlator=8014353403258&frm=20&pv=2&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=58&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=306&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=1&uci=a!1&fsb=1&xpc=6h8G7KjPhD&p=https%3A//www.hackread.com&dtd=140
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1024134837&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979541&bpp=30&bdt=726&fdt=123&idt=123&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&correlator=8014353403258&frm=20&pv=2&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=58&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=306&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=1&uci=a!1&fsb=1&xpc=6h8G7KjPhD&p=https%3A//www.hackread.com&dtd=140
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:49:39 GMT
server
cafe
content-length
5966
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Wed, 25-Mar-2020 17:04:39 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:49:39 GMT
cache-control
private
osd.js
www.googletagservices.com/activeview/js/current/
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
351e508c1da4f9d1535747086accb41121466a52044aa868eba4a36009fdb101
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:49:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1584962844677376"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
27941
x-xss-protection
0
expires
Wed, 25 Mar 2020 16:49:39 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame B314
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=301552094&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979571&bpp=4&bdt=756&fdt=139&idt=139&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_slotnames=5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=306&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=2&uci=a!2&fsb=1&xpc=X4oimdTm3c&p=https%3A//www.hackread.com&dtd=143
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=301552094&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979571&bpp=4&bdt=756&fdt=139&idt=139&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_slotnames=5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=306&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=2&uci=a!2&fsb=1&xpc=X4oimdTm3c&p=https%3A//www.hackread.com&dtd=143
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:49:39 GMT
server
cafe
content-length
5961
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Wed, 25-Mar-2020 17:04:39 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:49:39 GMT
cache-control
private
ads
googleads.g.doubleclick.net/pagead/ Frame 00FB
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=3012150858&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979575&bpp=3&bdt=760&fdt=143&idt=143&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_slotnames=5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=405&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=3&uci=a!3&fsb=1&xpc=kK0pLfru5R&p=https%3A//www.hackread.com&dtd=146
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=3012150858&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979575&bpp=3&bdt=760&fdt=143&idt=143&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_slotnames=5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=405&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=3&uci=a!3&fsb=1&xpc=kK0pLfru5R&p=https%3A//www.hackread.com&dtd=146
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:49:39 GMT
server
cafe
content-length
5965
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Wed, 25-Mar-2020 17:04:39 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:49:39 GMT
cache-control
private
ads
googleads.g.doubleclick.net/pagead/ Frame FD2B
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1854264899&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979578&bpp=4&bdt=763&fdt=147&idt=147&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_slotnames=5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=405&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=4&uci=a!4&fsb=1&xpc=s9G4vd8gMZ&p=https%3A//www.hackread.com&dtd=151
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1854264899&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979578&bpp=4&bdt=763&fdt=147&idt=147&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_slotnames=5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=405&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=4&uci=a!4&fsb=1&xpc=s9G4vd8gMZ&p=https%3A//www.hackread.com&dtd=151
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:49:39 GMT
server
cafe
content-length
5892
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Wed, 25-Mar-2020 17:04:39 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:49:39 GMT
cache-control
private
ads
googleads.g.doubleclick.net/pagead/ Frame CF6C
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=296273166&adf=1489503786&w=300&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979582&bpp=3&bdt=767&fdt=153&idt=154&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=1162&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=5&uci=a!5&fsb=1&xpc=aSIYE9sMYn&p=https%3A//www.hackread.com&dtd=157
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=296273166&adf=1489503786&w=300&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979582&bpp=3&bdt=767&fdt=153&idt=154&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=1162&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=5&uci=a!5&fsb=1&xpc=aSIYE9sMYn&p=https%3A//www.hackread.com&dtd=157
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:49:39 GMT
server
cafe
content-length
204
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Wed, 25-Mar-2020 17:04:39 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:49:39 GMT
cache-control
private
ads
googleads.g.doubleclick.net/pagead/ Frame A7AC
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1075612886&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979585&bpp=3&bdt=770&fdt=163&idt=163&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=1441&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=6&uci=a!6&btvi=1&fsb=1&xpc=L2UzYtPV00&p=https%3A//www.hackread.com&dtd=168
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1075612886&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979585&bpp=3&bdt=770&fdt=163&idt=163&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=1441&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=6&uci=a!6&btvi=1&fsb=1&xpc=L2UzYtPV00&p=https%3A//www.hackread.com&dtd=168
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:49:39 GMT
server
cafe
content-length
204
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Wed, 25-Mar-2020 17:04:39 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:49:39 GMT
cache-control
private
ads
googleads.g.doubleclick.net/pagead/ Frame 0308
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=4061625637&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979588&bpp=3&bdt=773&fdt=193&idt=193&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=1441&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=7&uci=a!7&btvi=2&fsb=1&xpc=p44zq6XKS9&p=https%3A//www.hackread.com&dtd=196
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=4061625637&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979588&bpp=3&bdt=773&fdt=193&idt=193&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=1441&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=7&uci=a!7&btvi=2&fsb=1&xpc=p44zq6XKS9&p=https%3A//www.hackread.com&dtd=196
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:49:39 GMT
server
cafe
content-length
205
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Wed, 25-Mar-2020 17:04:39 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:49:39 GMT
cache-control
private
ads
googleads.g.doubleclick.net/pagead/ Frame E89B
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=296273166&adf=1167544308&w=300&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979591&bpp=3&bdt=776&fdt=201&idt=201&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=2202&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=8&uci=a!8&btvi=3&fsb=1&xpc=AhQwdzEnQi&p=https%3A//www.hackread.com&dtd=204
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=296273166&adf=1167544308&w=300&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979591&bpp=3&bdt=776&fdt=201&idt=201&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=2202&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=8&uci=a!8&btvi=3&fsb=1&xpc=AhQwdzEnQi&p=https%3A//www.hackread.com&dtd=204
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:49:40 GMT
server
cafe
content-length
205
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Wed, 25-Mar-2020 17:04:39 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:49:40 GMT
cache-control
private
ads
googleads.g.doubleclick.net/pagead/ Frame C1EC
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=3056409154&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979594&bpp=3&bdt=779&fdt=209&idt=209&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=2481&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=9&uci=a!9&btvi=4&fsb=1&xpc=6wYUOsXg42&p=https%3A//www.hackread.com&dtd=211
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=3056409154&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979594&bpp=3&bdt=779&fdt=209&idt=209&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=2481&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=9&uci=a!9&btvi=4&fsb=1&xpc=6wYUOsXg42&p=https%3A//www.hackread.com&dtd=211
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:49:39 GMT
server
cafe
content-length
204
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Wed, 25-Mar-2020 17:04:39 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:49:39 GMT
cache-control
private
ads
googleads.g.doubleclick.net/pagead/ Frame 1899
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1506880035&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979597&bpp=3&bdt=782&fdt=216&idt=216&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=2481&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=10&uci=a!a&btvi=5&fsb=1&xpc=xx17Vhthg9&p=https%3A//www.hackread.com&dtd=218
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1506880035&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979597&bpp=3&bdt=782&fdt=216&idt=216&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=2481&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=10&uci=a!a&btvi=5&fsb=1&xpc=xx17Vhthg9&p=https%3A//www.hackread.com&dtd=218
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:49:39 GMT
server
cafe
content-length
204
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Wed, 25-Mar-2020 17:04:39 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:49:39 GMT
cache-control
private
ads
googleads.g.doubleclick.net/pagead/ Frame 7064
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=296273166&adf=2095955190&w=300&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979600&bpp=3&bdt=785&fdt=223&idt=223&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=3044&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=11&uci=a!b&btvi=6&fsb=1&xpc=03oJR7h4Qq&p=https%3A//www.hackread.com&dtd=228
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=296273166&adf=2095955190&w=300&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979600&bpp=3&bdt=785&fdt=223&idt=223&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3565349704969215&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=3044&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=5938&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=11&uci=a!b&btvi=6&fsb=1&xpc=03oJR7h4Qq&p=https%3A//www.hackread.com&dtd=228
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:49:40 GMT
server
cafe
content-length
207
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Wed, 25-Mar-2020 17:04:39 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:49:40 GMT
cache-control
private
coronavirus-sextortion-scam.jpg
www.hackread.com/wp-content/uploads/2020/03/
93 KB
93 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/coronavirus-sextortion-scam.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
c9dffa6a9bb791cd61eb337b47b34482cce48ded9fc7504c24d8dfab9e237bd1

