URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Submission: On September 20 via manual from US

Summary

This website contacted 27 IPs in 4 countries across 22 domains to perform 91 HTTP transactions. The main IP is 192.124.249.13, located in United States and belongs to SUCURI-SEC - Sucuri, US. The main domain is www.hackread.com.
TLS certificate: Issued by COMODO RSA Domain Validation Secure S... on February 15th 2016. Valid for: 3 years.
This is the only time www.hackread.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
29 192.124.249.13 30148 (SUCURI-SEC)
4 2a00:1450:400... 15169 (GOOGLE)
1 198.232.125.123 3257 (GTT-BACKB...)
1 2a00:1450:400... 15169 (GOOGLE)
4 2a00:1450:400... 15169 (GOOGLE)
1 192.0.73.2 2635 (AUTOMATTIC)
1 52.85.93.53 16509 (AMAZON-02)
1 2 52.210.47.122 16509 (AMAZON-02)
1 1 52.18.15.185 16509 (AMAZON-02)
2 2400:cb00:204... 13335 (CLOUDFLAR...)
1 2 2a00:1450:400... 15169 (GOOGLE)
1 94.31.29.55 6461 (ZAYO-6461)
2 2a00:1450:400... 15169 (GOOGLE)
3 54.229.214.110 16509 (AMAZON-02)
1 2a03:2880:f02... 32934 (FACEBOOK)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a03:2880:f11... 32934 (FACEBOOK)
1 178.250.2.74 44788 (ASN-CRITE...)
1 178.250.0.93 44788 (ASN-CRITE...)
4 205.185.216.42 20446 (HIGHWINDS3)
1 3 172.227.124.249 20940 (AKAMAI-ASN1)
1 95.172.94.14 27281 (QUANTCAST)
1 1 192.132.33.27 18568 (BIDTELLECT)
2 34.248.43.189 16509 (AMAZON-02)
1 1 52.55.187.233 14618 (AMAZON-AES)
1 95.172.94.22 27281 (QUANTCAST)
7 205.185.216.10 20446 (HIGHWINDS3)
1 2600:9000:201... 16509 (AMAZON-02)
1 95.172.94.61 27281 (QUANTCAST)
91 27
Domain Requested by
29 www.hackread.com www.hackread.com
ajax.googleapis.com
9 img.revcontent.com www.hackread.com
4 pagead2.googlesyndication.com www.hackread.com
pagead2.googlesyndication.com
4 fonts.googleapis.com www.hackread.com
3 sb.scorecardresearch.com 1 redirects www.hackread.com
3 trends.revcontent.com www.hackread.com
trends.revcontent.com
cdn.revcontent.com
2 pixel.quantserve.com www.hackread.com
2 cm.revcontent.com www.hackread.com
2 cdn.revcontent.com www.hackread.com
2 fonts.gstatic.com www.hackread.com
2 www.google-analytics.com 1 redirects www.hackread.com
2 cdnjs.cloudflare.com www.hackread.com
2 incapsula.evyy.net 1 redirects www.hackread.com
2 maxcdn.bootstrapcdn.com www.hackread.com
1 rules.quantcount.com secure.quantserve.com
1 t.cwkuki.com 1 redirects
1 bttrack.com 1 redirects
1 secure.quantserve.com www.hackread.com
1 bidder.criteo.com static.criteo.net
1 static.criteo.net trends.revcontent.com
1 stats.g.doubleclick.net www.hackread.com
1 www.facebook.com www.hackread.com
1 connect.facebook.net www.hackread.com
1 www.ojrq.net 1 redirects
1 a.impactradius-go.com www.hackread.com
1 secure.gravatar.com www.hackread.com
1 ajax.googleapis.com www.hackread.com
0 staticxx.facebook.com Failed connect.facebook.net
0 googleads.g.doubleclick.net Failed pagead2.googlesyndication.com
91 29
Subject Issuer Validity Valid
hackread.com
COMODO RSA Domain Validation Secure Server CA
2016-02-15 -
2019-02-14
3 years crt.sh
*.googleapis.com
Google Internet Authority G2
2017-09-13 -
2017-12-06
3 months crt.sh
*.bootstrapcdn.com
RapidSSL SHA256 CA
2016-10-13 -
2017-10-13
a year crt.sh
*.g.doubleclick.net
Google Internet Authority G2
2017-09-07 -
2017-11-30
3 months crt.sh
*.gravatar.com
Go Daddy Secure Certificate Authority - G2
2015-09-05 -
2018-10-14
3 years crt.sh
*.impactradius-go.com
COMODO RSA Domain Validation Secure Server CA
2016-01-23 -
2019-01-22
3 years crt.sh
*.evyy.net
Go Daddy Secure Certificate Authority - G2
2014-12-19 -
2018-01-28
3 years crt.sh
ssl412106.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2017-05-27 -
2017-12-03
6 months crt.sh
*.google-analytics.com
Google Internet Authority G2
2017-09-13 -
2017-12-06
3 months crt.sh
*.google.com
Google Internet Authority G2
2017-09-13 -
2017-12-06
3 months crt.sh
*.revcontent.com
DigiCert SHA2 Secure Server CA
2015-04-20 -
2018-06-27
3 years crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2016-12-09 -
2018-01-25
a year crt.sh
*.criteo.net
Symantec Class 3 Secure Server CA - G4
2017-01-10 -
2018-04-11
a year crt.sh
*.criteo.com
Symantec Class 3 Secure Server CA - G4
2015-10-13 -
2018-01-26
2 years crt.sh
*.scorecardresearch.com
COMODO RSA Organization Validation Secure Server CA
2016-12-20 -
2017-12-20
a year crt.sh
*.quantserve.com
DigiCert SHA2 High Assurance Server CA
2015-08-05 -
2018-11-02
3 years crt.sh

This page contains 17 frames:

Primary Page: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Frame ID: 27919.1
Requests: 76 HTTP requests in this frame

Frame: https://www.facebook.com/plugins/page.php?href=https%3A%2F%2Fwww.facebook.com%2Fhackread&tabs&width=300&height=214&small_header=false&adapt_container_width=true&hide_cover=false&show_facepile=true&appId=307380646093090
Frame ID: 27919.6
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20170913/r20170110/zrt_lookup.html
Frame ID: 27919.10
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&format=1200x90&output=html&h=90&slotname=6531121012&adk=2177998239&adf=383480478&w=1200&lmt=1505912387&rafmt=1&flash=0&fwr=0&url=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&resp_fmts=3&wgl=1&dt=1505925642789&bpp=9&bdt=159&fdt=213&idt=230&shv=r20170913&cbv=r20170110&saldr=aa&correlator=5510937746544&frm=20&ga_vid=1304377876.1505925643&ga_sid=1505925643&ga_hid=816181966&ga_fc=0&pv=2&iag=3&icsg=0&nhd=1&dssz=2&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=193&ady=220&biw=1585&bih=1200&abxe=1&eid=21060868&oid=3&rx=0&eae=0&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeE%7C&abl=CS&ppjl=u&pfx=0&fu=144&bc=1&ifi=1&xpc=D2rxcLPtdN&p=https%3A//www.hackread.com&dtd=252
Frame ID: 27919.11
Requests: 1 HTTP requests in this frame

Frame: https://staticxx.facebook.com/connect/xd_arbiter/r/5oivrH7Newv.js?version=42
Frame ID: 27919.9
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20170913/r20170110/zrt_lookup.html
Frame ID: 27919.13
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&format=870x90_0ads_al&output=html&h=90&slotname=7661928216&adk=1417474520&adf=3173364508&w=870&lmt=1505912387&rafmt=10&flash=0&url=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&wgl=1&dt=1505925642798&bpp=5&bdt=168&fdt=255&idt=256&shv=r20170913&cbv=r20170110&saldr=aa&prev_fmts=1200x90&correlator=5510937746544&frm=20&ga_vid=1304377876.1505925643&ga_sid=1505925643&ga_hid=816181966&ga_fc=0&pv=1&iag=3&icsg=0&nhd=1&dssz=2&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=208&ady=1072&biw=1585&bih=1200&abxe=1&eid=21060868&oid=3&rx=0&eae=0&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeE%7C&abl=CS&ppjl=u&pfx=0&fu=144&bc=1&ifi=2&xpc=83EHeZoiFF&p=https%3A//www.hackread.com&dtd=263
Frame ID: 27919.14
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20170913/r20170110/zrt_lookup.html
Frame ID: 27919.16
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&format=870x90_0ads_al&output=html&h=90&slotname=7661928216&adk=1417474520&adf=2691581091&w=870&lmt=1505912387&rafmt=10&flash=0&url=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&wgl=1&dt=1505925642803&bpp=4&bdt=173&fdt=270&idt=271&shv=r20170913&cbv=r20170110&saldr=aa&prev_fmts=1200x90%2C870x90_0ads_al&correlator=5510937746544&frm=20&ga_vid=1304377876.1505925643&ga_sid=1505925643&ga_hid=816181966&ga_fc=0&pv=1&iag=3&icsg=0&nhd=1&dssz=2&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=208&ady=1827&biw=1585&bih=1200&abxe=1&eid=21060868&oid=3&rx=0&eae=0&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=144&bc=1&ifi=3&xpc=aLyYvoRxxO&p=https%3A//www.hackread.com&dtd=281
Frame ID: 27919.17
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20170913/r20170110/zrt_lookup.html
Frame ID: 27919.19
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&format=840x90&output=html&h=90&slotname=1775509853&adk=3550985017&adf=1778294127&w=840&lmt=1505912387&rafmt=1&flash=0&fwr=0&url=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&resp_fmts=3&wgl=1&dt=1505925642807&bpp=4&bdt=177&fdt=291&idt=292&shv=r20170913&cbv=r20170110&saldr=aa&prev_fmts=1200x90%2C870x90_0ads_al%2C870x90_0ads_al&correlator=5510937746544&frm=20&ga_vid=1304377876.1505925643&ga_sid=1505925643&ga_hid=816181966&ga_fc=0&pv=1&iag=3&icsg=0&nhd=1&dssz=2&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=223&ady=2672&biw=1585&bih=1200&abxe=1&eid=21060868&oid=3&rx=0&eae=0&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CleEbr%7C&abl=CS&ppjl=u&pfx=0&fu=144&bc=1&ifi=4&xpc=jtVeazBoxB&p=https%3A//www.hackread.com&dtd=302
Frame ID: 27919.20
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20170913/r20170110/zrt_lookup.html
Frame ID: 27919.23
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&format=300x600&output=html&h=600&slotname=3047884612&adk=2552215354&adf=1570668977&w=300&lmt=1505912387&flash=0&url=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&wgl=1&dt=1505925642860&bpp=5&bdt=230&fdt=274&idt=275&shv=r20170913&cbv=r20170110&saldr=aa&prev_fmts=1200x90%2C870x90_0ads_al%2C870x90_0ads_al%2C840x90&correlator=5510937746544&frm=20&ga_vid=1304377876.1505925643&ga_sid=1505925643&ga_hid=816181966&ga_fc=0&pv=1&iag=3&icsg=0&nhd=1&dssz=2&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1093&ady=1048&biw=1585&bih=1200&abxe=1&eid=21060868&oid=3&rx=0&eae=0&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeE%7C&abl=CS&ppjl=u&pfx=0&fu=16&bc=1&ifi=5&xpc=3dAQtbKKKC&p=https%3A//www.hackread.com&dtd=287
Frame ID: 27919.24
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20170913/r20170110/zrt_lookup.html
Frame ID: 27919.26
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&format=300x600&output=html&h=600&slotname=1775509853&adk=347135735&adf=4082040943&w=300&lmt=1505912387&rafmt=1&flash=0&fwr=0&url=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&resp_fmts=4&wgl=1&dt=1505925642865&bpp=5&bdt=235&fdt=298&idt=299&shv=r20170913&cbv=r20170110&saldr=aa&prev_fmts=1200x90%2C870x90_0ads_al%2C870x90_0ads_al%2C840x90%2C300x600&correlator=5510937746544&frm=20&ga_vid=1304377876.1505925643&ga_sid=1505925643&ga_hid=816181966&ga_fc=0&pv=1&iag=3&icsg=0&nhd=1&dssz=2&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1093&ady=1775&biw=1585&bih=1200&abxe=1&eid=21060868&oid=3&rx=0&eae=0&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=144&bc=1&ifi=6&xpc=cphoFDnfDP&p=https%3A//www.hackread.com&dtd=305
Frame ID: 27919.27
Requests: 1 HTTP requests in this frame

