Submitted URL: https://www.hackread.com/coronavirus-extort=
Effective URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Submission: On March 25 via api from US

Summary

This website contacted 17 IPs in 5 countries across 20 domains to perform 107 HTTP transactions. The main IP is 67.227.194.195, located in Lansing, United States and belongs to LIQUIDWEB, US. The main domain is www.hackread.com.
TLS certificate: Issued by Let's Encrypt Authority X3 on February 13th 2020. Valid for: 3 months.
This is the only time www.hackread.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 41 67.227.194.195 32244 (LIQUIDWEB)
2 2606:4700::68... 13335 (CLOUDFLAR...)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
3 2a04:fa87:fff... 2635 (AUTOMATTIC)
24 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
7 63.34.125.93 16509 (AMAZON-02)
2 2 70.42.32.95 22075 (AS-OUTBRAIN)
2 2 185.33.223.204 29990 (ASN-APPNEX)
3 3 52.29.122.216 16509 (AMAZON-02)
1 1 94.23.144.220 16276 (OVH)
1 192.132.33.46 18568 (BIDTELLECT)
2 2 18.184.169.93 16509 (AMAZON-02)
1 2 2a00:1450:400... 15169 (GOOGLE)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
11 151.139.128.10 20446 (HIGHWINDS3)
2 2600:1901:0:f... 15169 (GOOGLE)
7 130.211.115.4 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
107 17
Domain Requested by
41 www.hackread.com 1 redirects www.hackread.com
ajax.googleapis.com
17 googleads.g.doubleclick.net pagead2.googlesyndication.com
9 img.revcontent.com cdn.revcontent.com
7 data.ad-score.com js.ad-score.com
7 trends.revcontent.com www.hackread.com
trends.revcontent.com
cdn.revcontent.com
4 pagead2.googlesyndication.com www.hackread.com
pagead2.googlesyndication.com
3 x.bidswitch.net 3 redirects
3 secure.gravatar.com www.hackread.com
2 tpc.googlesyndication.com pagead2.googlesyndication.com
tpc.googlesyndication.com
2 js.ad-score.com www.hackread.com
js.ad-score.com
2 cdn.revcontent.com www.hackread.com
2 www.google-analytics.com 1 redirects www.googletagmanager.com
2 rtb.mfadsrvr.com 2 redirects
2 ib.adnxs.com 2 redirects
2 b1sync.zemanta.com 2 redirects
2 fonts.gstatic.com ajax.googleapis.com
2 cdnjs.cloudflare.com www.hackread.com
1 www.google.de www.hackread.com
1 www.google.com 1 redirects
1 stats.g.doubleclick.net 1 redirects
1 bttrack.com www.hackread.com
1 green.erne.co 1 redirects
1 www.googletagservices.com pagead2.googlesyndication.com
1 adservice.google.com pagead2.googlesyndication.com
1 adservice.google.de pagead2.googlesyndication.com
1 www.googletagmanager.com www.hackread.com
1 fonts.googleapis.com ajax.googleapis.com
1 ajax.googleapis.com www.hackread.com
107 28
Subject Issuer Validity Valid
hackread.com
Let's Encrypt Authority X3
2020-02-13 -
2020-05-13
3 months crt.sh
cloudflare.com
CloudFlare Inc ECC CA-2
2020-01-07 -
2020-10-09
9 months crt.sh
*.storage.googleapis.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
*.google.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
*.gravatar.com
COMODO RSA Domain Validation Secure Server CA
2018-09-06 -
2020-09-05
2 years crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
*.google-analytics.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
revcontent.com
Amazon
2019-09-19 -
2020-10-19
a year crt.sh
*.bttrack.com
Sectigo RSA Domain Validation Secure Server CA
2019-03-19 -
2021-04-13
2 years crt.sh
www.google.de
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
cdn.revcontent.com
Sectigo RSA Domain Validation Secure Server CA
2020-02-09 -
2020-05-09
3 months crt.sh
*.ad-score.com
Go Daddy Secure Certificate Authority - G2
2019-09-02 -
2020-11-01
a year crt.sh
img.revcontent.com
Sectigo RSA Domain Validation Secure Server CA
2020-02-09 -
2020-05-09
3 months crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh

This page contains 20 frames:

Primary Page: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Frame ID: D718EA4B7B4AF94414C4C4084E2A50A9
Requests: 91 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20200319/r20190131/zrt_lookup.html
Frame ID: BFCD07D1F5B62D8DAAAA58EBD16BC411
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1024134837&w=200&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214376&bpp=27&bdt=847&fdt=203&idt=203&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&correlator=1984266593890&frm=20&pv=2&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3565349704969215&dssz=58&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=306&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2980027295595708&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=1&uci=a!1&fsb=1&xpc=UGc4JhFIOl&p=https%3A//www.hackread.com&dtd=233
Frame ID: F9AE82AD702076C1BE0DF0392169AE23
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=301552094&w=200&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214403&bpp=5&bdt=874&fdt=309&idt=309&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_slotnames=5266209419&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399743279103&dssz=64&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=1026&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2980027295595708&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=2&uci=a!2&fsb=1&xpc=QurURhVPbd&p=https%3A//www.hackread.com&dtd=314
Frame ID: E70ECD9B70C352005AAE39A95340073B
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&adk=1812271804&adf=3025194257&lmt=1585155214&plat=1%3A32776%2C2%3A16809992%2C8%3A134250504%2C9%3A134250504%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&ea=0&flash=0&pra=7&wgl=1&adsid=NT&dt=1585155214793&bpp=4&bdt=1264&fdt=5&idt=5&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_slotnames=5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=68&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2980027295595708&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&ifi=16&uci=a!g&fsb=1&dtd=17
Frame ID: 8A6AC2C4B504AD4F5551A6D62223AC6A
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=3012150858&w=200&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214408&bpp=6&bdt=879&fdt=408&idt=409&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0&prev_slotnames=5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=68&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=1125&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=3&uci=a!3&fsb=1&xpc=cN0iKBus9k&p=https%3A//www.hackread.com&dtd=421
Frame ID: 153D346B51CC54D3B42C8037F92A8042
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1854264899&w=200&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214414&bpp=6&bdt=885&fdt=457&idt=457&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0&prev_slotnames=5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=68&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=1125&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=4&uci=a!4&fsb=1&xpc=6HtRi0ePCf&p=https%3A//www.hackread.com&dtd=462
Frame ID: FED5902D8B4F5328A66B63C7E1257A22
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=296273166&adf=1489503786&w=300&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214420&bpp=7&bdt=891&fdt=508&idt=508&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=1882&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=5&uci=a!5&btvi=1&fsb=1&xpc=sLOdx45KA0&p=https%3A//www.hackread.com&dtd=537
Frame ID: 14AA803047CF5B4B518857A27E0A336E
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1075612886&w=200&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214428&bpp=5&bdt=899&fdt=540&idt=540&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=2161&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=6&uci=a!6&btvi=2&fsb=1&xpc=5YBS4HyhIz&p=https%3A//www.hackread.com&dtd=545
Frame ID: DC428F412ECDF49A3F28DAB45327F370
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=4061625637&w=200&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214433&bpp=7&bdt=904&fdt=565&idt=566&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=2161&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=7&uci=a!7&btvi=3&fsb=1&xpc=7iRn8XwDyr&p=https%3A//www.hackread.com&dtd=571
Frame ID: 2B0B1A72D882951EFF09F231B2BD250E
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=296273166&adf=1167544308&w=300&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214440&bpp=14&bdt=911&fdt=616&idt=616&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=2921&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=8&uci=a!8&btvi=4&fsb=1&xpc=fezAluslwI&p=https%3A//www.hackread.com&dtd=621
Frame ID: 308EE55E4365B03CD02D8E379FC71086
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=3056409154&w=200&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214454&bpp=5&bdt=925&fdt=633&idt=633&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=3200&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=9&uci=a!9&btvi=5&fsb=1&xpc=PGSN1KnwGs&p=https%3A//www.hackread.com&dtd=640
Frame ID: 06E45FDF193DB9C63365162650A6B493
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1506880035&w=200&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214459&bpp=4&bdt=930&fdt=653&idt=653&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=3200&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=10&uci=a!a&btvi=6&fsb=1&xpc=aMog6eocl0&p=https%3A//www.hackread.com&dtd=656
Frame ID: EED891CEA1B875C5729A3D6AFE701941
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=296273166&adf=2095955190&w=300&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214463&bpp=5&bdt=934&fdt=696&idt=696&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=3692&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=11&uci=a!b&btvi=7&fsb=1&xpc=Gmj8ZKtveI&p=https%3A//www.hackread.com&dtd=702
Frame ID: CD48DFCC2212A3E39D0576577A80B213
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=3813488108&w=200&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214468&bpp=6&bdt=939&fdt=729&idt=729&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=3740&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=12&uci=a!c&btvi=8&fsb=1&xpc=3Gu3jMoVCQ&p=https%3A//www.hackread.com&dtd=735
Frame ID: 217A9F7ACC6333BBFE633727416267BF
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=4145652818&w=200&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214474&bpp=9&bdt=945&fdt=787&idt=787&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399751929852&dssz=71&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=3740&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=13&uci=a!d&btvi=9&fsb=1&xpc=wk1L8ytDWE&p=https%3A//www.hackread.com&dtd=791
Frame ID: 10EA1FEF323093BAC2F5B322E9D196D2
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=1082465236&adk=2250471325&adf=2036033552&w=570&fwrn=4&lmt=1585155215&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=570x90_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&fwr=0&wgl=1&adsid=NT&dt=1585155214483&bpp=7&bdt=954&fdt=812&idt=812&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399751929852&dssz=71&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=458&ady=3828&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=14&uci=a!e&btvi=10&fsb=1&xpc=gOECN7rFUA&p=https%3A//www.hackread.com&dtd=814
Frame ID: AB56EC38BCB643FCCE11FFA98023A06F
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=600&slotname=3047884612&adk=2945537484&adf=1398944667&w=300&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&format=300x600&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214527&bpp=4&bdt=998&fdt=845&idt=845&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250%2C300x250%2C570x90_0ads_al&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399751929852&dssz=71&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1113&ady=945&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7Cm%7CoeE%7C&abl=NS&pfx=0&fu=16&bc=31&ifi=15&uci=a!f&fsb=1&xpc=UOvkhdKzuW&p=https%3A//www.hackread.com&dtd=849
Frame ID: 1F12C9628BF957168B316FB77FB21832
Requests: 1 HTTP requests in this frame

Frame: https://js.ad-score.com/x.html?pid=1000177
Frame ID: 684E2C74805A54C1E5FD70A4CAC036AA
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Frame ID: E4DC1A3D8F22C4C06A801D28EC056CFB
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://www.hackread.com/coronavirus-extort= HTTP 301
    https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • script /googlesyndication\.com\//i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • script /googleapis\.com\/.+webfont/i

Page Statistics

107
Requests

99 %
HTTPS

57 %
IPv6

20
Domains

28
Subdomains

17
IPs

5
Countries

1573 kB
Transfer

3416 kB
Size

8
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://www.hackread.com/coronavirus-extort= HTTP 301
    https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 62
  • https://b1sync.zemanta.com/usersync/revcontent/?puid=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%3D&cb=https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fexchange_uid%3DZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%253D%26bidder%3D3%26bidder_uid%3D__ZUID__&rev_dt=1585155214 HTTP 302
  • https://b1sync.zemanta.com/usersync/revcontent/?cb=https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fexchange_uid%3DZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%253D%26bidder%3D3%26bidder_uid%3D__ZUID__&puid=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%3D&rev_dt=1585155214&s=2 HTTP 302
  • https://trends.revcontent.com/cm/pixel_sync?exchange_uid=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%3D&bidder=3&bidder_uid=wnuz9CFlmMQQjkmX3-dc
Request Chain 63
  • https://ib.adnxs.com/getuid?https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fbidder%3D115%26bidder_uid%3D%24UID%26exchange_uid%3DZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%253D&geo=35&rev_dt=1585155214 HTTP 307
  • https://ib.adnxs.com/bounce?%2Fgetuid%3Fhttps%253A%252F%252Ftrends.revcontent.com%252Fcm%252Fpixel_sync%253Fbidder%253D115%2526bidder_uid%253D%2524UID%2526exchange_uid%253DZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%25253D%26geo%3D35%26rev_dt%3D1585155214 HTTP 302
  • https://trends.revcontent.com/cm/pixel_sync?bidder=115&bidder_uid=2176843529322094555&exchange_uid=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%3D&geo=35&rev_dt=1585155214
Request Chain 64
  • https://x.bidswitch.net/sync?ssp=revcontent&rev_dt=1585155214 HTTP 302
  • https://x.bidswitch.net/ul_cb/sync?ssp=revcontent&rev_dt=1585155214 HTTP 302
  • https://green.erne.co/bidswitch/cm?bidswitch_ssp_id=revcontent&gdpr=&gdpr_consent= HTTP 302
  • https://x.bidswitch.net/sync?dsp_id=270&expires=10&user_id=ilgaApnJx9xds3ONJxmXUhr1&ssp=revcontent HTTP 302
  • https://trends.revcontent.com/cm/pixel_sync?bidder=118&bidder_uid=85f0be1e-59db-4c14-8837-efaed6c47886
Request Chain 66
  • https://rtb.mfadsrvr.com/sync?ssp=revcontent&ssp_user_id=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%3D&rev_dt=1585155214 HTTP 302
  • https://rtb.mfadsrvr.com/ul_cb/sync?ssp=revcontent&ssp_user_id=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%3D&rev_dt=1585155214 HTTP 302
  • https://trends.revcontent.com/cm/pixel_sync?exchange_uid=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ=&bidder=154&bidder_uid=15b1f8ad-bb0a-47a7-8a47-a2e9b757450d
Request Chain 71
  • https://www.google-analytics.com/r/collect?v=1&_v=j81&a=665796197&t=pageview&_s=1&dl=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&ul=en-us&de=UTF-8&dt=Coronavirus%20extortion%20scam%20threatens%20to%20infect%20victim%27s%20family&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=IAhAAUAB~&jid=852545703&gjid=1008233399&cid=1265396894.1585155215&tid=UA-36230183-1&_gid=1534548082.1585155215&_r=1&gtm=2ou3i0&z=138789679 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-36230183-1&cid=1265396894.1585155215&jid=852545703&_gid=1534548082.1585155215&gjid=1008233399&_v=j81&z=138789679 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=1265396894.1585155215&jid=852545703&_v=j81&z=138789679 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=1265396894.1585155215&jid=852545703&_v=j81&z=138789679&slf_rd=1&random=3413212560