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:49:39 GMT
Content-Encoding
gzip
Last-Modified
Mon, 23 Mar 2020 14:00:28 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Transfer-Encoding
chunked
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=94
Expires
Thu, 25 Mar 2021 16:49:39 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame C42A
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=3813488108&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979603&bpp=4&bdt=788&fdt=287&idt=287&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3002399743279103&dssz=64&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=4042&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=6657&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=12&uci=a!c&btvi=7&fsb=1&xpc=PZp2tkuxLE&p=https%3A//www.hackread.com&dtd=293
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=3813488108&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979603&bpp=4&bdt=788&fdt=287&idt=287&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3002399743279103&dssz=64&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=4042&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=6657&pvsid=2719980998024620&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=12&uci=a!c&btvi=7&fsb=1&xpc=PZp2tkuxLE&p=https%3A//www.hackread.com&dtd=293
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
test_cookie=CheckForPermission
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:49:40 GMT
server
cafe
content-length
205
x-xss-protection
0
set-cookie
IDE=AHWqTUnYf807ItNTIu-hI3oxBgGbNoo5BWqDj8uDoipPIxQyZOqTMkr_s80KeHE9; expires=Mon, 19-Apr-2021 16:49:39 GMT; path=/; domain=.doubleclick.net; Secure; HttpOnly; SameSite=none test_cookie=; domain=.doubleclick.net; path=/; expires=Mon, 21 Jul 2008 23:59:00 GMT; SameSite=none; Secure
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:49:40 GMT
cache-control
private
admin-ajax.php
www.hackread.com/wp-admin/
13 B
590 B
XHR
General
Full URL
https://www.hackread.com/wp-admin/admin-ajax.php
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/wp-includes/js/jquery/jquery.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
b90cfd16d0c201ccefb5833b835ccd03732cebd58943c04309f8d4c267d8270a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