Frame: https://staticxx.facebook.com/connect/xd_arbiter/r/5oivrH7Newv.js?version=42
Frame ID: 27919.29
Requests: 1 HTTP requests in this frame

Frame: https://www.facebook.com/plugins/feedback.php?api_key=307380646093090&channel_url=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter%2Fr%2F5oivrH7Newv.js%3Fversion%3D42%23cb%3Df1d9c56c6935d78%26domain%3Dwww.hackread.com%26origin%3Dhttps%253A%252F%252Fwww.hackread.com%252Ff21a45d5be8a4c%26relation%3Dparent.parent&colorscheme=light&href=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&locale=en_US&numposts=5&sdk=joey&skin=light&version=v2.3&width=100%25
Frame ID: 27919.30
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+wp-(?:content|includes)/i
  • script /\/wp-includes\//i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+wp-(?:content|includes)/i
  • script /\/wp-includes\//i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^\/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+font-awesome(?:\.min)?\.css/i

Overall confidence: 100%
Detected patterns
  • script /googlesyndication\.com\//i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|(analytics))\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Overall confidence: 100%
Detected patterns
  • html /<iframe[^>]* (?:id="comscore"|scr=[^>]+comscore)|\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • script /\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i

Page Statistics

91
Requests

82 %
HTTPS

34 %
IPv6

22
Domains

29
Subdomains

27
IPs

4
Countries

1189 kB
Transfer

2380 kB
Size

6
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 21
  • https://incapsula.evyy.net/i/256650/273482/4029 HTTP 302
  • https://www.ojrq.net/p/?return=https%3A%2F%2Fincapsula.evyy.net%2Fi%2F256650%2F273482%2F4029%3Flevel%3D1%26srcref%3Dhttps%253A%252F%252Fwww.hackread.com%252Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%252F&cid=4029 HTTP 302
  • https://incapsula.evyy.net/i/256650/273482/4029?level=1&srcref=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&brwsr=94fb2dfe-3b58-1a6c-699a-d62d956d3424&brwsrsig=Ro7UrZzLw2-XVLc2Y62TuU4wXLx02I
Request Chain 45
  • https://www.google-analytics.com/r/collect?v=1&_v=j62&a=816181966&t=pageview&_s=1&dl=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&ul=en-us&de=UTF-8&dt=The%20Pirate%20Bay%20Caught%20Running%20Cryptocurrency%20Mining%20Script&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=IEBAAEABI~&jid=358735251&gjid=505929254&cid=1304377876.1505925643&tid=UA-36230183-1&_gid=1552841972.1505925643&_r=1&z=512351035 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-36230183-1&cid=1304377876.1505925643&jid=358735251&_gid=1552841972.1505925643&gjid=505929254&_v=j62&z=512351035
Request Chain 71
  • https://bttrack.com/pixel/cookiesync?source=0b0edea9-c9fe-4b9c-9bcd-a51022f2873f&publisherid=N2IxMTM5OGQ5N2RiZjFhMzMxY2Q2MTFjMWZhMWIyMWE=&pushdata=109&secure=1 HTTP 302
  • https://cm.revcontent.com/pixel_sync?bidder=109&bidder_uid=25f13e92-d7da-44c2-b160-f8d754875349&exchange_uid=N2IxMTM5OGQ5N2RiZjFhMzMxY2Q2MTFjMWZhMWIyMWE=
Request Chain 72
  • https://t.cwkuki.com/cs/D8f2l?u=N2IxMTM5OGQ5N2RiZjFhMzMxY2Q2MTFjMWZhMWIyMWE= HTTP 302
  • https://cm.revcontent.com/pixel_sync?exchange_uid=N2IxMTM5OGQ5N2RiZjFhMzMxY2Q2MTFjMWZhMWIyMWE%3D&bidder=112&bidder_uid=720f9530-9e22-11e7-b7a0-0242ac110003
Request Chain 83
  • https://sb.scorecardresearch.com/b?c1=7&c2=20310460&c3=12345&ns__t=1505925643437&ns_c=UTF-8&cv=3.1&c8=The%20Pirate%20Bay%20Caught%20Running%20Cryptocurrency%20Mining%20Script&c7=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=7&c2=20310460&c3=12345&ns__t=1505925643437&ns_c=UTF-8&cv=3.1&c8=The%20Pirate%20Bay%20Caught%20Running%20Cryptocurrency%20Mining%20Script&c7=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&c9=
Request Chain 88
  • https://www.facebook.com/connect/ping?client_id=307380646093090&domain=www.hackread.com&origin=1&redirect_uri=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter%2Fr%2F5oivrH7Newv.js%3Fversion%3D42%23cb%3Df31a72c82086d4%26domain%3Dwww.hackread.com%26origin%3Dhttps%253A%252F%252Fwww.hackread.com%252Ff21a45d5be8a4c%26relation%3Dparent&response_type=token%2Csigned_request%2Ccode&sdk=joey HTTP 302
  • https://staticxx.facebook.com/connect/xd_arbiter/r/5oivrH7Newv.js?version=42
Request Chain 89
  • https://www.facebook.com/plugins/comments.php?api_key=307380646093090&channel_url=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter%2Fr%2F5oivrH7Newv.js%3Fversion%3D42%23cb%3Df1d9c56c6935d78%26domain%3Dwww.hackread.com%26origin%3Dhttps%253A%252F%252Fwww.hackread.com%252Ff21a45d5be8a4c%26relation%3Dparent.parent&colorscheme=light&href=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&locale=en_US&numposts=5&sdk=joey&skin=light&version=v2.3&width=100%25 HTTP 302
  • https://www.facebook.com/plugins/feedback.php?api_key=307380646093090&channel_url=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter%2Fr%2F5oivrH7Newv.js%3Fversion%3D42%23cb%3Df1d9c56c6935d78%26domain%3Dwww.hackread.com%26origin%3Dhttps%253A%252F%252Fwww.hackread.com%252Ff21a45d5be8a4c%26relation%3Dparent.parent&colorscheme=light&href=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&locale=en_US&numposts=5&sdk=joey&skin=light&version=v2.3&width=100%25

91 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
48 KB
12 KB
Document
General
Full URL
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
5477b0e09b4fbb570aabb7678c1fcb81ffef8654a59a4fe391cf9b01fb115dfc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
12354
x-xss-protection
1; mode=block
pragma
public
last-modified
Wed, 20 Sep 2017 12:59:47 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding,Cookie
content-type
text/html; charset=UTF-8
cache-control
max-age=3348, public, must-revalidate, proxy-revalidate
x-sucuri-id
15013
accept-ranges
bytes
expires
Wed, 20 Sep 2017 13:59:47 GMT
css
fonts.googleapis.com/
286 B
248 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Frank+Ruhl+Libre
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:816::200a , Ireland, ASN15169 (GOOGLE - Google Inc., US),
Reverse DNS
Software
ESF /
Resource Hash
931b7daffa118a7ed1a46ff1312963b16ff8b314f02d237c2e4ac9f72736bf46
Security Headers
Name Value
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="39,38,37,35"
x-xss-protection
1; mode=block
expires
Wed, 20 Sep 2017 16:40:42 GMT
font-awesome.min.css
maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/
23 KB
6 KB
Stylesheet
General
Full URL
https://maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
198.232.125.123 Los Angeles, United States, ASN3257 (GTT-BACKBONE GTT, DE),
Reverse DNS
123-125-232-198.static.unitasglobal.net
Software
NetDNA-cache/2.2 /
Resource Hash
541ac58217a8ade1a5e292a65a0661dc9db7a49ae13654943817a4fbc6761afd