107 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Redirect Chain
  • https://www.hackread.com/coronavirus-extort=
  • https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
91 KB
18 KB
Document
General
Full URL
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
9d7611ff9ab02663f7cc226fef2c6e9b6f24402640bd037409ec94d9b088585b

Request headers

Host
www.hackread.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document

Response headers

Date
Wed, 25 Mar 2020 16:53:32 GMT
Server
Apache
Link
<https://www.hackread.com/wp-json/>; rel="https://api.w.org/", <https://www.hackread.com/?p=76386>; rel=shortlink
Cache-Control
max-age=2592000
Expires
Fri, 24 Apr 2020 16:53:32 GMT
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
17795
Keep-Alive
timeout=2, max=99
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Wed, 25 Mar 2020 16:53:32 GMT
Server
Apache
Expires
Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control
no-cache, must-revalidate, max-age=0
X-Redirect-By
WordPress
Location
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Content-Length
0
Keep-Alive
timeout=2, max=100
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
style.min.css
www.hackread.com/wp-includes/css/dist/block-library/
29 KB
5 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-includes/css/dist/block-library/style.min.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
4b8fe5c3d0e5ef7a6582185cbf5c535b5d369c8df1da98c03ed69833e55f474d

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Sun, 17 Nov 2019 13:59:40 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=98
Content-Length
4767
Expires
Fri, 24 Apr 2020 16:53:33 GMT
blocks.style.build.css
www.hackread.com/wp-content/plugins/quick-adsense-reloaded/includes/gutenberg/dist/
184 B
514 B
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/plugins/quick-adsense-reloaded/includes/gutenberg/dist/blocks.style.build.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
36ed85dd058e4c2843e06146946e0ff1f9ace65760c22af5eb4f1b22319dddb5

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Mar 2020 22:13:31 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=97
Content-Length
155
Expires
Fri, 24 Apr 2020 16:53:33 GMT
styles.css
www.hackread.com/wp-content/plugins/contact-form-7/includes/css/
2 KB
1 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/plugins/contact-form-7/includes/css/styles.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
811e8960b8f79f14983e30df80a4ccc69d82430ccc0520d2a1a3d1405cfbb2a1

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Sat, 07 Mar 2020 22:25:04 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=100
Content-Length
677
Expires
Fri, 24 Apr 2020 16:53:33 GMT
mashsb.min.css
www.hackread.com/wp-content/plugins/mashsharer/assets/css/
46 KB
28 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/plugins/mashsharer/assets/css/mashsb.min.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
0500bd58f47403106f2f10da96d8d196941a02a4046e88611a59494557861f98

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Sun, 22 Mar 2020 12:13:59 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=100
Content-Length
28578
Expires
Fri, 24 Apr 2020 16:53:33 GMT
bootstrap.min.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/
120 KB
20 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/bootstrap.min.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
31fbd99641c212a6ad3681a2397bde13c148c0ccd98385bce6a7eb7c81417d87

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=100
Content-Length
19883
Expires
Fri, 24 Apr 2020 16:53:33 GMT
mip.external.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/
87 KB
18 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/mip.external.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
8afc1a2899ec2d2c29c203e17c69fe00b369d1aec1634a58653208d6db298958

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=100
Content-Length
17673
Expires
Fri, 24 Apr 2020 16:53:33 GMT
style.css
www.hackread.com/wp-content/themes/newsgamer/
113 KB
18 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/style.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
f9934e8ca51663923f923910d8b0ac7e849f46e87f65f75fcd513dac5e9f16d5

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Fri, 02 Nov 2018 17:34:12 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=100
Content-Length
18556
Expires
Fri, 24 Apr 2020 16:53:33 GMT
media-queries.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/
26 KB
4 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/media-queries.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
b5b0cab3bf2be0ec59bd3b301364a639d993e99d0d526e436442065b9406067b

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=96
Content-Length
3798
Expires
Fri, 24 Apr 2020 16:53:33 GMT
dynamic.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/
308 KB
12 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/dynamic.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
3ac3228e00d2bbbcb08bb7c5586e8744512c0c43c3cf13b2b5df10cd75e6040a

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Wed, 25 Mar 2020 16:13:49 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=99
Content-Length
12196
Expires
Fri, 24 Apr 2020 16:53:33 GMT
typography.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/
19 KB
2 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/typography.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
106d020c501875011ff5aab5034da42ba83e096c17f901fda9e8f4c92ecde8b4

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Wed, 25 Mar 2020 16:13:49 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=99
Content-Length
1771
Expires
Fri, 24 Apr 2020 16:53:33 GMT
jquery.js
www.hackread.com/wp-includes/js/jquery/
95 KB
33 KB
Script
General
Full URL
https://www.hackread.com/wp-includes/js/jquery/jquery.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
1db21d816296e6939ba1f42962496e4134ae2b0081e26970864c40c6d02bb1df

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Wed, 22 May 2019 07:16:05 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=95
Content-Length
33776
Expires
Fri, 24 Apr 2020 16:53:33 GMT
jquery-migrate.min.js
www.hackread.com/wp-includes/js/jquery/
10 KB
4 KB
Script
General
Full URL
https://www.hackread.com/wp-includes/js/jquery/jquery-migrate.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
48eb8b500ae6a38617b5738d2b3faec481922a7782246e31d2755c034a45cd5d

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Tue, 21 Jun 2016 19:13:07 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=99
Content-Length
4014
Expires
Fri, 24 Apr 2020 16:53:33 GMT
cookieconsent.min.css
cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/
4 KB
1 KB
Stylesheet
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4104 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
79b378e8f3c1fece39a1472a2e7d920ab80eb5881525a1622d9dbaa954aa23c3
Security Headers
Name Value
Strict-Transport-Security max-age=15780000; includeSubDomains

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Wed, 25 Mar 2020 16:53:33 GMT
content-encoding
br
cf-cache-status
HIT
age
4139305
cf-ray
579a2614bbb5d6cd-FRA
status
200
strict-transport-security
max-age=15780000; includeSubDomains
alt-svc
h3-27=":443"; ma=86400, h3-25=":443"; ma=86400, h3-24=":443"; ma=86400, h3-23=":443"; ma=86400
last-modified
Tue, 17 Jul 2018 12:30:51 GMT
server
cloudflare
etag
W/"5b4de17b-fe0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
access-control-allow-origin
*
expires
Mon, 15 Mar 2021 16:53:33 GMT
cache-control
public, max-age=30672000
timing-allow-origin
*
served-in-seconds
0.001
cookieconsent.min.js
cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/
20 KB
6 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4104 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
cb41292903f6bd996333bdfe6fbc58e1dbdb6109074505ee3ea46373bb23be70
Security Headers
Name Value
Strict-Transport-Security max-age=15780000; includeSubDomains