Accept
*/*
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Origin
https://www.hackread.com
X-Requested-With
XMLHttpRequest
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Date
Wed, 25 Mar 2020 16:49:39 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Connection
Keep-Alive
Content-Length
33
Referrer-Policy
strict-origin-when-cross-origin
Server
Apache
X-Frame-Options
SAMEORIGIN
Vary
Accept-Encoding
Content-Type
text/html; charset=UTF-8
Access-Control-Allow-Origin
https://www.hackread.com
Cache-Control
no-cache, must-revalidate, max-age=0
Access-Control-Allow-Credentials
true
X-Robots-Tag
noindex
Keep-Alive
timeout=2, max=93
Expires
Wed, 11 Jan 1984 05:00:00 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 5372
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&adk=1812271804&adf=3025194257&lmt=1585154979&plat=1%3A32776%2C2%3A16809992%2C8%3A134250504%2C9%3A134250504%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&ea=0&flash=0&pra=7&wgl=1&adsid=NT&dt=1585154979927&bpp=3&bdt=1112&fdt=4&idt=4&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3002399718375420&dssz=68&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=6657&pvsid=2719980998024620&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&ifi=16&uci=a!g&fsb=1&dtd=11
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&adk=1812271804&adf=3025194257&lmt=1585154979&plat=1%3A32776%2C2%3A16809992%2C8%3A134250504%2C9%3A134250504%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&ea=0&flash=0&pra=7&wgl=1&adsid=NT&dt=1585154979927&bpp=3&bdt=1112&fdt=4&idt=4&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3002399718375420&dssz=68&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=6657&pvsid=2719980998024620&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&ifi=16&uci=a!g&fsb=1&dtd=11
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
test_cookie=CheckForPermission
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:49:40 GMT
server
cafe
content-length
34
x-xss-protection
0
set-cookie
IDE=AHWqTUlcTyuVPfjs37cF5ZKg0ZiPiGkSXL1yedu3Qx54vpgqLdXrwDej6FLDOQjP; expires=Mon, 19-Apr-2021 16:49:39 GMT; path=/; domain=.doubleclick.net; Secure; HttpOnly; SameSite=none test_cookie=; domain=.doubleclick.net; path=/; expires=Mon, 21 Jul 2008 23:59:00 GMT; SameSite=none; Secure
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:49:40 GMT
cache-control
private
ads
googleads.g.doubleclick.net/pagead/ Frame 7609
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=4145652818&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979607&bpp=3&bdt=792&fdt=337&idt=337&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250%2C300x250%2C300x250%2C0x0&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3002399718375420&dssz=68&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=4042&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=6657&pvsid=2719980998024620&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=13&uci=a!d&btvi=8&fsb=1&xpc=AiRKXs1dqm&p=https%3A//www.hackread.com&dtd=340
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=4145652818&w=200&lmt=1585154979&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979607&bpp=3&bdt=792&fdt=337&idt=337&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250%2C300x250%2C300x250%2C0x0&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3002399718375420&dssz=68&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=4042&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=6657&pvsid=2719980998024620&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=13&uci=a!d&btvi=8&fsb=1&xpc=AiRKXs1dqm&p=https%3A//www.hackread.com&dtd=340
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
test_cookie=CheckForPermission
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:49:40 GMT
server
cafe
content-length
204
x-xss-protection
0
set-cookie
IDE=AHWqTUkIuwrbkhWvBduKGze6irMgZz7zzo5qyGKzWqv0vm-fZfj0sYX6EKS923g9; expires=Mon, 19-Apr-2021 16:49:39 GMT; path=/; domain=.doubleclick.net; Secure; HttpOnly; SameSite=none test_cookie=; domain=.doubleclick.net; path=/; expires=Mon, 21 Jul 2008 23:59:00 GMT; SameSite=none; Secure
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:49:40 GMT
cache-control
private
ads
googleads.g.doubleclick.net/pagead/ Frame C9F3
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=1082465236&adk=2250471325&adf=2036033552&w=570&fwrn=4&lmt=1585154980&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=570x90_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&fwr=0&wgl=1&adsid=NT&dt=1585154979610&bpp=4&bdt=795&fdt=407&idt=407&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250%2C300x250%2C300x250%2C0x0&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3002399718375420&dssz=68&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=458&ady=4290&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=6515&psts=ABP-KfQWQRY6sYJH6XdAfFinyCOf315T2ZlGeqtBFYzEtQXDuAPqsO-Bdj0%2CABP-KfRhEZKNeWk42hGRC6e7KSGohjUnvbgr91-KGUitpfIS46sd1gnpdU4%2CABP-KfQOEOQhiyP9oy1_UO759ANwT3D0VDd4LqPSI631u_L79DwXPkjczY0%2CABP-KfS2mu_02HgO6oUfVPwedbp7IJNGZOkH49F72YOT9-eCymEDrTgxyuk&pvsid=2719980998024620&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=14&uci=a!e&btvi=9&fsb=1&xpc=9qplYXNnDa&p=https%3A//www.hackread.com&dtd=410