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
last-modified
Thu, 22 Jan 2015 19:53:38 GMT
server
NetDNA-cache/2.2
status
200
etag
W/"04425bbdc6243fc6e54bf8984fe50330"
vary
Accept-Encoding
x-cache
HIT
content-type
text/css
access-control-allow-origin
*
cache-control
max-age=31104000
x-hello-human
Say hello back! @getBootstrapCDN on Twitter
expires
Sat, 15 Sep 2018 16:40:42 GMT
css
fonts.googleapis.com/
221 B
219 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Abel
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:816::200a , Ireland, ASN15169 (GOOGLE - Google Inc., US),
Reverse DNS
Software
ESF /
Resource Hash
b833f1e3dec5be07fdda9f8c2310dc1e874c13cbe41657f7e7ce49f79eff1acf
Security Headers
Name Value
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="39,38,37,35"
x-xss-protection
1; mode=block
expires
Wed, 20 Sep 2017 16:40:42 GMT
css
fonts.googleapis.com/
912 B
295 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Ubuntu:400,700,500,300
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:816::200a , Ireland, ASN15169 (GOOGLE - Google Inc., US),
Reverse DNS
Software
ESF /
Resource Hash
0f14605213016bd26dd39620d5be482a3371b3b013979038583d6977e3e877c3
Security Headers
Name Value
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="39,38,37,35"
x-xss-protection
1; mode=block
expires
Wed, 20 Sep 2017 16:40:42 GMT
style.css
www.hackread.com/wp-content/plugins/wordpress-form-manager/css/
6 KB
2 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/plugins/wordpress-form-manager/css/style.css?x62286&ver=4.8.2
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
afbb337384d4308e6edba3b27bba762735f3e01b1a433b0d9b1579be9aefaee5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
1662
x-xss-protection
1; mode=block
pragma
public
last-modified
Mon, 12 Oct 2015 16:53:32 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
text/css
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
mashsb.min.css
www.hackread.com/wp-content/plugins/mashsharer/assets/css/
46 KB
28 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/plugins/mashsharer/assets/css/mashsb.min.css?x62286&ver=3.4.5
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
90d4ca13af3a0fb2d1ce64ee7ef6a2c4aec91eabdf7f6044add55cee70a681f8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
28614
x-xss-protection
1; mode=block
pragma
public
last-modified
Tue, 05 Sep 2017 11:24:33 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
text/css
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
pagenavi-css.css
www.hackread.com/wp-content/plugins/wp-pagenavi/
374 B
248 B
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/plugins/wp-pagenavi/pagenavi-css.css?x62286&ver=2.70
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
c2711e9edc60964dcb5aada1bfa59c2d68d3d9dc1baf4a5ee058b4c1bd32c3eb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
239
x-xss-protection
1; mode=block
pragma
public
last-modified
Fri, 08 Sep 2017 11:33:30 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
text/css
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
css
fonts.googleapis.com/
262 B
250 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto+Slab%3A100&subset=latin%2Call&ver=4.8.2
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:816::200a , Ireland, ASN15169 (GOOGLE - Google Inc., US),
Reverse DNS
Software
ESF /
Resource Hash
bd5d84e2a8fcd3d6a8cad8a9f68c0d34fa918c7a252abf62610eaa05c35ab53f
Security Headers
Name Value
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="39,38,37,35"
x-xss-protection
1; mode=block
expires
Wed, 20 Sep 2017 16:40:42 GMT
style.css
www.hackread.com/wp-content/themes/hackread_v2/
75 KB
11 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/hackread_v2/style.css?x62286&ver=4.8.2
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
04ab4a548c6d7f33ea1d198a41b9ff217eaaa2f75a127f66db2d1ce67b4441e6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
11723
x-xss-protection
1; mode=block
pragma
public
last-modified
Tue, 12 Sep 2017 19:54:15 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
text/css
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
easy-social-share-buttons.min.css
www.hackread.com/wp-content/plugins/easy-social-share-buttons3/assets/css/
108 KB
14 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/plugins/easy-social-share-buttons3/assets/css/easy-social-share-buttons.min.css?x62286&ver=5.0
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
10b4bd812153d0543582c2250126dd63c3ff2fcaf6dab0a3ec463edc2dd1943f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
14370
x-xss-protection
1; mode=block
pragma
public
last-modified
Tue, 19 Sep 2017 16:52:25 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
text/css
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.9.1/
90 KB
32 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81e::200a , Ireland, ASN15169 (GOOGLE - Google Inc., US),
Reverse DNS
Software
sffe /
Resource Hash
c12f6098e641aaca96c60215800f18f5671039aecf812217fab3c0d152f6adb4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Mon, 11 Sep 2017 16:49:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
777064
status
200
alt-svc
quic=":443"; ma=2592000; v="39,38,37,35"
content-length
33018
x-xss-protection
1; mode=block
last-modified
Tue, 20 Dec 2016 18:17:03 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 11 Sep 2018 16:49:38 GMT
userscripts.js
www.hackread.com/wp-content/plugins/wordpress-form-manager/js/
7 KB
2 KB
Script
General
Full URL
https://www.hackread.com/wp-content/plugins/wordpress-form-manager/js/userscripts.js?x62286&ver=4.8.2
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
246ed22843a11e5645d993e390a46d321b425a1d88e2b3ea86aba25c978a0550
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
1916
x-xss-protection
1; mode=block
pragma
public
last-modified
Mon, 12 Oct 2015 16:53:32 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
mashsb.min.js
www.hackread.com/wp-content/plugins/mashsharer/assets/js/
4 KB
1 KB
Script
General
Full URL
https://www.hackread.com/wp-content/plugins/mashsharer/assets/js/mashsb.min.js?x62286&ver=3.4.5
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
fd6a717ebcd4e2e9086bf5608a59e854291662369fe73466134a46f37ed83780
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
1445
x-xss-protection
1; mode=block
pragma
public
last-modified
Tue, 05 Sep 2017 11:24:33 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
bootstrap.min.css
www.hackread.com/wp-content/themes/hackread_v2/bootstrap/css/
115 KB
19 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/hackread_v2/bootstrap/css/bootstrap.min.css?x62286
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
6008b1c110a6a206f40ad7f60f4fe2cd3a9d883718f5e21c6690ec85db632d5b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
19383
x-xss-protection
1; mode=block
pragma
public
last-modified
Tue, 06 Oct 2015 02:29:51 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
text/css
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
nprogress.css
www.hackread.com/wp-content/themes/hackread_v2/
1 KB
565 B
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/hackread_v2/nprogress.css?x62286
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
473ffc73a92b7583c71a2b3f1d045207119a4ba8bb07728b331163a18009c70d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
556
x-xss-protection
1; mode=block
pragma
public
last-modified
Mon, 27 Apr 2015 22:04:39 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
text/css
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
hackread-logo.png
www.hackread.com/wp-content/themes/hackread_v2/img/
9 KB
9 KB
Image
General
Full URL
https://www.hackread.com/wp-content/themes/hackread_v2/img/hackread-logo.png?x62286
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
158868ab23d1a61a58ee2ef949003e28d08c606fe29a508e6d8bd4072373b4a0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
9046
x-xss-protection
1; mode=block
pragma
public
last-modified
Sat, 29 Jul 2017 16:03:46 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
image/png
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/
64 KB
23 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81d::2002 , Ireland, ASN15169 (GOOGLE - Google Inc., US),
Reverse DNS
Software
cafe /
Resource Hash
ec2dd0abe873bcb6a4238ba7b1934e2a23d6f80ccfbab7165463de42a66481ae
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 15:59:20 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
2482
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="39,38,37,35",quic=":443"; ma=2592000; v="39,38,37,35"
content-length
24019
x-xss-protection
1; mode=block
server
cafe
etag
8759361452417515833
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=3600
timing-allow-origin
*
expires
Wed, 20 Sep 2017 16:59:20 GMT
the-pirate-bay-caught-running-cryptocurrency-mining-script.jpg
www.hackread.com/wp-content/uploads/2017/09/
125 KB
125 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2017/09/the-pirate-bay-caught-running-cryptocurrency-mining-script.jpg?x62286
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
285d87aa94cbb45d234d3a328b0afbc12132e8ed3445920ced588cabd8759a9b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
128009
x-xss-protection
1; mode=block
pragma
public
last-modified
Sun, 17 Sep 2017 19:40:56 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
image/jpeg
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
the-pirate-bay-caught-running-cryptocurrency-mining-script-2.png
www.hackread.com/wp-content/uploads/2017/09/
4 KB
4 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2017/09/the-pirate-bay-caught-running-cryptocurrency-mining-script-2.png
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
1d35ad0af835fbd4e109d323541c07a34cabd42bebc2605f9dca97b78ea23864
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
4480
x-xss-protection
1; mode=block
pragma
public
last-modified
Sun, 17 Sep 2017 19:47:53 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
image/png
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
cf728b76a63b387b11edeafcb1b9b654
secure.gravatar.com/avatar/
9 KB
9 KB
Image
General
Full URL
https://secure.gravatar.com/avatar/cf728b76a63b387b11edeafcb1b9b654?s=70&d=mm&r=g
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.73.2 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
518924d6d8c5b4370d572a4a82372b033c69fa7cc0e44f383ba3a389430e674e

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Wed, 20 Sep 2017 16:40:42 GMT
last-modified
Mon, 27 Mar 2017 18:29:35 GMT
server
nginx
source-age
48080
status
200
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=300
content-disposition
inline; filename="cf728b76a63b387b11edeafcb1b9b654.png"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/cf728b76a63b387b11edeafcb1b9b654?s=70&d=mm&r=g>; rel="canonical"
content-length
9570
expires
Wed, 20 Sep 2017 16:45:42 GMT
4029-273482
a.impactradius-go.com/display-ad/
30 KB
30 KB
Image
General
Full URL
https://a.impactradius-go.com/display-ad/4029-273482
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.93.53 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-93-53.jfk6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
478742fd1b16a177f1404b75beee3d753117f30138707dc88e250ab59e2e4ef1

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Thu, 13 Apr 2017 07:33:36 GMT
via
1.1 1ed704145e031b363677b35b95885a81.cloudfront.net (CloudFront)
last-modified
Sat, 08 Apr 2017 12:34:58 GMT
server
AmazonS3
etag
"4b9cc2d4e21d6069a9aaa5a37c9d93ed"
x-cache
RefreshHit from cloudfront
content-type
image/png
status
200
cache-control
max-age=900
accept-ranges
bytes
content-length
30324
x-amz-cf-id
S8UVhmqheurgjuFcbQ3YnnleS6FeWzG3i2GxNvn57TlUKzzX_P76uQ==
4029
incapsula.evyy.net/i/256650/273482/
Redirect Chain
  • https://incapsula.evyy.net/i/256650/273482/4029
  • https://www.ojrq.net/p/?return=https%3A%2F%2Fincapsula.evyy.net%2Fi%2F256650%2F273482%2F4029%3Flevel%3D1%26srcref%3Dhttps%253A%252F%252Fwww.hackread.com%252Fthe-pirate-bay-caught-running-cryptocurr...
  • https://incapsula.evyy.net/i/256650/273482/4029?level=1&srcref=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&brwsr=94fb2dfe-3b58-1a6c-699a-d62d956d3...
50 B
68 B
Image
General
Full URL
https://incapsula.evyy.net/i/256650/273482/4029?level=1&srcref=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&brwsr=94fb2dfe-3b58-1a6c-699a-d62d956d3424&brwsrsig=Ro7UrZzLw2-XVLc2Y62TuU4wXLx02I
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.210.47.122 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-210-47-122.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ec34cd386427fe6deacf99f4fdbeea4b1d1ed25f505411650d7ceaa843a7fc63

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 20 Sep 2017 16:40:43 GMT
server
p3p
policyref="/w3c/p3p.xml", CP="ALL BUS LEG DSP COR ADM CUR DEV PSA OUR NAV INT"
status
200
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
content-type
image/gif
content-length
50
expires
Wed, 20 Sep 2017 16:40:43 GMT