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:53:33 GMT
content-encoding
br
cf-cache-status
HIT
age
4091737
cf-ray
579a2614bbb7d6cd-FRA
status
200
strict-transport-security
max-age=15780000; includeSubDomains
alt-svc
h3-27=":443"; ma=86400, h3-25=":443"; ma=86400, h3-24=":443"; ma=86400, h3-23=":443"; ma=86400
last-modified
Tue, 17 Jul 2018 12:30:51 GMT
server
cloudflare
etag
W/"5b4de17b-5148"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
expires
Mon, 15 Mar 2021 16:53:33 GMT
cache-control
public, max-age=30672000
timing-allow-origin
*
served-in-seconds
0.001
hackread-logo.png
www.hackread.com/wp-content/uploads/2015/12/
5 KB
6 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2015/12/hackread-logo.png
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
c89ff58885f6c99c896f0d833df56bd3ffd048276624c7b31b934cadc9e57ee1

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 23:37:46 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=98
Content-Length
5519
Expires
Thu, 25 Mar 2021 16:53:33 GMT
webfont.js
ajax.googleapis.com/ajax/libs/webfont/1.5.3/
17 KB
7 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/webfont/1.5.3/webfont.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
36ef095d011c4ced97b0acef551ca36d76b95299518595dc1acab792a2344601
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Fri, 06 Mar 2020 05:04:17 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1684156
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
6791
x-xss-protection
0
last-modified
Tue, 20 Dec 2016 18:17:03 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 06 Mar 2021 05:04:17 GMT
wp-emoji-release.min.js
www.hackread.com/wp-includes/js/
14 KB
5 KB
Script
General
Full URL
https://www.hackread.com/wp-includes/js/wp-emoji-release.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
f4799ef2939b8377cf33f07b07b6d90a4a245adbf1c6eaf47ee3b0fcefcc07fe

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Sun, 17 Nov 2019 13:59:40 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=99
Content-Length
4622
Expires
Fri, 24 Apr 2020 16:53:33 GMT
css
fonts.googleapis.com/
4 KB
803 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto%7CRoboto+Slab&subset=latin
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/webfont/1.5.3/webfont.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
6a0c466dd72e7d2fdd6ed71f97d8b6901714d154c572aeee1f18685ff30c92f2
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
x-xss-protection
0
last-modified
Wed, 25 Mar 2020 16:53:33 GMT
server
ESF
date
Wed, 25 Mar 2020 16:53:33 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Wed, 25 Mar 2020 16:53:33 GMT
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v20/
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v20/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/webfont/1.5.3/webfont.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5d1bc9b443f3f81fa4b4ad4634c1bb9702194c1898e3a9de0ab5e2cdc0e9f479
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/css?family=Roboto%7CRoboto+Slab&subset=latin
Origin
https://www.hackread.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 27 Feb 2020 08:47:06 GMT
x-content-type-options
nosniff
last-modified
Wed, 24 Jul 2019 01:18:50 GMT
server
sffe
age
2361987
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
11016
x-xss-protection
0
expires
Fri, 26 Feb 2021 08:47:06 GMT
b46fad0ee0dc124087b9a350e249485f
secure.gravatar.com/avatar/
4 KB
4 KB
Image
General
Full URL
https://secure.gravatar.com/avatar/b46fad0ee0dc124087b9a350e249485f?s=100&d=mm&r=g
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
63f0d921cde3442ee319b51ae162fe49f1e28d0dd19ba634f235e71119a01055

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

x-nc
MISS lb8.dfw.gravatar.com, HIT fra 2
date
Wed, 25 Mar 2020 16:53:34 GMT
last-modified
Fri, 02 Aug 2019 19:27:46 GMT
server
nginx
access-control-allow-origin
*
content-type
image/jpeg
status
200
cache-control
max-age=300
content-disposition
inline; filename="b46fad0ee0dc124087b9a350e249485f.jpeg"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/b46fad0ee0dc124087b9a350e249485f?s=100&d=mm&r=g>; rel="canonical"
content-length
4096
expires
Wed, 25 Mar 2020 16:58:34 GMT
410njbnz9ol_go1_icon.ico
www.hackread.com/wp-content/uploads/2015/12/
37 KB
3 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2015/12/410njbnz9ol_go1_icon.ico
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
a83b6dc4e04e6e657a3c36c83d61e410ac5ef9615e0c3dfcf3c454cde68bf243

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Thu, 08 Aug 2019 11:48:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/x-icon
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=93
Content-Length
2909
Expires
Thu, 25 Mar 2021 16:53:33 GMT
adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/
107 KB
38 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
3c005dba1d518d8fcd6bb8b0cd5264947d7c8c5b53363556d98c453428a376ef
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:53:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
39033
x-xss-protection
0
server
cafe
etag
13352514705584774431
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Wed, 25 Mar 2020 16:53:34 GMT
Sextortion-mail-sample.jpg
www.hackread.com/wp-content/uploads/2020/03/
41 KB
38 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/Sextortion-mail-sample.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
0841e797e3cdaa7b96e012d02451295da6c035e6c61733ff162f6cfac7dd24ba

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Mon, 23 Mar 2020 12:36:31 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=94
Content-Length
38965
Expires
Thu, 25 Mar 2021 16:53:33 GMT
b46fad0ee0dc124087b9a350e249485f
secure.gravatar.com/avatar/
5 KB
5 KB
Image
General
Full URL
https://secure.gravatar.com/avatar/b46fad0ee0dc124087b9a350e249485f?s=115&d=mm&r=g
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
90c59d72a87cb9ded609ce96b3752908e2ac97c6d199d8f2e815f270ce5c5f53

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

x-nc
MISS lb7.dfw.gravatar.com, MISS fra 2
date
Wed, 25 Mar 2020 16:53:34 GMT
last-modified
Fri, 02 Aug 2019 19:27:46 GMT
server
nginx
access-control-allow-origin
*
content-type
image/jpeg
status
200
cache-control
max-age=300
content-disposition
inline; filename="b46fad0ee0dc124087b9a350e249485f.jpeg"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/b46fad0ee0dc124087b9a350e249485f?s=115&d=mm&r=g>; rel="canonical"
content-length
4889
expires
Wed, 25 Mar 2020 16:58:34 GMT
who-becomes-target-of-live-hack-attack-277x190.jpg
www.hackread.com/wp-content/uploads/2020/03/
11 KB
11 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/who-becomes-target-of-live-hack-attack-277x190.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
56800b0f8b907015c53a2337585f8a6a12ad6a51e6501c347ceb17055641e999

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Mar 2020 21:00:15 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=97
Content-Length
10941
Expires
Thu, 25 Mar 2021 16:53:33 GMT
coronavirus-sextortion-scam-277x190.jpg
www.hackread.com/wp-content/uploads/2020/03/
13 KB
13 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/coronavirus-sextortion-scam-277x190.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
ca78abe6a4c7431cdfdcead48913da3139b1d54bf09eea0582513954c2d2f1d1

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Mon, 23 Mar 2020 14:00:42 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=92
Content-Length
13208
Expires
Thu, 25 Mar 2021 16:53:33 GMT
hackers-launch-coronavirus-sale-to-sell-hacking-tools-at-low-cost-277x190.jpg
www.hackread.com/wp-content/uploads/2020/03/
14 KB
14 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/hackers-launch-coronavirus-sale-to-sell-hacking-tools-at-low-cost-277x190.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
5e98805013c507fe66d11c49fb428e28546821dc69c00cf0d4caea227542e7b9