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=1082465236&adk=2250471325&adf=2036033552&w=570&fwrn=4&lmt=1585154980&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=570x90_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&fwr=0&wgl=1&adsid=NT&dt=1585154979610&bpp=4&bdt=795&fdt=407&idt=407&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250%2C300x250%2C300x250%2C0x0&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3002399718375420&dssz=68&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=458&ady=4290&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=6515&psts=ABP-KfQWQRY6sYJH6XdAfFinyCOf315T2ZlGeqtBFYzEtQXDuAPqsO-Bdj0%2CABP-KfRhEZKNeWk42hGRC6e7KSGohjUnvbgr91-KGUitpfIS46sd1gnpdU4%2CABP-KfQOEOQhiyP9oy1_UO759ANwT3D0VDd4LqPSI631u_L79DwXPkjczY0%2CABP-KfS2mu_02HgO6oUfVPwedbp7IJNGZOkH49F72YOT9-eCymEDrTgxyuk&pvsid=2719980998024620&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=14&uci=a!e&btvi=9&fsb=1&xpc=9qplYXNnDa&p=https%3A//www.hackread.com&dtd=410
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
test_cookie=CheckForPermission
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:49:40 GMT
server
cafe
content-length
203
x-xss-protection
0
set-cookie
IDE=AHWqTUknl2dxd2O2eMQ5iwRt22FxdYITyQILJ0JHoybWkatOHsNBaHMtmmgDmzTp; expires=Mon, 19-Apr-2021 16:49:40 GMT; path=/; domain=.doubleclick.net; Secure; HttpOnly; SameSite=none test_cookie=; domain=.doubleclick.net; path=/; expires=Mon, 21 Jul 2008 23:59:00 GMT; SameSite=none; Secure
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:49:40 GMT
cache-control
private
analytics.js
www.google-analytics.com/
44 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=UA-36230183-1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
eaf1b128b927ac2868755cb7366d35554255c8af362235afe270f9614f8c806d
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 06 Feb 2020 00:21:02 GMT
server
Golfe2
age
665
date
Wed, 25 Mar 2020 16:38:35 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
18174
expires
Wed, 25 Mar 2020 18:38:35 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame F073
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=600&slotname=3047884612&adk=2945537484&adf=1398944667&w=300&lmt=1585154980&psa=0&guci=1.2.0.0.2.2.0.0&format=300x600&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979614&bpp=2&bdt=799&fdt=439&idt=439&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250%2C300x250%2C300x250%2C0x0%2C570x90_0ads_al&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1113&ady=945&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=6284&psts=ABP-KfQWQRY6sYJH6XdAfFinyCOf315T2ZlGeqtBFYzEtQXDuAPqsO-Bdj0%2CABP-KfRhEZKNeWk42hGRC6e7KSGohjUnvbgr91-KGUitpfIS46sd1gnpdU4%2CABP-KfQOEOQhiyP9oy1_UO759ANwT3D0VDd4LqPSI631u_L79DwXPkjczY0%2CABP-KfS2mu_02HgO6oUfVPwedbp7IJNGZOkH49F72YOT9-eCymEDrTgxyuk&pvsid=2719980998024620&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7Cm%7CoeE%7C&abl=NS&pfx=0&fu=16&bc=31&ifi=15&uci=a!f&fsb=1&xpc=dBEQbj0n89&p=https%3A//www.hackread.com&dtd=446
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=600&slotname=3047884612&adk=2945537484&adf=1398944667&w=300&lmt=1585154980&psa=0&guci=1.2.0.0.2.2.0.0&format=300x600&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585154979614&bpp=2&bdt=799&fdt=439&idt=439&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=300x250%2C300x250%2C300x250%2C0x0%2C570x90_0ads_al&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=8014353403258&frm=20&pv=1&ga_vid=298010948.1585154980&ga_sid=1585154980&ga_hid=1631087609&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1113&ady=945&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=423550201&oid=3&pg_h=6284&psts=ABP-KfQWQRY6sYJH6XdAfFinyCOf315T2ZlGeqtBFYzEtQXDuAPqsO-Bdj0%2CABP-KfRhEZKNeWk42hGRC6e7KSGohjUnvbgr91-KGUitpfIS46sd1gnpdU4%2CABP-KfQOEOQhiyP9oy1_UO759ANwT3D0VDd4LqPSI631u_L79DwXPkjczY0%2CABP-KfS2mu_02HgO6oUfVPwedbp7IJNGZOkH49F72YOT9-eCymEDrTgxyuk&pvsid=2719980998024620&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7Cm%7CoeE%7C&abl=NS&pfx=0&fu=16&bc=31&ifi=15&uci=a!f&fsb=1&xpc=dBEQbj0n89&p=https%3A//www.hackread.com&dtd=446
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUlcTyuVPfjs37cF5ZKg0ZiPiGkSXL1yedu3Qx54vpgqLdXrwDej6FLDOQjP
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:49:40 GMT
server
cafe
content-length
19181
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
rev2.min.css
cdn.revcontent.com/build/css/
83 KB
26 KB
Stylesheet
General
Full URL
https://cdn.revcontent.com/build/css/rev2.min.css?v=b8105739289accd23ebdbf436f27bfccb40d2ffe
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
92092346680de76a5598060f7827a818c95b1ae9dc8b527d6123dca3778b51d9