Redirect headers

pragma
no-cache
date
Wed, 20 Sep 2017 16:40:43 GMT
server
status
302
p3p
policyref="/w3c/p3p.xml", CP="ALL BUS LEG DSP COR ADM CUR DEV PSA OUR NAV INT"
location
https://incapsula.evyy.net/i/256650/273482/4029?level=1&srcref=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&brwsr=94fb2dfe-3b58-1a6c-699a-d62d956d3424&brwsrsig=Ro7UrZzLw2-XVLc2Y62TuU4wXLx02I
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
content-length
0
expires
Wed, 20 Sep 2017 16:40:43 GMT
font-awesome.min.css
www.hackread.com/wp-content/plugins/g1-socials/css/font-awesome/css/
27 KB
6 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/plugins/g1-socials/css/font-awesome/css/font-awesome.min.css?x62286&ver=4.8.2
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
ddd92f10ad162c7449eff0acaf40598c05b1111739587edb75e5326b6697c5d5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
6243
x-xss-protection
1; mode=block
pragma
public
last-modified
Sat, 19 Nov 2016 15:49:50 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
text/css
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
screen-basic.css
www.hackread.com/wp-content/plugins/g1-socials/css/
8 KB
2 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/plugins/g1-socials/css/screen-basic.css?x62286&ver=1.1
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
148a3e271b92454f13c1ca35851177f56b4d5ffe7c9d8ae0225440a7d5d8ee42
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
1562
x-xss-protection
1; mode=block
pragma
public
last-modified
Sat, 19 Nov 2016 15:49:50 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
text/css
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
custom.js
www.hackread.com/wp-content/plugins/lightbox/js/frontend/
7 KB
2 KB
Script
General
Full URL
https://www.hackread.com/wp-content/plugins/lightbox/js/frontend/custom.js?x62286&ver=1.0
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
b34577608e24e884807d53fd520c4e94efa4a63a44c31c323093ceeaa6f741b7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
1532
x-xss-protection
1; mode=block
pragma
public
last-modified
Fri, 16 Jun 2017 00:21:23 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
navigation.js
www.hackread.com/wp-content/themes/hackread_v2/js/
1 KB
447 B
Script
General
Full URL
https://www.hackread.com/wp-content/themes/hackread_v2/js/navigation.js?x62286&ver=20120206
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
f079c63d92476be4a3b20e4f56218399246151c94fc41622a3486ea026650db3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
438
x-xss-protection
1; mode=block
pragma
public
last-modified
Mon, 27 Apr 2015 22:05:02 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
bootstrap.min.js
www.hackread.com/wp-content/themes/hackread_v2/bootstrap/js/
35 KB
9 KB
Script
General
Full URL
https://www.hackread.com/wp-content/themes/hackread_v2/bootstrap/js/bootstrap.min.js?x62286&ver=4.8.2
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
c8eeec83fe8bf655eeeda291466d268770436dde4e3e40416a85d05d3893e892
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
9407
x-xss-protection
1; mode=block
pragma
public
last-modified
Mon, 27 Apr 2015 22:05:22 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
nprogress.js
www.hackread.com/wp-content/themes/hackread_v2/
6 KB
2 KB
Script
General
Full URL
https://www.hackread.com/wp-content/themes/hackread_v2/nprogress.js?x62286&ver=4.8.2
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
4593ee85d2b8c7e9bf7dad40754dbdea21faff5523b00e2872d11b6bd2e7e737
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
2120
x-xss-protection
1; mode=block
pragma
public
last-modified
Fri, 29 May 2015 19:48:41 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
skip-link-focus-fix.js
www.hackread.com/wp-content/themes/hackread_v2/js/
658 B
348 B
Script
General
Full URL
https://www.hackread.com/wp-content/themes/hackread_v2/js/skip-link-focus-fix.js?x62286&ver=20130115
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
e0a2652e34f79ebdb71d90a7385bfb4f8cf5dfe7c7b2ab0cacf595ad9350696a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
339
x-xss-protection
1; mode=block
pragma
public
last-modified
Mon, 27 Apr 2015 22:05:03 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
wp-embed.min.js
www.hackread.com/wp-includes/js/
1 KB
760 B
Script
General
Full URL
https://www.hackread.com/wp-includes/js/wp-embed.min.js?x62286&ver=4.8.2
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
dcb5e540e62fc85857254a1066afb6a7e8999279c6d4c583eef855d39f9289c0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
751
x-xss-protection
1; mode=block
pragma
public
last-modified
Sat, 10 Dec 2016 00:18:21 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
styles.css
www.hackread.com/wp-content/plugins/easy-social-share-buttons3/lib/modules/click-to-tweet/assets/css/
3 KB
723 B
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/plugins/easy-social-share-buttons3/lib/modules/click-to-tweet/assets/css/styles.css?x62286
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
ca04d95542ed2bbed0af3e8570fbe20474e5119161e1ffa2b6adc18757727c55
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
714
x-xss-protection
1; mode=block
pragma
public
last-modified
Sat, 19 Aug 2017 12:28:38 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
text/css
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
cookieconsent.min.css
cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.0.3/
4 KB
1 KB
Stylesheet
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.0.3/cookieconsent.min.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6813:c366 , United States, ASN13335 (CLOUDFLARENET - CloudFlare, Inc., US),
Reverse DNS
Software
cloudflare-nginx /
Resource Hash
456ab1a71507ed91abae14c9d08faffb373a7bc711a66e44341b7b8b7bb72ab4

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Mon, 21 Nov 2016 19:02:34 GMT
server
cloudflare-nginx
status
200
vary
Accept-Encoding
content-type
text/css
access-control-allow-origin
*
cache-control
public, max-age=30672000
cf-ray
3a163a627d13267e-FRA
expires
Mon, 10 Sep 2018 16:40:42 GMT
cookieconsent.min.js
cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.0.3/
19 KB
6 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.0.3/cookieconsent.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6813:c366 , United States, ASN13335 (CLOUDFLARENET - CloudFlare, Inc., US),
Reverse DNS
Software
cloudflare-nginx /
Resource Hash
af4c6683814aa527caf53bde3d021e6aafe00833b45f2dead043c87ed7864674

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Mon, 21 Nov 2016 19:02:34 GMT
server
cloudflare-nginx
status
200
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=30672000
cf-ray
3a163a62dd6f267e-FRA
expires
Mon, 10 Sep 2018 16:40:42 GMT
analytics.js
www.google-analytics.com/
33 KB
13 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::200e , Ireland, ASN15169 (GOOGLE - Google Inc., US),
Reverse DNS
Software
Golfe2 /
Resource Hash
684517d124adb46b27ef07bdf06ecbff34c2897f4aa53bdf50e8342c5a22d989
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 12 Sep 2017 04:27:56 GMT
server
Golfe2
age
5855
date
Wed, 20 Sep 2017 15:03:07 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="39,38,37,35"
content-length
13799
expires
Wed, 20 Sep 2017 17:03:07 GMT
wp-emoji-release.min.js
www.hackread.com/wp-includes/js/
12 KB
4 KB
Script
General
Full URL
https://www.hackread.com/wp-includes/js/wp-emoji-release.min.js?ver=4.8.2
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
dba6b80aceb1267fd1ed564e08a983730d272813e9b3aff85dc365c65333dd66
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
4323
x-xss-protection
1; mode=block
pragma
public
last-modified
Wed, 20 Sep 2017 03:13:09 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
fontawesome-webfont.woff2
maxcdn.bootstrapcdn.com/font-awesome/4.3.0/fonts/
55 KB
56 KB
Font
General
Full URL
https://maxcdn.bootstrapcdn.com/font-awesome/4.3.0/fonts/fontawesome-webfont.woff2?v=4.3.0
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
94.31.29.55 , United Kingdom, ASN6461 (ZAYO-6461 - Zayo Bandwidth Inc, US),
Reverse DNS
94.31.29.55.IPYX-077437-ZYO.above.net
Software
NetDNA-cache/2.2 /
Resource Hash
aadc3580d2b64ff5a7e6f1425587db4e8b033efcbf8f5c332ca52a5ed580c87c

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36
Referer
https://maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css
Origin
https://www.hackread.com

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
last-modified
Fri, 27 Feb 2015 19:45:39 GMT
server
NetDNA-cache/2.2
status
200
etag
"97493d3f11c0a3bd5cbd959f5d19b699"
vary
Accept-Encoding
x-cache
HIT
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
max-age=31104000
x-hello-human
Say hello back! @getBootstrapCDN on Twitter
accept-ranges
bytes
content-length
56780
expires
Sat, 15 Sep 2018 16:40:42 GMT
adelleregularwebfont.woff
www.hackread.com/wp-content/themes/hackread_v2/fonts/
27 KB
27 KB
Font
General
Full URL
https://www.hackread.com/wp-content/themes/hackread_v2/fonts/adelleregularwebfont.woff
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
e5b5fac59cca9a37b8483a090c466d4facf457491c81c9f8f0ffa0c810e8a9a2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36
Referer
https://www.hackread.com/wp-content/themes/hackread_v2/style.css?x62286&ver=4.8.2
Origin
https://www.hackread.com

Response headers

pragma
public
date
Wed, 20 Sep 2017 16:40:42 GMT
x-content-type-options
nosniff
server
nginx
x-frame-options
SAMEORIGIN
content-type
x-font/woff
status
200
x-sucuri-cache
HIT
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
vary
Accept-Encoding
content-length
27484
x-xss-protection
1; mode=block
expires
Thu, 31 Dec 2037 23:55:55 GMT
truncated
/
11 KB
0
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
745caffca4b97cf5cf2374d82c6dfb6fb7c7b694e85432f92ec4dcb35f4418c9

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36
Origin
https://www.hackread.com

Response headers

Access-Control-Allow-Origin
*
Content-Type
application/octet-stream
N59kklKPso9WzbZH9jwJSg.ttf
fonts.gstatic.com/s/abel/v7/
28 KB
13 KB
Font
General
Full URL
https://fonts.gstatic.com/s/abel/v7/N59kklKPso9WzbZH9jwJSg.ttf
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:816::2003 , Ireland, ASN15169 (GOOGLE - Google Inc., US),
Reverse DNS
Software
sffe /
Resource Hash
6e31bf9408d2d0d7bc64d2c607161010e98d1634840d738c7203b134acbaa0df
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Abel
Origin
https://www.hackread.com

Response headers

date
Mon, 04 Sep 2017 10:00:52 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1406390
status
200
alt-svc
quic=":443"; ma=2592000; v="39,38,37,35"
content-length
13058
x-xss-protection
1; mode=block
last-modified
Thu, 11 May 2017 18:07:51 GMT
server
sffe
vary
Accept-Encoding
content-type
font/ttf
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 04 Sep 2018 10:00:52 GMT
yDLloNqBpFmakCImLv4OJgl9RWWBmyuUQVUtb9Clhtk.ttf
fonts.gstatic.com/s/frankruhllibre/v2/
43 KB
24 KB
Font
General
Full URL
https://fonts.gstatic.com/s/frankruhllibre/v2/yDLloNqBpFmakCImLv4OJgl9RWWBmyuUQVUtb9Clhtk.ttf
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:816::2003 , Ireland, ASN15169 (GOOGLE - Google Inc., US),
Reverse DNS
Software
sffe /
Resource Hash
d40e3fc707455e2cb81e2334c80c1eabc6274233a7d45034af360508b7809f66
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Frank+Ruhl+Libre
Origin
https://www.hackread.com