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:53:34 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Mar 2020 18:56:47 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=97
Content-Length
13932
Expires
Thu, 25 Mar 2021 16:53:34 GMT
f002df08b025d37deabffc0b5b88b6ea
secure.gravatar.com/avatar/
1 KB
2 KB
Image
General
Full URL
https://secure.gravatar.com/avatar/f002df08b025d37deabffc0b5b88b6ea?s=75&d=mm&r=g
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
37cca5e57f95b1b176e0f578b882175174b47204739b81b4ef52e66383eb5da3

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

x-nc
HIT lb8.dfw.gravatar.com, BYPASS fra 2
date
Wed, 25 Mar 2020 16:53:34 GMT
last-modified
Wed, 11 Jan 1984 08:00:00 GMT
server
nginx
access-control-allow-origin
*
content-type
image/jpeg
status
200
cache-control
max-age=300
content-disposition
inline; filename="f002df08b025d37deabffc0b5b88b6ea.png"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/f002df08b025d37deabffc0b5b88b6ea?s=75&d=mm&r=g>; rel="canonical"
content-length
1340
expires
Wed, 25 Mar 2020 16:58:34 GMT
who-becomes-target-of-live-hack-attack-350x245.jpg
www.hackread.com/wp-content/uploads/2020/03/
17 KB
17 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/who-becomes-target-of-live-hack-attack-350x245.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
e1240b4fff3ba45047d409abd5d38143700a153ae349b17cea437e16e3a71fc1

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:53:34 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Mar 2020 21:00:14 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=95
Content-Length
17555
Expires
Thu, 25 Mar 2021 16:53:34 GMT
hackers-are-exploiting-a-critical-unpatched-flaw-in-windows-1-350x245.jpg
www.hackread.com/wp-content/uploads/2020/03/
12 KB
13 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/hackers-are-exploiting-a-critical-unpatched-flaw-in-windows-1-350x245.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
c30768df1b5c99e68664ae0ed7db9b2bc95e1c89e9e5c01b5ef92a408c3e6b13

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:53:34 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Mar 2020 18:08:13 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=96
Content-Length
12519
Expires
Thu, 25 Mar 2021 16:53:34 GMT
malware-family-generated-fake-ad-clicks-in-66-apps-on-android-2-350x245.jpg
www.hackread.com/wp-content/uploads/2020/03/
18 KB
19 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/malware-family-generated-fake-ad-clicks-in-66-apps-on-android-2-350x245.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
c4289b26e4f32f2fdd514a4d1deb6aa6dca1f4e8e9989c1dc042eb20b29df57b

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:53:34 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Mar 2020 14:52:49 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=91
Content-Length
18605
Expires
Thu, 25 Mar 2021 16:53:34 GMT
coronavirus-sextortion-scam-350x245.jpg
www.hackread.com/wp-content/uploads/2020/03/
20 KB
21 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/coronavirus-sextortion-scam-350x245.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
81d1aa922759e01b41a5290dcf461e8664d016d18cc24da57bfa6a06c98a8786

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:53:34 GMT
Content-Encoding
gzip
Last-Modified
Mon, 23 Mar 2020 14:00:42 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=96
Content-Length
20630
Expires
Thu, 25 Mar 2021 16:53:34 GMT
hackread-logo.png
www.hackread.com/wp-content/uploads/2015/12/
5 KB
6 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2015/12/hackread-logo.png?x62286
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
c89ff58885f6c99c896f0d833df56bd3ffd048276624c7b31b934cadc9e57ee1

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:53:34 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 23:37:46 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=96
Content-Length
5519
Expires
Thu, 25 Mar 2021 16:53:34 GMT
scripts.js
www.hackread.com/wp-content/plugins/contact-form-7/includes/js/
14 KB
4 KB
Script
General
Full URL
https://www.hackread.com/wp-content/plugins/contact-form-7/includes/js/scripts.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
b7e17926b30342edecee8b3a93029ac51462e2b479277d8e077ba57173eb1900

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Sat, 07 Mar 2020 22:25:04 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=97
Content-Length
3993
Expires
Fri, 24 Apr 2020 16:53:33 GMT
mashsb.min.js
www.hackread.com/wp-content/plugins/mashsharer/assets/js/
4 KB
2 KB
Script
General
Full URL
https://www.hackread.com/wp-content/plugins/mashsharer/assets/js/mashsb.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
a13a1fe4a87c09c6e9122834b5351f80012e2c539b32bc1d33c6982efab21b4b

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Sun, 22 Mar 2020 12:13:59 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=98
Content-Length
1533
Expires
Fri, 24 Apr 2020 16:53:33 GMT
ta.js
www.hackread.com/wp-content/plugins/thirstyaffiliates/js/app/
10 KB
3 KB
Script
General
Full URL
https://www.hackread.com/wp-content/plugins/thirstyaffiliates/js/app/ta.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
31c020e98d623d9d86a904d64f4b923726a1ab664bff40a7550866ea2d4f5e03

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Fri, 21 Feb 2020 18:34:40 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=96
Content-Length
2584
Expires
Fri, 24 Apr 2020 16:53:33 GMT
bootstrap.min.js
www.hackread.com/wp-content/themes/newsgamer/assets/js/
36 KB
10 KB
Script
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/js/bootstrap.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
4a4de7903ea62d330e17410ea4db6c22bcbeb350ac6aa402d6b54b4c0cbed327

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=94
Content-Length
9745
Expires
Fri, 24 Apr 2020 16:53:33 GMT
mip.external.min.js
www.hackread.com/wp-content/themes/newsgamer/assets/js/
135 KB
42 KB
Script
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/js/mip.external.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
cd605c7d4107ef5b9d511b13cb1e053db59d2daa7df99e1e5754e54c0c7cec87

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=98
Content-Length
42900
Expires
Fri, 24 Apr 2020 16:53:33 GMT
functions.js
www.hackread.com/wp-content/themes/newsgamer/assets/js/
17 KB
5 KB
Script
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/js/functions.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
afe9c8752a20b726104d37ce2f099e89eba3b62bb31a3307c5a9bbf9de3c2e2d

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=98
Content-Length
4438
Expires
Fri, 24 Apr 2020 16:53:33 GMT
wp-embed.min.js
www.hackread.com/wp-includes/js/
1 KB
1 KB
Script
General
Full URL
https://www.hackread.com/wp-includes/js/wp-embed.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
2152557cac69e2bd7d6debef5037a9f554f9209cc305b8141b3329acb10c42b7

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Sun, 17 Nov 2019 13:59:40 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=99
Content-Length
753
Expires
Fri, 24 Apr 2020 16:53:33 GMT
form.js
www.hackread.com/wp-content/plugins/akismet/_inc/
700 B
691 B
Script
General
Full URL
https://www.hackread.com/wp-content/plugins/akismet/_inc/form.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
0515cbd1f8aee97e1c8e0d1d015ca96c86def13e90d2e73bf813072ccc23d531

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:53:34 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Mar 2020 22:13:36 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=93
Content-Length
318
Expires
Fri, 24 Apr 2020 16:53:34 GMT
comment-reply.min.js
www.hackread.com/wp-includes/js/
2 KB
1 KB
Script
General
Full URL
https://www.hackread.com/wp-includes/js/comment-reply.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
31cb76c05cbf5d71466f93078e8ba0f6e39cd92d0acc86d385b8cf2899963695