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Wed, 25 Mar 2020 16:49:40 GMT
content-encoding
gzip
last-modified
Wed, 18 Mar 2020 21:50:06 GMT
access-control-allow-origin
*
etag
"1584568206"
x-hw
1585154980.cds070.lo4.hn,1585154980.cds221.lo4.c
content-type
text/css
status
200
cache-control
max-age=15
accept-ranges
bytes
content-length
26346
rev2.min.js
cdn.revcontent.com/build/js/
280 KB
98 KB
Script
General
Full URL
https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
de08c0b7fbe466f95d1706487b3d0c468598ea2a1b8becd8e174a5cd0de6bc42

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:49:40 GMT
content-encoding
gzip
last-modified
Wed, 18 Mar 2020 21:50:06 GMT
access-control-allow-origin
*
etag
"1584568206"
x-hw
1585154980.cds070.lo4.hn,1585154980.cds038.lo4.c
content-type
application/javascript
status
200
cache-control
max-age=5
accept-ranges
bytes
content-length
100286
rendered
ri.amurege.com/notify/
0
99 B
Image
General
Full URL
https://ri.amurege.com/notify/rendered?a=revcontent&cep=zXGZVOihkmttaqEIkYP-kSo5hO7YZEtBkXt9x3QHAAl0TczMTEBIPVWxZn4c-vUUcK-80uyDxrqb7-AxvwQoFa_5Qdhx_9T7HWxKcsNBqICwe-CXg6-jeOek7Ag6B1HneznO8vOwGa--B1GCoNOgX0munKDoE4FbJL3DKSQ0PMsUXfojXzZ3c1tpbd6Qg1QUpv1WQHEmqCWn49hAEyfiTd1HFV_37a55_VXvu3xEmWYXQpevdiSQ_Pg6pUm7tmJw0d1VP77Ulha_At8Fdic7Uw==
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.201.224.52 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-201-224-52.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Connection
keep-alive
Date
Wed, 25 Mar 2020 16:49:40 GMT
Content-Length
0
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j81&a=1631087609&t=pageview&_s=1&dl=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&ul=en-us&de=U...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-36230183-1&cid=298010948.1585154980&jid=631001509&_gid=238068780.1585154980&gjid=760449553&_v=j81&z=586007954
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=298010948.1585154980&jid=631001509&_v=j81&z=586007954
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=298010948.1585154980&jid=631001509&_v=j81&z=586007954&slf_rd=1&random=2414498296
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=298010948.1585154980&jid=631001509&_v=j81&z=586007954&slf_rd=1&random=2414498296
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 25 Mar 2020 16:49:40 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 25 Mar 2020 16:49:40 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=298010948.1585154980&jid=631001509&_v=j81&z=586007954&slf_rd=1&random=2414498296
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
imp.php
trends.revcontent.com/
0
205 B
XHR
General
Full URL
https://trends.revcontent.com/imp.php
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.30.187.156 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-30-187-156.eu-west-1.compute.amazonaws.com
Software
Apache/2.4.25 (Debian) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=931536000; includeSubDomains