Response headers

date
Mon, 04 Sep 2017 17:29:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1379464
status
200
alt-svc
quic=":443"; ma=2592000; v="39,38,37,35"
content-length
24396
x-xss-protection
1; mode=block
last-modified
Mon, 14 Aug 2017 23:23:53 GMT
server
sffe
vary
Accept-Encoding
content-type
font/ttf
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 04 Sep 2018 17:29:38 GMT
show_ads_impl_single_load.js
pagead2.googlesyndication.com/pagead/js/r20170913/r20170110/
190 KB
69 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20170913/r20170110/show_ads_impl_single_load.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81d::2002 , Ireland, ASN15169 (GOOGLE - Google Inc., US),
Reverse DNS
Software
cafe /
Resource Hash
d28b41a81c672ee1974a306314e954301c5af2f32f0c316b123f8e3b44f209bd
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
etag
2905471119271231908
content-type
text/javascript; charset=UTF-8
status
200
cache-control
private, max-age=1209600
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="39,38,37,35",quic=":443"; ma=2592000; v="39,38,37,35"
content-length
71042
x-xss-protection
1; mode=block
expires
Wed, 20 Sep 2017 16:40:42 GMT
ca-pub-3675825324474978.js
pagead2.googlesyndication.com/pub-config/r20160913/
133 B
134 B
Script
General
Full URL
https://pagead2.googlesyndication.com/pub-config/r20160913/ca-pub-3675825324474978.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81d::2002 , Ireland, ASN15169 (GOOGLE - Google Inc., US),
Reverse DNS
Software
sffe /
Resource Hash
7e7fa886d5d75c745d95be4fc3c5bfb4c988019b3f643c669734612345e1b8c8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 07:35:19 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 19 Sep 2017 19:47:47 GMT
server
sffe
age
32723
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=43200
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="39,38,37,35",quic=":443"; ma=2592000; v="39,38,37,35"
content-length
125
x-xss-protection
1; mode=block
expires
Wed, 20 Sep 2017 19:35:19 GMT
serve.js.php
trends.revcontent.com/
3 KB
1 KB
Script
General
Full URL
https://trends.revcontent.com/serve.js.php?w=3420&t=rc_85&c=1505925642819&width=1600&referer=
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.229.214.110 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-229-214-110.eu-west-1.compute.amazonaws.com
Software
Apache/2.4.18 (Ubuntu) /
Resource Hash
ae4fa85b2598ee5449b270ee4a8995a73613a5ee0eb35fd8dcd2ecdb1718f9dc

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

Date
Wed, 20 Sep 2017 16:40:42 GMT
Content-Encoding
gzip
Server
Apache/2.4.18 (Ubuntu)
Vary
Accept-Encoding
Content-Type
text/html; charset=UTF-8
Access-Control-Allow-Origin
https://www.hackread.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
1193
sdk.js
connect.facebook.net/en_US/
202 KB
62 KB
Script
General
Full URL
https://connect.facebook.net/en_US/sdk.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
f0b6fd2af2a03ff3fed6c9b261a9a62161319851ae6d2859539f99fc9295236e
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' fbstatic-a.akamaihd.net fbcdn-static-b-a.akamaihd.net *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* *.akamaihd.net wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=15552000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

strict-transport-security
max-age=15552000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
06VYdYl2+Ez6TXAUgQ4EhA==
status
200
content-length
63849
x-xss-protection
0
x-fb-debug
fEjS62mdUNZdYm4bh7eKV/Mz4QEEKVSbQeuuJilQeEdW05ZMRV1OeAwA4Rgioyb2zHVXHABLVqP+kksRUq0LQw==
x-fb-content-md5
867bf15c5243971945a7eb047d23230f
x-frame-options
DENY
date
Wed, 20 Sep 2017 16:40:42 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
access-control-expose-headers
X-FB-Content-MD5
cache-control
public,max-age=1200,stale-while-revalidate=3600
etag
"ab4f72c1d17cb30b16349406b362fb56"
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' fbstatic-a.akamaihd.net fbcdn-static-b-a.akamaihd.net *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* *.akamaihd.net wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
timing-allow-origin
*
expires
Wed, 20 Sep 2017 16:57:18 GMT
page.php
www.facebook.com/plugins/ Frame 2791
0
0

collect
stats.g.doubleclick.net/r/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j62&a=816181966&t=pageview&_s=1&dl=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&ul=en-us&de=UTF-8...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-36230183-1&cid=1304377876.1505925643&jid=358735251&_gid=1552841972.1505925643&gjid=505929254&_v=j62&z=512351035
35 B
53 B
Image
General
Full URL
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-36230183-1&cid=1304377876.1505925643&jid=358735251&_gid=1552841972.1505925643&gjid=505929254&_v=j62&z=512351035
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:400c:c09::9d , Ireland, ASN15169 (GOOGLE - Google Inc., US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

pragma
no-cache
strict-transport-security
max-age=10886400; includeSubDomains; preload
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
date
Wed, 20 Sep 2017 16:40:42 GMT
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="39,38,37,35"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 20 Sep 2017 16:40:42 GMT
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
302
location
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-36230183-1&cid=1304377876.1505925643&jid=358735251&_gid=1552841972.1505925643&gjid=505929254&_v=j62&z=512351035
content-type
text/html; charset=UTF-8
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="39,38,37,35"
content-length
417
expires
Fri, 01 Jan 1990 00:00:00 GMT
essb-core.min.js
www.hackread.com/wp-content/plugins/easy-social-share-buttons3/assets/js/
24 KB
6 KB
Script
General
Full URL
https://www.hackread.com/wp-content/plugins/easy-social-share-buttons3/assets/js/essb-core.min.js?x62286
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
03e5ef7c1cda84ba04d804a771e68084162835de24d14a83d5fc98f73bab64ca
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
6088
x-xss-protection
1; mode=block
pragma
public
last-modified
Tue, 19 Sep 2017 16:52:25 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
easy-social-share-buttons.min.js
www.hackread.com/wp-content/plugins/easy-social-share-buttons3/assets/js/
7 KB
2 KB
Script
General
Full URL
https://www.hackread.com/wp-content/plugins/easy-social-share-buttons3/assets/js/easy-social-share-buttons.min.js?x62286
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
e595f77d1de56a1982343c2b50213025910e6ac05694403c1cdb03532d6fe52e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-sucuri-cache
HIT
content-length
2276
x-xss-protection
1; mode=block
pragma
public
last-modified
Sat, 19 Aug 2017 12:28:38 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=315360000
x-sucuri-id
15013
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:55:55 GMT
fontawesome-webfont.woff2
www.hackread.com/wp-content/plugins/g1-socials/css/font-awesome/fonts/
65 KB
65 KB
Font
General
Full URL
https://www.hackread.com/wp-content/plugins/g1-socials/css/font-awesome/fonts/fontawesome-webfont.woff2?v=4.5.0
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/wp-content/themes/hackread_v2/nprogress.js?x62286&ver=4.8.2
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
ff82aeed6b9bb6701696c84d1b223d2e682eb78c89117a438ce6cfea8c498995
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36
Referer
https://www.hackread.com/wp-content/plugins/g1-socials/css/font-awesome/css/font-awesome.min.css?x62286&ver=4.8.2
Origin
https://www.hackread.com

Response headers

pragma
public
date
Wed, 20 Sep 2017 16:40:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
nginx
x-frame-options
SAMEORIGIN
content-type
application/font-woff2
status
200
x-sucuri-cache
HIT
cache-control
max-age=315360000
x-sucuri-id
15013
vary
Accept-Encoding
x-xss-protection
1; mode=block
expires
Thu, 31 Dec 2037 23:55:55 GMT
/
www.facebook.com/impression.php/f2ea672c7e5d8e8/
43 B
66 B
Image
General
Full URL
https://www.facebook.com/impression.php/f2ea672c7e5d8e8/?api_key=307380646093090&lid=115&payload=%7B%22source%22%3A%22jssdk%22%7D
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' fbstatic-a.akamaihd.net fbcdn-static-b-a.akamaihd.net *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* *.akamaihd.net wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' fbstatic-a.akamaihd.net fbcdn-static-b-a.akamaihd.net *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* *.akamaihd.net wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
x-xss-protection
0
pragma
no-cache
x-fb-debug
7ikkGRtzWQP33yiqzmu0oc1VH6ITRdOM7wUg2ktBfpbHH1EbHsIeqotfTY7zzCw4gA1QlfAjC4xgZ1arnb21MQ==
date
Wed, 20 Sep 2017 16:40:43 GMT
strict-transport-security
max-age=15552000; preload
public-key-pins-report-only
max-age=600; pin-sha256="WoiWRyIOVNa9ihaBciRSC7XHjliYS9VwUGOIud4PB18="; pin-sha256="k2v657xBsOVe1PQRwOsHsw3bsGT2VzIqz5K+59sNQws="; pin-sha256="PZXN3lRAy+8tBKk2Ox6F7jIlnzr2Yzmwqc3JnyfXoCw="; pin-sha256="q4PO2G2cbkZhZ82+JgmRUyGMoAeozA+BSXVXQWB8XWQ="; report-uri="http://reports.fb.com/hpkp/"
access-control-allow-origin
https://www.facebook.com
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
private, no-cache, no-store, must-revalidate
access-control-allow-credentials
true
content-type
image/gif
access-control-allow-method
OPTIONS
expires
Sat, 01 Jan 2000 00:00:00 GMT
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20170913/r20170110/ Frame 2791
0
0

ads
googleads.g.doubleclick.net/pagead/ Frame 2791
0
0

osd.js
pagead2.googlesyndication.com/pagead/js/r20170913/r20170110/
76 KB
28 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20170913/r20170110/osd.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20170913/r20170110/show_ads_impl_single_load.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81d::2002 , Ireland, ASN15169 (GOOGLE - Google Inc., US),
Reverse DNS
Software
cafe /
Resource Hash
d90ac6f212959c9cc3d6a339fd6a97b91bc71bb5ee2d61ec707bdd874d306cff
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Thu, 14 Sep 2017 07:12:56 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
552467
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="39,38,37,35",quic=":443"; ma=2592000; v="39,38,37,35"
content-length
28644
x-xss-protection
1; mode=block
server
cafe
etag
15523572733375803017
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Thu, 28 Sep 2017 07:12:56 GMT
publishertag.js
static.criteo.net/js/ld/
59 KB
17 KB
Script
General
Full URL
https://static.criteo.net/js/ld/publishertag.js
Requested by
Host: trends.revcontent.com
URL: https://trends.revcontent.com/serve.js.php?w=3420&t=rc_85&c=1505925642819&width=1600&referer=
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_CBC
Server
178.250.2.74 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
static.criteo.net
Software
nginx /
Resource Hash
cbfd623eb37b983ba0603f95ea452cba0cb5ab859e84cdb1bfebbc0af86da09a

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

Date
Wed, 20 Sep 2017 16:40:43 GMT
Content-Encoding
gzip
Last-Modified
Wed, 19 Sep 2007 08:50:25 GMT
Server
nginx
ETag
W/"59b7a500-eb07"
Transfer-Encoding
chunked
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=86400, public
Connection
keep-alive
Timing-Allow-Origin
*
Expires
Thu, 21 Sep 2017 16:40:43 GMT
5oivrH7Newv.js
staticxx.facebook.com/connect/xd_arbiter/r/ Frame 2791
0
0

zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20170913/r20170110/ Frame 2791
0
0

ads
googleads.g.doubleclick.net/pagead/ Frame 2791
0
0

zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20170913/r20170110/ Frame 2791
0
0

ads
googleads.g.doubleclick.net/pagead/ Frame 2791
0
0

zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20170913/r20170110/ Frame 2791
0
0

ads
googleads.g.doubleclick.net/pagead/ Frame 2791
0
0

zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20170913/r20170110/ Frame 2791
0
0

ads
googleads.g.doubleclick.net/pagead/ Frame 2791
0
0

zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20170913/r20170110/ Frame 2791
0
0

ads
googleads.g.doubleclick.net/pagead/ Frame 2791
0
0

cdb
bidder.criteo.com/
0
0
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=26&profileId=184&cb=51872831345
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_CBC
Server
178.250.0.93 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Origin
https://www.hackread.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