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Sun, 17 Nov 2019 13:59:40 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=96
Content-Length
1093
Expires
Fri, 24 Apr 2020 16:53:33 GMT
js
www.googletagmanager.com/gtag/
75 KB
28 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=UA-36230183-1
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
1392c66fd47cf940b980aa04cf6aad81b7bba5dc75894f692ba806ef2a3a5eb6
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:53:34 GMT
content-encoding
br
status
200
strict-transport-security
max-age=31536000; includeSubDomains
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
28642
x-xss-protection
0
last-modified
Wed, 25 Mar 2020 15:00:00 GMT
server
Google Tag Manager
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Wed, 25 Mar 2020 16:53:34 GMT
dynamic.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/
64 KB
64 KB
Image
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/dynamic.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/dynamic.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Wed, 25 Mar 2020 16:13:49 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=95
Content-Length
12196
Expires
Fri, 24 Apr 2020 16:53:33 GMT
fontawesome-webfont.woff2
www.hackread.com/wp-content/themes/newsgamer/assets/fonts/
75 KB
76 KB
Font
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/fonts/fontawesome-webfont.woff2?v=4.7.0
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe

Request headers

Referer
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/mip.external.css
Origin
https://www.hackread.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
font/woff2
Cache-Control
max-age=2592000
Transfer-Encoding
chunked
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=97
Expires
Fri, 24 Apr 2020 16:53:33 GMT
vertical-right-shadow.png
www.hackread.com/wp-content/themes/newsgamer/images/
3 KB
2 KB
Image
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/images/vertical-right-shadow.png
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/webfont/1.5.3/webfont.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
dfbf744b87270c5e4148371216220d1421d01dfdbf7ad35afff64763cb852484

Request headers

Referer
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/dynamic.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:34 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=98
Content-Length
1777
Expires
Thu, 25 Mar 2021 16:53:33 GMT
top-left-shadow.png
www.hackread.com/wp-content/themes/newsgamer/images/
2 KB
2 KB
Image
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/images/top-left-shadow.png
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/webfont/1.5.3/webfont.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
3329ee5bb1edc52b18015e9bdedd275415080788f9c1fdd7165bca609874c9c5

Request headers

Referer
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/dynamic.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:53:33 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:34 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=97
Content-Length
1599
Expires
Thu, 25 Mar 2021 16:53:33 GMT
BngbUXZYTXPIvIBgJJSb6s3BzlRRfKOFbvjojISmb2RlV9Su1cai.woff
fonts.gstatic.com/s/robotoslab/v11/
15 KB
15 KB
Font
General
Full URL
https://fonts.gstatic.com/s/robotoslab/v11/BngbUXZYTXPIvIBgJJSb6s3BzlRRfKOFbvjojISmb2RlV9Su1cai.woff
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/webfont/1.5.3/webfont.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
ce677696c57a6b97fee81d149546716b76f236cf7bb35845fa771feb91914f95
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/css?family=Roboto%7CRoboto+Slab&subset=latin
Origin
https://www.hackread.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 27 Feb 2020 14:02:43 GMT
x-content-type-options
nosniff
last-modified
Tue, 04 Feb 2020 23:46:05 GMT
server
sffe
age
2343051
content-type
font/woff
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
15244
x-xss-protection
0
expires
Fri, 26 Feb 2021 14:02:43 GMT
truncated
/
11 KB
11 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
745caffca4b97cf5cf2374d82c6dfb6fb7c7b694e85432f92ec4dcb35f4418c9

Request headers

Origin
https://www.hackread.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
application/octet-stream
integrator.js
adservice.google.de/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.hackread.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:53:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.hackread.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:53:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
104
x-xss-protection
0
show_ads_impl_fy2019.js
pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/
224 KB
84 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
1fea51227a0d0a882dcf26ad5791bdf3bbb79958e076630e86427a8266300a2a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:53:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
85515
x-xss-protection
0
server
cafe
etag
13950792502640807200
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Wed, 25 Mar 2020 16:53:34 GMT
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20200319/r20190131/ Frame BFCD
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/html/r20200319/r20190131/zrt_lookup.html
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/html/r20200319/r20190131/zrt_lookup.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
vary
Accept-Encoding
date
Sat, 21 Mar 2020 12:05:08 GMT
expires
Sat, 04 Apr 2020 12:05:08 GMT
content-type
text/html; charset=UTF-8
etag
17714563530871986051
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
4497
x-xss-protection
0
cache-control
public, max-age=1209600
age
362906
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
serve.js.php
trends.revcontent.com/
4 KB
2 KB
Script
General
Full URL
https://trends.revcontent.com/serve.js.php?w=3420&t=rc_17&c=1585155214504&width=1600&referer=https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
63.34.125.93 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-63-34-125-93.eu-west-1.compute.amazonaws.com
Software
Apache/2.4.25 (Debian) /
Resource Hash
d343d38c960176d290455cd76eef64f1d71f73961fc16c87945382a6a66af14f
Security Headers
Name Value
Strict-Transport-Security max-age=931536000; includeSubDomains

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:53:34 GMT
content-encoding
gzip
server
Apache/2.4.25 (Debian)
access-control-allow-origin
https://www.hackread.com
vary
Accept-Encoding
p3p
CP="NOI DSP COR NID ADM DEV OUR NOR CNT"
status
200
access-control-allow-credentials
true
strict-transport-security
max-age=931536000; includeSubDomains
content-type
text/html; charset=UTF-8
ads
googleads.g.doubleclick.net/pagead/ Frame F9AE
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1024134837&w=200&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214376&bpp=27&bdt=847&fdt=203&idt=203&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&correlator=1984266593890&frm=20&pv=2&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3565349704969215&dssz=58&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=306&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2980027295595708&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=1&uci=a!1&fsb=1&xpc=UGc4JhFIOl&p=https%3A//www.hackread.com&dtd=233
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1024134837&w=200&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214376&bpp=27&bdt=847&fdt=203&idt=203&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&correlator=1984266593890&frm=20&pv=2&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3565349704969215&dssz=58&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=306&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2980027295595708&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=1&uci=a!1&fsb=1&xpc=UGc4JhFIOl&p=https%3A//www.hackread.com&dtd=233
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:53:34 GMT
server
cafe
content-length
5931
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Wed, 25-Mar-2020 17:08:34 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:53:34 GMT
cache-control
private
osd.js
www.googletagservices.com/activeview/js/current/
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
351e508c1da4f9d1535747086accb41121466a52044aa868eba4a36009fdb101
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:53:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1584962844677376"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
27941
x-xss-protection
0
expires
Wed, 25 Mar 2020 16:53:34 GMT
coronavirus-sextortion-scam.jpg
www.hackread.com/wp-content/uploads/2020/03/
93 KB
93 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/coronavirus-sextortion-scam.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
c9dffa6a9bb791cd61eb337b47b34482cce48ded9fc7504c24d8dfab9e237bd1