Request headers

Accept
*/*
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Wed, 25 Mar 2020 16:49:40 GMT
server
Apache/2.4.25 (Debian)
status
200
strict-transport-security
max-age=931536000; includeSubDomains
content-type
text/html; charset=UTF-8
access-control-allow-origin
https://www.hackread.com
access-control-allow-credentials
true
content-length
0
sodar
pagead2.googlesyndication.com/getconfig/
7 KB
5 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gda&tv=r20200319&st=env
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7f56b359c1b7296256f8874fa4125d3c6625fe7585354232ab4004e4a14ad331
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 25 Mar 2020 16:49:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5137
x-xss-protection
0
640x480.jpg
static.earnify.com/m/ca4368be-f78c-4cfd-ba34-f3a33e0d2821/a4515a17-be4f-4640-a74b-bbef4489a225/
79 KB
80 KB
Image
General
Full URL
https://static.earnify.com/m/ca4368be-f78c-4cfd-ba34-f3a33e0d2821/a4515a17-be4f-4640-a74b-bbef4489a225/640x480.jpg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6811:860f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3641b1f837fed1878156684717808736ea5c9e69d0b8c2351ac03826229a7732

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:49:41 GMT
cf-cache-status
HIT
age
4013
cf-polished
origFmt=jpeg, origSize=147849
cf-ray
579a206a5ec01756-FRA
status
200
content-disposition
inline; filename="640x480.webp"
cf-bgj
imgq:100
alt-svc
h3-27=":443"; ma=86400, h3-25=":443"; ma=86400, h3-24=":443"; ma=86400, h3-23=":443"; ma=86400
content-length
80808
x-amz-id-2
HFBlpQ9pDbHq8YXg7Ndts+7vSznFACAGkO38TY1nqGU0h9qHHX+DPZ3ODvCIqyxR/fDH1pk2naw=
last-modified
Mon, 23 Mar 2020 05:36:54 GMT
server
cloudflare
etag
"d4ad29898b731cb09bbb356399ce9f37"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept
x-amz-request-id
0601A22EFEA9D117
cache-control
public, max-age=7200
x-amz-version-id
hVR_VSM4tuHNsQ8UmG.t8i0efeYJE7Nh
accept-ranges
bytes
content-type
image/webp
expires
Wed, 25 Mar 2020 18:49:41 GMT
/
img.revcontent.com/
69 KB
69 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/15682945132127147593.jpeg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
4faf7846805e1149f981494ebe3a1b5f9fe5ba40c5080b1fee2360e3660145df

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:49:41 GMT
last-modified
Thu, 12 Sep 2019 13:21:54 GMT
etag
"1568294514"
x-hw
1585154981.cds074.lo4.hn,1585154981.cds203.lo4.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
70764
b625c180-1901-4b5c-a191-9065a8d9d734.jpeg
cdn.amurege.com/6f4a2f71-ee33-4558-bacf-560a93d17147/
42 KB
42 KB
Image
General
Full URL
https://cdn.amurege.com/6f4a2f71-ee33-4558-bacf-560a93d17147/b625c180-1901-4b5c-a191-9065a8d9d734.jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.7.46 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-86-7-46.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
88fd69c6e047107a5847973ddfb9e9db56b36c874ca48e705868dac9f37b6368

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 14:35:59 GMT
via
1.1 9810d82af8847b51b9c3048141069a65.cloudfront.net (CloudFront)
last-modified
Wed, 25 Mar 2020 14:16:22 GMT
server
AmazonS3
age
8023
etag
"ac7d5e8538e4a59576c5c891e38ac642"
x-cache
Hit from cloudfront
content-type
application/octet-stream
status
200
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-length
42529
x-amz-cf-id
BvYcnCvksHVYic1TgH2PC9-8Fix-c3fl2MGsvgqluiA_x0VsTIQR9w==
/
img.revcontent.com/
46 KB
46 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/6bd7813450c3963c77ed56d38f4a7da9.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
602170e4707bad1d75b31d0483f3ea8b71924869d263da364887634c110b8f38