Access-Control-Allow-Origin
https://www.hackread.com
Date
Wed, 20 Sep 2017 16:40:43 GMT
X-Cnection
close
Access-Control-Allow-Credentials
true
Server
Finatra
Content-Length
0
Vary
Origin
serve.js.php
trends.revcontent.com/
50 KB
50 KB
XHR
General
Full URL
https://trends.revcontent.com/serve.js.php?w=3420&t=rc_85&c=1505925642819&width=1600&referer=
Requested by
Host: trends.revcontent.com
URL: https://trends.revcontent.com/serve.js.php?w=3420&t=rc_85&c=1505925642819&width=1600&referer=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.229.214.110 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-229-214-110.eu-west-1.compute.amazonaws.com
Software
Apache/2.4.18 (Ubuntu) /
Resource Hash
a4a42351658b88c4af438fa316753601bcfe6c7c66c5945166b4305ebc5066dd

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Origin
https://www.hackread.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Date
Wed, 20 Sep 2017 16:40:43 GMT
Server
Apache/2.4.18 (Ubuntu)
transfer-encoding
chunked
P3P
CP="NOI DSP COR NID ADM DEV OUR NOR CNT"
Access-Control-Allow-Origin
https://www.hackread.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript; charset=utf-8
rev2.min.css
cdn.revcontent.com/build/css/
28 KB
5 KB
Stylesheet
General
Full URL
https://cdn.revcontent.com/build/css/rev2.min.css?v=a84f9ab7cc9f9c6c31342517f5ee8791e44bfb15
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.216.42 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
00f93e1c78bf6f2fc0ea203652c4b3ef24f4089c711a304e150d1db0d59191b5

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

Date
Wed, 20 Sep 2017 16:40:43 GMT
Content-Encoding
gzip
Last-Modified
Wed, 13 Sep 2017 16:43:50 GMT
ETag
1505321030
X-HW
1505925643.dop007.fr7.t,1505925643.cds061.fr7.shn,1505925643.dop007.fr7.t,1505925643.cds011.fr7.c
Content-Type
text/css
Cache-Control
max-age=80396
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5
Content-Length
5387
rev2.min.js
cdn.revcontent.com/build/js/
222 KB
62 KB
Script
General
Full URL
https://cdn.revcontent.com/build/js/rev2.min.js?v=a84f9ab7cc9f9c6c31342517f5ee8791e44bfb15&del=//trends.revcontent.com/&lg=//cdn.revcontent.com/assets/img/rc-logo.png&ci=//cdn.revcontent.com/assets/img/icon-close.png&ab=//trends.revcontent.com/rc-about.php&ldr=//cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=//trends.revcontent.com/rc-interests.php
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.216.42 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
c197523482537fccaabc64eba90234adb7570580e5b834e4a0ac04705989b2b3

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

Date
Wed, 20 Sep 2017 16:40:43 GMT
Content-Encoding
gzip
Last-Modified
Wed, 13 Sep 2017 16:43:50 GMT
ETag
1505321030
X-HW
1505925643.dop007.fr7.t,1505925643.cds074.fr7.shn,1505925643.dop007.fr7.t,1505925643.cds009.fr7.c
Content-Type
application/javascript
Cache-Control
max-age=78106
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5
Content-Length
63847
beacon.js
sb.scorecardresearch.com/
1 KB
901 B
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
172.227.124.249 Cambridge, United States, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a172-227-124-249.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d0fd74148f4cbe78bd0e6328dc5ce5955f0a0ecdb1eb2919da4a7e596ac65912

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

Date
Wed, 20 Sep 2017 16:40:43 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=1209600
Connection
keep-alive
Content-Length
901
Expires
Wed, 04 Oct 2017 16:40:43 GMT
quant.js
secure.quantserve.com/
11 KB
5 KB
Script
General
Full URL
https://secure.quantserve.com/quant.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
95.172.94.14 , United Kingdom, ASN27281 (QUANTCAST - Quantcast Corporation, US),
Reverse DNS
pixel.quantserve.com
Software
QS /
Resource Hash
b0cd4868fc6adf950cf774a6c42e15f3a7f4e6f3bb9c45798417a5a352c8734c

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

Date
Wed, 20 Sep 2017 16:40:43 GMT
Content-Encoding
gzip
Last-Modified
Wed, 20-Sep-2017 16:40:43 GMT
Server
QS
ETag
M0-89ff4ba8
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=604800
Connection
close
Content-Length
4773
Expires
Wed, 27 Sep 2017 16:40:43 GMT
pixel_sync
cm.revcontent.com/
Redirect Chain
  • https://bttrack.com/pixel/cookiesync?source=0b0edea9-c9fe-4b9c-9bcd-a51022f2873f&publisherid=N2IxMTM5OGQ5N2RiZjFhMzMxY2Q2MTFjMWZhMWIyMWE=&pushdata=109&secure=1
  • https://cm.revcontent.com/pixel_sync?bidder=109&bidder_uid=25f13e92-d7da-44c2-b160-f8d754875349&exchange_uid=N2IxMTM5OGQ5N2RiZjFhMzMxY2Q2MTFjMWZhMWIyMWE=
35 B
35 B
Image
General
Full URL
https://cm.revcontent.com/pixel_sync?bidder=109&bidder_uid=25f13e92-d7da-44c2-b160-f8d754875349&exchange_uid=N2IxMTM5OGQ5N2RiZjFhMzMxY2Q2MTFjMWZhMWIyMWE=
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.248.43.189 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-248-43-189.eu-west-1.compute.amazonaws.com
Software
/ Express
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

Date
Wed, 20 Sep 2017 16:40:44 GMT
Connection
keep-alive
X-Powered-By
Express
Content-Length
35
Content-Type
image/gif

Redirect headers

X-ServerName
NLB1
Pragma
no-cache
Date
Wed, 20 Sep 2017 16:40:37 GMT
X-AspNetMvc-Version
5.2
Server
Microsoft-IIS/8.5
X-AspNet-Version
4.0.30319
P3P
policyref="http://www.bidtellect.com/w3c/p3p.xml", CP="CAO DSP COR ADMo DEVo PSAo PSDo HISo IVAo IVDo OUR IND OTC"
Location
https://cm.revcontent.com/pixel_sync?bidder=109&bidder_uid=25f13e92-d7da-44c2-b160-f8d754875349&exchange_uid=N2IxMTM5OGQ5N2RiZjFhMzMxY2Q2MTFjMWZhMWIyMWE=
Cache-Control
private,no-cache
Content-Type
text/html; charset=utf-8
Content-Length
278
Expires
-1
pixel_sync
cm.revcontent.com/
Redirect Chain
  • https://t.cwkuki.com/cs/D8f2l?u=N2IxMTM5OGQ5N2RiZjFhMzMxY2Q2MTFjMWZhMWIyMWE=
  • https://cm.revcontent.com/pixel_sync?exchange_uid=N2IxMTM5OGQ5N2RiZjFhMzMxY2Q2MTFjMWZhMWIyMWE%3D&bidder=112&bidder_uid=720f9530-9e22-11e7-b7a0-0242ac110003
35 B
35 B
Image
General
Full URL
https://cm.revcontent.com/pixel_sync?exchange_uid=N2IxMTM5OGQ5N2RiZjFhMzMxY2Q2MTFjMWZhMWIyMWE%3D&bidder=112&bidder_uid=720f9530-9e22-11e7-b7a0-0242ac110003
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.248.43.189 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-248-43-189.eu-west-1.compute.amazonaws.com
Software
/ Express
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

Date
Wed, 20 Sep 2017 16:40:44 GMT
Connection
keep-alive
X-Powered-By
Express
Content-Length
35
Content-Type
image/gif

Redirect headers

Location
https://cm.revcontent.com/pixel_sync?exchange_uid=N2IxMTM5OGQ5N2RiZjFhMzMxY2Q2MTFjMWZhMWIyMWE%3D&bidder=112&bidder_uid=720f9530-9e22-11e7-b7a0-0242ac110003
Date
Wed, 20 Sep 2017 16:40:43 GMT
Server
Jetty(9.4.2.v20170220)
Connection
keep-alive
Content-Length
0
X-Application-Context
application
Expires
Thu, 01 Jan 1970 00:00:00 GMT
p-aD1qr93XuF6aC.gif
pixel.quantserve.com/pixel/
35 B
35 B
Image
General
Full URL
https://pixel.quantserve.com/pixel/p-aD1qr93XuF6aC.gif?labels=Publishers.Publisher-2129,Widgets.Widget-3420
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
95.172.94.22 , United Kingdom, ASN27281 (QUANTCAST - Quantcast Corporation, US),
Reverse DNS
pixel.quantserve.com
Software
QS /
Resource Hash
a0d3a0aff7dc3bf32d2176fc3dcda6e7aba2867c4f4d1f7af6355d2cfc6c44f8

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 20 Sep 2017 16:40:43 GMT
Server
QS
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAo PSDo OUR SAMa IND COM NAV"
Cache-Control
private, no-cache, no-store, proxy-revalidate
Connection
close
Content-Type
image/gif
Content-Length
35
Expires
Fri, 04 Aug 1978 12:00:00 GMT
/
img.revcontent.com/
43 KB
43 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/1503500689.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
1358783f9f4e15029a0cda21669e63131b7ab7699da8e3a10e79e54903ca9224

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

Date
Wed, 20 Sep 2017 16:40:43 GMT
Last-Modified
Wed, 23 Aug 2017 15:04:50 GMT
ETag
1503500690
X-HW
1505925643.dop004.fr7.t,1505925643.cds041.fr7.shn,1505925643.dop004.fr7.t,1505925643.cds061.fr7.c
Content-Type
image/jpeg
Cache-Control
max-age=1736
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5
Content-Length
44525
/
img.revcontent.com/
40 KB
40 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/1490274431.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
61c94b84ca9cbc724b114ddce749ca1377e8f6581c43f526a57d819015e75543

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

Date
Wed, 20 Sep 2017 16:40:43 GMT
Last-Modified
Thu, 23 Mar 2017 13:07:12 GMT
ETag
1490274432
X-HW
1505925643.dop008.fr7.t,1505925643.cds011.fr7.shn,1505925643.dop008.fr7.t,1505925643.cds068.fr7.c
Content-Type
image/jpeg
Cache-Control
max-age=1853
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5
Content-Length
40777
/
img.revcontent.com/
40 KB
40 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/1496130002.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
5527ef3b8718a57330a8da528263f34256d97d830d89d4ef6bdfa76bb6a2c2c8

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

Date
Wed, 20 Sep 2017 16:40:43 GMT
Last-Modified
Tue, 30 May 2017 07:40:03 GMT
ETag
1496130003
X-HW
1505925643.dop008.fr7.t,1505925643.cds011.fr7.shn,1505925643.dop008.fr7.t,1505925643.cds038.fr7.c
Content-Type
image/jpeg
Cache-Control
max-age=8021
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5
Content-Length
40692
/
img.revcontent.com/
24 KB
24 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/1500614088.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.216.42 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
94dda9bd853ed0673c0eb793a4c8c3ede72e178879ad1249263776be9ea09e94