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 25 Mar 2020 16:53:34 GMT
Content-Encoding
gzip
Last-Modified
Mon, 23 Mar 2020 14:00:28 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Transfer-Encoding
chunked
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=94
Expires
Thu, 25 Mar 2021 16:53:34 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame E70E
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=301552094&w=200&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214403&bpp=5&bdt=874&fdt=309&idt=309&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_slotnames=5266209419&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399743279103&dssz=64&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=1026&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2980027295595708&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=2&uci=a!2&fsb=1&xpc=QurURhVPbd&p=https%3A//www.hackread.com&dtd=314
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=301552094&w=200&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214403&bpp=5&bdt=874&fdt=309&idt=309&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_slotnames=5266209419&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399743279103&dssz=64&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=1026&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2980027295595708&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=2&uci=a!2&fsb=1&xpc=QurURhVPbd&p=https%3A//www.hackread.com&dtd=314
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:53:34 GMT
server
cafe
content-length
5950
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Wed, 25-Mar-2020 17:08:34 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:53:34 GMT
cache-control
private
admin-ajax.php
www.hackread.com/wp-admin/
13 B
590 B
XHR
General
Full URL
https://www.hackread.com/wp-admin/admin-ajax.php
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/wp-includes/js/jquery/jquery.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
53bb543544f977b6fe13f135cec807e6ae3f789037c2854117ea77547db010c4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

Accept
*/*
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Origin
https://www.hackread.com
X-Requested-With
XMLHttpRequest
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Date
Wed, 25 Mar 2020 16:53:34 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Connection
Keep-Alive
Content-Length
33
Referrer-Policy
strict-origin-when-cross-origin
Server
Apache
X-Frame-Options
SAMEORIGIN
Vary
Accept-Encoding
Content-Type
text/html; charset=UTF-8
Access-Control-Allow-Origin
https://www.hackread.com
Cache-Control
no-cache, must-revalidate, max-age=0
Access-Control-Allow-Credentials
true
X-Robots-Tag
noindex
Keep-Alive
timeout=2, max=90
Expires
Wed, 11 Jan 1984 05:00:00 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 8A6A
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&adk=1812271804&adf=3025194257&lmt=1585155214&plat=1%3A32776%2C2%3A16809992%2C8%3A134250504%2C9%3A134250504%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&ea=0&flash=0&pra=7&wgl=1&adsid=NT&dt=1585155214793&bpp=4&bdt=1264&fdt=5&idt=5&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_slotnames=5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=68&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2980027295595708&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&ifi=16&uci=a!g&fsb=1&dtd=17
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&adk=1812271804&adf=3025194257&lmt=1585155214&plat=1%3A32776%2C2%3A16809992%2C8%3A134250504%2C9%3A134250504%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&ea=0&flash=0&pra=7&wgl=1&adsid=NT&dt=1585155214793&bpp=4&bdt=1264&fdt=5&idt=5&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_slotnames=5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=68&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2980027295595708&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&ifi=16&uci=a!g&fsb=1&dtd=17
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
test_cookie=CheckForPermission
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:53:34 GMT
server
cafe
content-length
34
x-xss-protection
0
set-cookie
IDE=AHWqTUm3a5fIqnjFX3Q0Jv2T27J9edJOegoZaaUY4SbCAbcZarjcdmbLt_Egc8zo; expires=Mon, 19-Apr-2021 16:53:34 GMT; path=/; domain=.doubleclick.net; Secure; HttpOnly; SameSite=none test_cookie=; domain=.doubleclick.net; path=/; expires=Mon, 21 Jul 2008 23:59:00 GMT; SameSite=none; Secure
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:53:34 GMT
cache-control
private
ads
googleads.g.doubleclick.net/pagead/ Frame 153D
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=3012150858&w=200&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214408&bpp=6&bdt=879&fdt=408&idt=409&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0&prev_slotnames=5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=68&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=1125&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=3&uci=a!3&fsb=1&xpc=cN0iKBus9k&p=https%3A//www.hackread.com&dtd=421
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=3012150858&w=200&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214408&bpp=6&bdt=879&fdt=408&idt=409&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0&prev_slotnames=5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=68&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=1125&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=3&uci=a!3&fsb=1&xpc=cN0iKBus9k&p=https%3A//www.hackread.com&dtd=421
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
test_cookie=CheckForPermission
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:53:34 GMT
server
cafe
content-length
6033
x-xss-protection
0
set-cookie
IDE=AHWqTUmHydpiLrO2Pm4QMSTgs2-O655vQ1UzyhgUerg7o_hBo35hEn0PLHCR-nVY; expires=Mon, 19-Apr-2021 16:53:34 GMT; path=/; domain=.doubleclick.net; Secure; HttpOnly; SameSite=none test_cookie=; domain=.doubleclick.net; path=/; expires=Mon, 21 Jul 2008 23:59:00 GMT; SameSite=none; Secure
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:53:34 GMT
cache-control
private
serve.js.php
trends.revcontent.com/
113 KB
33 KB
XHR
General
Full URL
https://trends.revcontent.com/serve.js.php?w=3420&t=rc_17&c=1585155214504&width=1600&site_url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&referer=&skip_demand=true
Requested by
Host: trends.revcontent.com
URL: https://trends.revcontent.com/serve.js.php?w=3420&t=rc_17&c=1585155214504&width=1600&referer=https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
63.34.125.93 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-63-34-125-93.eu-west-1.compute.amazonaws.com
Software
Apache/2.4.25 (Debian) /
Resource Hash
5860e3441be752ad6ac03ce00d3965ed4de1f162dc5152aced616041b507fb46
Security Headers
Name Value
Strict-Transport-Security max-age=931536000; includeSubDomains

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

date
Wed, 25 Mar 2020 16:53:35 GMT
content-encoding
gzip
server
Apache/2.4.25 (Debian)
status
200
strict-transport-security
max-age=931536000; includeSubDomains
p3p
CP="NOI DSP COR NID ADM DEV OUR NOR CNT"
access-control-allow-origin
https://www.hackread.com
access-control-allow-credentials
true
content-type
text/javascript; charset=utf-8
pixel_sync
trends.revcontent.com/cm/
Redirect Chain
  • https://b1sync.zemanta.com/usersync/revcontent/?puid=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%3D&cb=https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fexchange_uid%3DZmIxZTU1OTU4N2U0ZDY0Zjc...
  • https://b1sync.zemanta.com/usersync/revcontent/?cb=https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fexchange_uid%3DZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%253D%26bidder%3D3%26bidder_uid%...
  • https://trends.revcontent.com/cm/pixel_sync?exchange_uid=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%3D&bidder=3&bidder_uid=wnuz9CFlmMQQjkmX3-dc
35 B
213 B
Image
General
Full URL
https://trends.revcontent.com/cm/pixel_sync?exchange_uid=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%3D&bidder=3&bidder_uid=wnuz9CFlmMQQjkmX3-dc
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
63.34.125.93 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-63-34-125-93.eu-west-1.compute.amazonaws.com
Software
/ Express
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Wed, 25 Mar 2020 16:53:36 GMT
x-powered-by
Express
content-length
35
content-type
image/gif