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:49:41 GMT
last-modified
Thu, 16 Jan 2020 23:25:46 GMT
etag
"1579217146"
x-hw
1585154981.cds074.lo4.hn,1585154981.cds062.lo4.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
46673
/
img.revcontent.com/
54 KB
54 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/5e7327fadd9185-08922869.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
1ce541928f26945b8287df29269fd99c4ec569dad14e7a42ce9ffec393756f05

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:49:41 GMT
last-modified
Thu, 19 Mar 2020 08:06:19 GMT
etag
"1584605179"
x-hw
1585154981.cds074.lo4.hn,1585154981.cds012.lo4.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
55500
/
img.revcontent.com/
19 KB
19 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/5e789a953b9f19-86655759.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
0b698085999ff1648450eb4ebede9ffe6133023308ccd70f71ebaf5214d31a25

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:49:41 GMT
last-modified
Mon, 23 Mar 2020 11:16:38 GMT
etag
"1584962198"
x-hw
1585154981.cds074.lo4.hn,1585154981.cds059.lo4.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
19373
/
img.revcontent.com/
41 KB
41 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/15197654120400148573.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
638fe957bbac3f5c8ceb07f22c8241b861ee5c969f344fe80317f2748ec90c30

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:49:41 GMT
last-modified
Tue, 27 Feb 2018 21:03:33 GMT
etag
"1519765413"
x-hw
1585154981.cds074.lo4.hn,1585154981.cds059.lo4.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
42265
/
img.revcontent.com/
48 KB
48 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/5e55183b646d76-48827670.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
185dae0f9afa3ef5b67bcc155c6dfbe1f4da269cd3d9e78d9c0778a22e903ae3

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:49:41 GMT
last-modified
Tue, 25 Feb 2020 12:51:08 GMT
etag
"1582635068"
x-hw
1585154981.cds074.lo4.hn,1585154981.cds236.lo4.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
49321
/
img.revcontent.com/
59 KB
59 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/5e70e2f83cb353-67835351.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
cca78b58201c1b982371dcf68961d416dcae3d84bb49608f2da15ed128e507e0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:49:41 GMT
last-modified
Tue, 17 Mar 2020 14:47:21 GMT
etag
"1584456441"
x-hw
1585154981.cds074.lo4.hn,1585154981.cds228.lo4.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
60079
sodar2.js
tpc.googlesyndication.com/sodar/
14 KB
5 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a47f17d6ebbf4621d8fe87ab790d8d8fb5c3086629194d9ff2d64faaa6e46ab6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:49:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1582746470043195"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5456
x-xss-protection
0
expires
Wed, 25 Mar 2020 16:49:41 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/209/ Frame 9A4A
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/209/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
5727
date
Wed, 25 Mar 2020 16:21:05 GMT
expires
Thu, 25 Mar 2021 16:21:05 GMT
last-modified
Tue, 25 Feb 2020 17:32:01 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
1716
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
gen_204
pagead2.googlesyndication.com/pagead/
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=209&t=2&li=gda_r20200319&jk=2719980998024620&bg=!gIOlg5tYTOjIOMXj96wCAAAARlIAAAANmQFcKIsuTCJIw7KrWlRpcAZvWtnXKBaO8qet2WtvIUL6bnkGej3v0QUGsy5QnXEd5Vjic2hQuF0fdC3qSZ6URC8yoNh1aj6_L-jyusYB4CADE2hJJwGVWBiK9VsfWIdaXD5SixE8jrfwrGEFuu2fqQzLrMj-8GxG1LT3Z0haL9-Z6nEZjVh6O7s1WRj4D9o4Z51Zk6WBU_y3MkiIvJkPKF-7xNn38B7npU7XD3Ck3c0z4B7t2BqpzcjU0SIQ0L_B-ree2WFLoXjm1n79LnARnPFAArtx9-tidEPah51_L4UcloUMYNDsxQlAQyeMFh4fZcrDerjp30FO7TLDQp_5QYI3edTnp16CCDHUgPYm-T_ZZqenpXtz_hrGSL3f_m5Rn9m-H5MI9L0iJQfOT3Iyvo4yYHO63R976BcyWZMm4alsVmoz-S9Vka68GvJDKWF9HTyIKqmviM80Kz7m-Ai0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Wed, 25 Mar 2020 16:49:41 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Verdicts & Comments Add Verdict or Comment