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

Date
Wed, 20 Sep 2017 16:40:43 GMT
Last-Modified
Fri, 21 Jul 2017 05:14:49 GMT
ETag
1500614089
X-HW
1505925643.dop008.fr7.t,1505925643.cds007.fr7.shn,1505925643.dop008.fr7.t,1505925643.cds030.fr7.sr,1505925643.dop002.ny2.r,1505925643.cds010.ny2.c,1505925643.cds030.fr7.pr
Content-Type
image/jpeg
Cache-Control
max-age=86394
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5
Content-Length
24294
/
img.revcontent.com/
27 KB
27 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-production.s3.amazonaws.com/content/images/1454791262.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
863fdf3f718f50f733da84e6a7727a580b3173b0a780e1aa94e87a3670319907

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

Date
Wed, 20 Sep 2017 16:40:43 GMT
Last-Modified
Sat, 06 Feb 2016 20:41:03 GMT
ETag
1454791263
X-HW
1505925643.dop008.fr7.t,1505925643.cds011.fr7.shn,1505925643.dop008.fr7.t,1505925643.cds045.fr7.c
Content-Type
image/jpeg
Cache-Control
max-age=72513
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5
Content-Length
27636
/
img.revcontent.com/
32 KB
32 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/1496910578.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
db4974f654798ad51d890c928087241c6cd3707db30f94e19401fd3d9e42c453

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

Date
Wed, 20 Sep 2017 16:40:43 GMT
Last-Modified
Thu, 08 Jun 2017 08:29:39 GMT
ETag
1496910579
X-HW
1505925643.dop004.fr7.t,1505925643.cds041.fr7.shn,1505925643.dop004.fr7.t,1505925643.cds060.fr7.c
Content-Type
image/jpeg
Cache-Control
max-age=53651
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5
Content-Length
32848
/
img.revcontent.com/
41 KB
41 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/1495104684.png&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
a6cff8efce10395c4115de0c21a31ede3adf16f2df78ed1c09856876b44ec98e

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

Date
Wed, 20 Sep 2017 16:40:43 GMT
Last-Modified
Thu, 18 May 2017 10:51:25 GMT
ETag
1495104685
X-HW
1505925643.dop008.fr7.t,1505925643.cds011.fr7.shn,1505925643.dop008.fr7.t,1505925643.cds020.fr7.c
Content-Type
image/jpeg
Cache-Control
max-age=86400
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5
Content-Length
42295
/
img.revcontent.com/
24 KB
24 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/1496652549.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
6ac8b4f4d95ac6b7442b0670084218818dec76b427554e2e5f6065108172d540

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

Date
Wed, 20 Sep 2017 16:40:43 GMT
Last-Modified
Mon, 05 Jun 2017 08:49:10 GMT
ETag
1496652550
X-HW
1505925643.dop008.fr7.t,1505925643.cds011.fr7.shn,1505925643.dop008.fr7.t,1505925643.cds022.fr7.c
Content-Type
image/jpeg
Cache-Control
max-age=40703
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5
Content-Length
24695
/
img.revcontent.com/
34 KB
34 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/p0/assets/content_images/emb/d767e638c822b9a4a434abfd7e753fd1-0.png&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.216.42 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
ac2daa6df1db52f07206de585183d81427245da81965744350e6216eee7c4410

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

Date
Wed, 20 Sep 2017 16:40:43 GMT
Last-Modified
Fri, 21 Jul 2017 12:29:36 GMT
ETag
1500640176
X-HW
1505925643.dop008.fr7.t,1505925643.cds007.fr7.shn,1505925643.dop008.fr7.t,1505925643.cds061.fr7.c
Content-Type
image/jpeg
Cache-Control
max-age=11626
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5
Content-Length
34660
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=7&c2=20310460&c3=12345&ns__t=1505925643437&ns_c=UTF-8&cv=3.1&c8=The%20Pirate%20Bay%20Caught%20Running%20Cryptocurrency%20Mining%20Script&c7=https%3A%2F%2Fwww.h...
  • https://sb.scorecardresearch.com/b2?c1=7&c2=20310460&c3=12345&ns__t=1505925643437&ns_c=UTF-8&cv=3.1&c8=The%20Pirate%20Bay%20Caught%20Running%20Cryptocurrency%20Mining%20Script&c7=https%3A%2F%2Fwww....
0
0
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=7&c2=20310460&c3=12345&ns__t=1505925643437&ns_c=UTF-8&cv=3.1&c8=The%20Pirate%20Bay%20Caught%20Running%20Cryptocurrency%20Mining%20Script&c7=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&c9=
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
172.227.124.249 Cambridge, United States, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a172-227-124-249.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 20 Sep 2017 16:40:43 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=7&c2=20310460&c3=12345&ns__t=1505925643437&ns_c=UTF-8&cv=3.1&c8=The%20Pirate%20Bay%20Caught%20Running%20Cryptocurrency%20Mining%20Script&c7=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&c9=
Pragma
no-cache
Date
Wed, 20 Sep 2017 16:40:43 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
rules-p-aD1qr93XuF6aC.js
rules.quantcount.com/
3 B
21 B
Script
General
Full URL
https://rules.quantcount.com/rules-p-aD1qr93XuF6aC.js
Requested by
Host: secure.quantserve.com
URL: https://secure.quantserve.com/quant.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:201c:f200:6:44e3:f8c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Mon, 07 Aug 2017 07:00:10 GMT
via
1.1 64fc1ccc427044d03aa5724d4825ec8f.cloudfront.net (CloudFront)
last-modified
Sat, 04 Mar 2017 20:46:24 GMT
server
AmazonS3
age
42606
etag
"8a80554c91d9fca8acb82f023de02f11"
x-cache
Hit from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=86400
accept-ranges
bytes
content-length
3
x-amz-cf-id
3KEwEafiSlVavdx-0D_OK_8eamfrEzVZ0yPk8PivlbhzAJHK1flLGQ==
seg.php
trends.revcontent.com/
61 B
61 B
Script
General
Full URL
https://trends.revcontent.com/seg.php?callback=jQuery1102032305740965361696_1505925643495&widgets=425%7C2129&creatives=&_=1505925643496
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=a84f9ab7cc9f9c6c31342517f5ee8791e44bfb15&del=//trends.revcontent.com/&lg=//cdn.revcontent.com/assets/img/rc-logo.png&ci=//cdn.revcontent.com/assets/img/icon-close.png&ab=//trends.revcontent.com/rc-about.php&ldr=//cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=//trends.revcontent.com/rc-interests.php
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.229.214.110 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-229-214-110.eu-west-1.compute.amazonaws.com
Software
Apache/2.4.18 (Ubuntu) /
Resource Hash
8d7976141d469ae3c02484964555e1e7cf2666b01dc003198fc23b79dc7a2db9

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

Date
Wed, 20 Sep 2017 16:40:43 GMT
Server
Apache/2.4.18 (Ubuntu)
P3P
CP="NOI DSP COR NID ADM DEV OUR NOR CNT"
Access-Control-Allow-Origin
https://www.hackread.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=UTF-8
Content-Length
61
pixel;r=752527617;labels=Publishers.Publisher-2129%2CWidgets.Widget-3420;rf=0;a=p-aD1qr93XuF6aC;url=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F;fp...
pixel.quantserve.com/
35 B
35 B
Image
General
Full URL
https://pixel.quantserve.com/pixel;r=752527617;labels=Publishers.Publisher-2129%2CWidgets.Widget-3420;rf=0;a=p-aD1qr93XuF6aC;url=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F;fpan=1;fpa=P0-729522145-1505925643746;ns=0;ce=1;cm=;ref=;je=0;sr=1600x1200x24;enc=n;dst=0;et=1505925643745;tzo=0;ogl=locale.en_US%2Ctype.article%2Ctitle.The%20Pirate%20Bay%20Caught%20Running%20Cryptocurrency%20Mining%20Script%2Cdescription.In%202015%252C%20it%20was%20reported%20that%20uTorrent%20was%20secretly%20installing%20Epic%20Scale%20Bitcoi%2Curl.https%3A%2F%2Fwww%252Ehackread%252Ecom%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-scr%2Csite_name.HackRead%2Cupdated_time.2017-09-17T23%3A15%3A28%2B02%3A00%2Cimage.https%3A%2F%2Fwww%252Ehackread%252Ecom%2Fwp-content%2Fuploads%2F2017%2F09%2Fthe-pirate-bay-caught-runnin%2Cimage%3Asecure_url.https%3A%2F%2Fwww%252Ehackread%252Ecom%2Fwp-content%2Fuploads%2F2017%2F09%2Fthe-pirate-bay-caught-runnin%2Cimage%3Awidth.760%2Cimage%3Aheight.421
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
95.172.94.61 , United Kingdom, ASN27281 (QUANTCAST - Quantcast Corporation, US),
Reverse DNS
pixel.quantserve.com
Software
QS /
Resource Hash
a0d3a0aff7dc3bf32d2176fc3dcda6e7aba2867c4f4d1f7af6355d2cfc6c44f8

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 20 Sep 2017 16:40:43 GMT
Server
QS
Content-Type
image/gif
Cache-Control
private, no-cache, no-store, proxy-revalidate
Connection
close
Content-Length
35
Expires
Fri, 04 Aug 1978 12:00:00 GMT
admin-ajax.php
www.hackread.com/wp-admin/
2 B
31 B
XHR
General
Full URL
https://www.hackread.com/wp-admin/admin-ajax.php
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
Security Headers
Name Value
X-Content-Type-Options nosniff, nosniff
X-Frame-Options SAMEORIGIN, SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
*/*
Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
Origin
https://www.hackread.com
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Wed, 20 Sep 2017 16:40:44 GMT
content-encoding
gzip
x-content-type-options
nosniff, nosniff
status
200
content-length
22
x-xss-protection
1; mode=block
server
nginx
x-frame-options
SAMEORIGIN, SAMEORIGIN
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
access-control-allow-origin
https://www.hackread.com
cache-control
no-cache, must-revalidate, max-age=0
access-control-allow-credentials
true
x-sucuri-id
15013
x-robots-tag
noindex
expires
Wed, 11 Jan 1984 05:00:00 GMT
5oivrH7Newv.js
staticxx.facebook.com/connect/xd_arbiter/r/ Frame 2791
Redirect Chain
  • https://www.facebook.com/connect/ping?client_id=307380646093090&domain=www.hackread.com&origin=1&redirect_uri=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter%2Fr%2F5oivrH7Newv.js%3Fversi...
  • https://staticxx.facebook.com/connect/xd_arbiter/r/5oivrH7Newv.js?version=42
0
0

feedback.php
www.facebook.com/plugins/ Frame 2791
Redirect Chain
  • https://www.facebook.com/plugins/comments.php?api_key=307380646093090&channel_url=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter%2Fr%2F5oivrH7Newv.js%3Fversion%3D42%23cb%3Df1d9c56c6935d...
  • https://www.facebook.com/plugins/feedback.php?api_key=307380646093090&channel_url=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter%2Fr%2F5oivrH7Newv.js%3Fversion%3D42%23cb%3Df1d9c56c6935d...
0
0

/
www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
48 KB
12 KB
XHR
General
Full URL
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/?mashsb-refresh
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/wp-content/plugins/mashsharer/assets/js/mashsb.min.js?x62286&ver=3.4.5
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.124.249.13 , United States, ASN30148 (SUCURI-SEC - Sucuri, US),
Reverse DNS
cloudproxy10013.sucuri.net
Software
nginx /
Resource Hash
5477b0e09b4fbb570aabb7678c1fcb81ffef8654a59a4fe391cf9b01fb115dfc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.hackread.com/the-pirate-bay-caught-running-cryptocurrency-mining-script/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/60.0.3112.113 Safari/537.36

Response headers

date
Wed, 20 Sep 2017 16:40:48 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
nginx
link
<https://www.hackread.com/wp-json/>; rel="https://api.w.org/", <https://www.hackread.com/?p=57543>; rel=shortlink
x-frame-options
SAMEORIGIN
content-type
text/html; charset=UTF-8
status
200
x-sucuri-cache
HIT
cache-control
max-age=2592000
x-sucuri-id
15013
vary
Accept-Encoding
content-length
12354
x-xss-protection
1; mode=block
expires
Fri, 20 Oct 2017 12:20:32 GMT

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
www.facebook.com
URL
https://www.facebook.com/plugins/page.php?href=https%3A%2F%2Fwww.facebook.com%2Fhackread&tabs&width=300&height=214&small_header=false&adapt_container_width=true&hide_cover=false&show_facepile=true&appId=307380646093090
Domain
googleads.g.doubleclick.net
URL
https://googleads.g.doubleclick.net/pagead/html/r20170913/r20170110/zrt_lookup.html
Domain
googleads.g.doubleclick.net
URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&format=1200x90&output=html&h=90&slotname=6531121012&adk=2177998239&adf=383480478&w=1200&lmt=1505912387&rafmt=1&flash=0&fwr=0&url=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&resp_fmts=3&wgl=1&dt=1505925642789&bpp=9&bdt=159&fdt=213&idt=230&shv=r20170913&cbv=r20170110&saldr=aa&correlator=5510937746544&frm=20&ga_vid=1304377876.1505925643&ga_sid=1505925643&ga_hid=816181966&ga_fc=0&pv=2&iag=3&icsg=0&nhd=1&dssz=2&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=193&ady=220&biw=1585&bih=1200&abxe=1&eid=21060868&oid=3&rx=0&eae=0&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeE%7C&abl=CS&ppjl=u&pfx=0&fu=144&bc=1&ifi=1&xpc=D2rxcLPtdN&p=https%3A//www.hackread.com&dtd=252
Domain
staticxx.facebook.com
URL
https://staticxx.facebook.com/connect/xd_arbiter/r/5oivrH7Newv.js?version=42
Domain
googleads.g.doubleclick.net
URL
https://googleads.g.doubleclick.net/pagead/html/r20170913/r20170110/zrt_lookup.html
Domain
googleads.g.doubleclick.net
URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&format=870x90_0ads_al&output=html&h=90&slotname=7661928216&adk=1417474520&adf=3173364508&w=870&lmt=1505912387&rafmt=10&flash=0&url=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&wgl=1&dt=1505925642798&bpp=5&bdt=168&fdt=255&idt=256&shv=r20170913&cbv=r20170110&saldr=aa&prev_fmts=1200x90&correlator=5510937746544&frm=20&ga_vid=1304377876.1505925643&ga_sid=1505925643&ga_hid=816181966&ga_fc=0&pv=1&iag=3&icsg=0&nhd=1&dssz=2&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=208&ady=1072&biw=1585&bih=1200&abxe=1&eid=21060868&oid=3&rx=0&eae=0&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeE%7C&abl=CS&ppjl=u&pfx=0&fu=144&bc=1&ifi=2&xpc=83EHeZoiFF&p=https%3A//www.hackread.com&dtd=263
Domain
googleads.g.doubleclick.net
URL
https://googleads.g.doubleclick.net/pagead/html/r20170913/r20170110/zrt_lookup.html
Domain
googleads.g.doubleclick.net
URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&format=870x90_0ads_al&output=html&h=90&slotname=7661928216&adk=1417474520&adf=2691581091&w=870&lmt=1505912387&rafmt=10&flash=0&url=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&wgl=1&dt=1505925642803&bpp=4&bdt=173&fdt=270&idt=271&shv=r20170913&cbv=r20170110&saldr=aa&prev_fmts=1200x90%2C870x90_0ads_al&correlator=5510937746544&frm=20&ga_vid=1304377876.1505925643&ga_sid=1505925643&ga_hid=816181966&ga_fc=0&pv=1&iag=3&icsg=0&nhd=1&dssz=2&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=208&ady=1827&biw=1585&bih=1200&abxe=1&eid=21060868&oid=3&rx=0&eae=0&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=144&bc=1&ifi=3&xpc=aLyYvoRxxO&p=https%3A//www.hackread.com&dtd=281
Domain
googleads.g.doubleclick.net
URL
https://googleads.g.doubleclick.net/pagead/html/r20170913/r20170110/zrt_lookup.html
Domain
googleads.g.doubleclick.net
URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&format=840x90&output=html&h=90&slotname=1775509853&adk=3550985017&adf=1778294127&w=840&lmt=1505912387&rafmt=1&flash=0&fwr=0&url=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&resp_fmts=3&wgl=1&dt=1505925642807&bpp=4&bdt=177&fdt=291&idt=292&shv=r20170913&cbv=r20170110&saldr=aa&prev_fmts=1200x90%2C870x90_0ads_al%2C870x90_0ads_al&correlator=5510937746544&frm=20&ga_vid=1304377876.1505925643&ga_sid=1505925643&ga_hid=816181966&ga_fc=0&pv=1&iag=3&icsg=0&nhd=1&dssz=2&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=223&ady=2672&biw=1585&bih=1200&abxe=1&eid=21060868&oid=3&rx=0&eae=0&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CleEbr%7C&abl=CS&ppjl=u&pfx=0&fu=144&bc=1&ifi=4&xpc=jtVeazBoxB&p=https%3A//www.hackread.com&dtd=302
Domain
googleads.g.doubleclick.net
URL
https://googleads.g.doubleclick.net/pagead/html/r20170913/r20170110/zrt_lookup.html
Domain
googleads.g.doubleclick.net
URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&format=300x600&output=html&h=600&slotname=3047884612&adk=2552215354&adf=1570668977&w=300&lmt=1505912387&flash=0&url=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&wgl=1&dt=1505925642860&bpp=5&bdt=230&fdt=274&idt=275&shv=r20170913&cbv=r20170110&saldr=aa&prev_fmts=1200x90%2C870x90_0ads_al%2C870x90_0ads_al%2C840x90&correlator=5510937746544&frm=20&ga_vid=1304377876.1505925643&ga_sid=1505925643&ga_hid=816181966&ga_fc=0&pv=1&iag=3&icsg=0&nhd=1&dssz=2&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1093&ady=1048&biw=1585&bih=1200&abxe=1&eid=21060868&oid=3&rx=0&eae=0&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeE%7C&abl=CS&ppjl=u&pfx=0&fu=16&bc=1&ifi=5&xpc=3dAQtbKKKC&p=https%3A//www.hackread.com&dtd=287
Domain
googleads.g.doubleclick.net
URL
https://googleads.g.doubleclick.net/pagead/html/r20170913/r20170110/zrt_lookup.html
Domain
googleads.g.doubleclick.net
URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&format=300x600&output=html&h=600&slotname=1775509853&adk=347135735&adf=4082040943&w=300&lmt=1505912387&rafmt=1&flash=0&fwr=0&url=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&resp_fmts=4&wgl=1&dt=1505925642865&bpp=5&bdt=235&fdt=298&idt=299&shv=r20170913&cbv=r20170110&saldr=aa&prev_fmts=1200x90%2C870x90_0ads_al%2C870x90_0ads_al%2C840x90%2C300x600&correlator=5510937746544&frm=20&ga_vid=1304377876.1505925643&ga_sid=1505925643&ga_hid=816181966&ga_fc=0&pv=1&iag=3&icsg=0&nhd=1&dssz=2&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1093&ady=1775&biw=1585&bih=1200&abxe=1&eid=21060868&oid=3&rx=0&eae=0&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=144&bc=1&ifi=6&xpc=cphoFDnfDP&p=https%3A//www.hackread.com&dtd=305
Domain
staticxx.facebook.com
URL
https://staticxx.facebook.com/connect/xd_arbiter/r/5oivrH7Newv.js?version=42
Domain
www.facebook.com
URL
https://www.facebook.com/plugins/feedback.php?api_key=307380646093090&channel_url=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter%2Fr%2F5oivrH7Newv.js%3Fversion%3D42%23cb%3Df1d9c56c6935d78%26domain%3Dwww.hackread.com%26origin%3Dhttps%253A%252F%252Fwww.hackread.com%252Ff21a45d5be8a4c%26relation%3Dparent.parent&colorscheme=light&href=https%3A%2F%2Fwww.hackread.com%2Fthe-pirate-bay-caught-running-cryptocurrency-mining-script%2F&locale=en_US&numposts=5&sdk=joey&skin=light&version=v2.3&width=100%25

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

6 Cookies

Domain/Path Name / Value
.doubleclick.net/ Name: DSID
Value: NO_DATA
.doubleclick.net/ Name: test_cookie
Value: CheckForPermission
.hackread.com/ Name: __qca
Value: P0-729522145-1505925643746
.hackread.com/ Name: _gat
Value: 1
.hackread.com/ Name: _gid
Value: GA1.2.1552841972.1505925643
.hackread.com/ Name: _ga
Value: GA1.2.1304377876.1505925643

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

a.impactradius-go.com
ajax.googleapis.com
bidder.criteo.com
bttrack.com
cdn.revcontent.com
cdnjs.cloudflare.com
cm.revcontent.com
connect.facebook.net
fonts.googleapis.com
fonts.gstatic.com
googleads.g.doubleclick.net
img.revcontent.com
incapsula.evyy.net
maxcdn.bootstrapcdn.com
pagead2.googlesyndication.com
pixel.quantserve.com
rules.quantcount.com
sb.scorecardresearch.com
secure.gravatar.com
secure.quantserve.com
static.criteo.net
staticxx.facebook.com
stats.g.doubleclick.net
t.cwkuki.com
trends.revcontent.com
www.facebook.com
www.google-analytics.com
www.hackread.com
www.ojrq.net
googleads.g.doubleclick.net
staticxx.facebook.com
www.facebook.com
172.227.124.249
178.250.0.93
178.250.2.74
192.0.73.2
192.124.249.13
192.132.33.27
198.232.125.123
205.185.216.10
205.185.216.42
2400:cb00:2048:1::6813:c366
2600:9000:201c:f200:6:44e3:f8c0:93a1
2a00:1450:4001:816::2003
2a00:1450:4001:816::200a
2a00:1450:4001:816::200e
2a00:1450:4001:81d::2002
2a00:1450:4001:81e::200a
2a00:1450:400c:c09::9d
2a03:2880:f02d:12:face:b00c:0:3
2a03:2880:f11c:8183:face:b00c:0:25de
34.248.43.189
52.18.15.185
52.210.47.122
52.55.187.233
52.85.93.53
54.229.214.110
94.31.29.55
95.172.94.14
95.172.94.22
95.172.94.61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