118 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| WebFontConfig object| _wpemojiSettings object| webfont object| WebFont object| twemoji object| wp undefined| $ function| jQuery object| cookieconsent number| initStickyMenu object| adsbygoogle boolean| miptheme_smooth_scrolling number| miptheme_ajaxpagination_timer number| miptheme_sticky_sidebar_margin number| miptheme_parallax_image_height object| mipthemeLocalCache object| wpcf7 object| mashsb undefined| strict object| thirsty_global_vars object| google_js_reporting_queue number| google_srt object| google_ad_modifications object| google_logging_queue object| ggeac boolean| google_measure_js_timing object| googleToken object| googleIMState function| processGoogleToken object| google_reactive_ads_global_state boolean| _gfp_a_ object| google_sa_queue object| google_sl_win function| google_process_slots boolean| google_apltlad boolean| _gfp_p_ function| google_spfd number| google_lpabyc number| google_unique_id object| google_sv_map object| google_t12n_vars object| thirstyFunctions object| jQuery1124008459139980719321 function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter function| google_sa_impl object| google_jobrunner object| google_persistent_state_async object| __google_ad_urls number| google_global_correlator number| __google_ad_urls_id object| google_prev_clients object| gaGlobal object| ampInaboxIframes object| ampInaboxPendingMessages object| google_iframe_oncopy boolean| google_osd_loaded boolean| google_onload_fired function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb function| SocialMediaStats function| smooth_scroll function| setCookie function| getCookie object| _photobox function| wNumb function| Cookies function| shareSelectedText object| miptheme_ajax_url function| setVideoHeights object| miptheme_ajax_post_views object| addComment function| gtag object| dataLayer object| google_tag_manager string| GoogleAnalyticsObject function| ga boolean| clean_io_required object| rc_head object| rc_body object| rc2css object| rc2js undefined| rc2js_beacon_5e7b8ba3f0927 object| rcel object| rcds object| beaconNoScript object| rc_segmented_creatives object| rc_segmented_widgets object| rc_loaded_widgets undefined| rc_chosen_interests number| rc_loader_limit number| rc_loader_runs object| rc_loaded_hashes object| rcsc object| RevContentLoader string| rc_p_uuid number| provider string| do_branding object| google_tag_data object| gaplugins object| gaData object| ak_js object| commentForm undefined| replyRowContainer undefined| children object| Base64 function| rcjq boolean| scrolled boolean| swiped boolean| resized boolean| rc_segments_sent function| Hammer object| jQuery1102019693435912988333 object| GoogleGcLKhOms object| google_image_requests

1 Cookies

Domain/Path Name / Value
.doubleclick.net/ Name: test_cookie
Value: CheckForPermission

2 Console Messages

Source Level URL
Text
console-api log URL: https://www.hackread.com/wp-includes/js/jquery/jquery-migrate.min.js(Line 2)
Message:
JQMIGRATE: Migrate is installed, version 1.4.1
console-api log URL: https://www.hackread.com/wp-content/plugins/mashsharer/assets/js/mashsb.min.js(Line 1)
Message:
not rate limited: 1585155007

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

adservice.google.com
adservice.google.de
ajax.googleapis.com
b1sync.zemanta.com
bttrack.com
cdn.amurege.com
cdn.revcontent.com
cdnjs.cloudflare.com
fonts.googleapis.com
fonts.gstatic.com
googleads.g.doubleclick.net
ib.adnxs.com
img.revcontent.com
pagead2.googlesyndication.com
ri.amurege.com
rtb.mfadsrvr.com
secure.gravatar.com
static.earnify.com
stats.g.doubleclick.net
tpc.googlesyndication.com
trends.revcontent.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
www.hackread.com
x.bidswitch.net
151.139.128.10
18.194.31.52
185.33.223.200
192.132.33.46
2606:4700::6811:4004
2606:4700::6811:860f
2a00:1450:4001:800::2002
2a00:1450:4001:800::2008
2a00:1450:4001:806::2004
2a00:1450:4001:80b::200a
2a00:1450:4001:814::2003
2a00:1450:4001:816::200a
2a00:1450:4001:817::200e
2a00:1450:4001:81a::2002
2a00:1450:4001:81b::2001
2a00:1450:4001:81c::2002
2a00:1450:4001:81e::2003
2a00:1450:400c:c00::9a
2a04:fa87:fffe::c000:4902
34.201.224.52
52.30.187.156
52.58.23.168
64.202.112.63
67.227.194.195
99.86.7.46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