Redirect headers

Pragma
no-cache
Date
Wed, 25 Mar 2020 16:53:35 GMT
P3p
CP="We do not support P3P header."
Location
https://trends.revcontent.com/cm/pixel_sync?exchange_uid=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%3D&bidder=3&bidder_uid=wnuz9CFlmMQQjkmX3-dc
Cache-Control
no-cache, no-store, must-revalidate
Content-Type
text/html; charset=utf-8
Content-Length
175
Expires
Thu, 01 Dec 1994 16:00:00 GMT
pixel_sync
trends.revcontent.com/cm/
Redirect Chain
  • https://ib.adnxs.com/getuid?https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fbidder%3D115%26bidder_uid%3D%24UID%26exchange_uid%3DZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%253D&geo=35&rev_d...
  • https://ib.adnxs.com/bounce?%2Fgetuid%3Fhttps%253A%252F%252Ftrends.revcontent.com%252Fcm%252Fpixel_sync%253Fbidder%253D115%2526bidder_uid%253D%2524UID%2526exchange_uid%253DZmIxZTU1OTU4N2U0ZDY0Zjc1Z...
  • https://trends.revcontent.com/cm/pixel_sync?bidder=115&bidder_uid=2176843529322094555&exchange_uid=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%3D&geo=35&rev_dt=1585155214
35 B
215 B
Image
General
Full URL
https://trends.revcontent.com/cm/pixel_sync?bidder=115&bidder_uid=2176843529322094555&exchange_uid=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%3D&geo=35&rev_dt=1585155214
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
63.34.125.93 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-63-34-125-93.eu-west-1.compute.amazonaws.com
Software
/ Express
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Wed, 25 Mar 2020 16:53:35 GMT
x-powered-by
Express
content-length
35
content-type
image/gif

Redirect headers

Pragma
no-cache
Date
Wed, 25 Mar 2020 16:53:37 GMT
AN-X-Request-Uuid
216cf8d0-ebc9-4350-ba29-aa36c0c58745
Content-Type
text/html; charset=utf-8
Server
nginx/1.13.4
Location
https://trends.revcontent.com/cm/pixel_sync?bidder=115&bidder_uid=2176843529322094555&exchange_uid=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%3D&geo=35&rev_dt=1585155214
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
*
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
X-Proxy-Origin
85.159.237.67; 85.159.237.67; 319.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.221.44:80
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
pixel_sync
trends.revcontent.com/cm/
Redirect Chain
  • https://x.bidswitch.net/sync?ssp=revcontent&rev_dt=1585155214
  • https://x.bidswitch.net/ul_cb/sync?ssp=revcontent&rev_dt=1585155214
  • https://green.erne.co/bidswitch/cm?bidswitch_ssp_id=revcontent&gdpr=&gdpr_consent=
  • https://x.bidswitch.net/sync?dsp_id=270&expires=10&user_id=ilgaApnJx9xds3ONJxmXUhr1&ssp=revcontent
  • https://trends.revcontent.com/cm/pixel_sync?bidder=118&bidder_uid=85f0be1e-59db-4c14-8837-efaed6c47886
35 B
215 B
Image
General
Full URL
https://trends.revcontent.com/cm/pixel_sync?bidder=118&bidder_uid=85f0be1e-59db-4c14-8837-efaed6c47886
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
63.34.125.93 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-63-34-125-93.eu-west-1.compute.amazonaws.com
Software
/ Express
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Wed, 25 Mar 2020 16:53:36 GMT
x-powered-by
Express
content-length
35
content-type
image/gif

Redirect headers

status
302
date
Wed, 25 Mar 2020 16:53:36 GMT
cache-control
no-cache, no-store, must-revalidate
content-length
0
location
//trends.revcontent.com/cm/pixel_sync?bidder=118&bidder_uid=85f0be1e-59db-4c14-8837-efaed6c47886
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
cookiesync
bttrack.com/pixel/
35 B
380 B
Image
General
Full URL
https://bttrack.com/pixel/cookiesync?source=0b0edea9-c9fe-4b9c-9bcd-a51022f2873f&publisherid=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%253D&pushdata=109&secure=1&rev_dt=1585155214
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
192.132.33.46 , United States, ASN18568 (BIDTELLECT, US),
Reverse DNS
46.bidtellect.com
Software
Microsoft-IIS/8.5 /
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

X-ServerName
Track003-dc3
Pragma
no-cache
Date
Wed, 25 Mar 2020 16:53:37 GMT
X-AspNetMvc-Version
5.2
Server
Microsoft-IIS/8.5
X-AspNet-Version
4.0.30319
P3P
CP="CAO DSP COR ADMo DEVo PSAo PSDo HISo IVAo IVDo OUR IND OTC"
Cache-Control
private,no-cache
Content-Type
image/gif
Content-Length
35
Expires
-1
pixel_sync
trends.revcontent.com/cm/
Redirect Chain
  • https://rtb.mfadsrvr.com/sync?ssp=revcontent&ssp_user_id=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%3D&rev_dt=1585155214
  • https://rtb.mfadsrvr.com/ul_cb/sync?ssp=revcontent&ssp_user_id=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%3D&rev_dt=1585155214
  • https://trends.revcontent.com/cm/pixel_sync?exchange_uid=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ=&bidder=154&bidder_uid=15b1f8ad-bb0a-47a7-8a47-a2e9b757450d
35 B
215 B
Image
General
Full URL
https://trends.revcontent.com/cm/pixel_sync?exchange_uid=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ=&bidder=154&bidder_uid=15b1f8ad-bb0a-47a7-8a47-a2e9b757450d
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
63.34.125.93 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-63-34-125-93.eu-west-1.compute.amazonaws.com
Software
/ Express
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Wed, 25 Mar 2020 16:53:38 GMT
x-powered-by
Express
content-length
35
content-type
image/gif

Redirect headers

Location
//trends.revcontent.com/cm/pixel_sync?exchange_uid=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ=&bidder=154&bidder_uid=15b1f8ad-bb0a-47a7-8a47-a2e9b757450d
Date
Wed, 25 Mar 2020 16:53:38 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Length
0
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
ads
googleads.g.doubleclick.net/pagead/ Frame FED5
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1854264899&w=200&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214414&bpp=6&bdt=885&fdt=457&idt=457&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0&prev_slotnames=5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=68&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=1125&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=4&uci=a!4&fsb=1&xpc=6HtRi0ePCf&p=https%3A//www.hackread.com&dtd=462
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1854264899&w=200&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214414&bpp=6&bdt=885&fdt=457&idt=457&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0&prev_slotnames=5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=68&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=1125&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=4&uci=a!4&fsb=1&xpc=6HtRi0ePCf&p=https%3A//www.hackread.com&dtd=462
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
test_cookie=CheckForPermission
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:53:34 GMT
server
cafe
content-length
5924
x-xss-protection
0
set-cookie
IDE=AHWqTUl4q6Xw8eldlQBZ7vqk-BsVZ3EXye5ZB20jb3m56AcYoDRcGn_yBB8jWHUl; expires=Mon, 19-Apr-2021 16:53:34 GMT; path=/; domain=.doubleclick.net; Secure; HttpOnly; SameSite=none test_cookie=; domain=.doubleclick.net; path=/; expires=Mon, 21 Jul 2008 23:59:00 GMT; SameSite=none; Secure
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:53:34 GMT
cache-control
private
analytics.js
www.google-analytics.com/
44 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=UA-36230183-1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
eaf1b128b927ac2868755cb7366d35554255c8af362235afe270f9614f8c806d
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 06 Feb 2020 00:21:02 GMT
server
Golfe2
age
899
date
Wed, 25 Mar 2020 16:38:35 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
18174
expires
Wed, 25 Mar 2020 18:38:35 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 14AA
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=296273166&adf=1489503786&w=300&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214420&bpp=7&bdt=891&fdt=508&idt=508&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=1882&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=5&uci=a!5&btvi=1&fsb=1&xpc=sLOdx45KA0&p=https%3A//www.hackread.com&dtd=537
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=296273166&adf=1489503786&w=300&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214420&bpp=7&bdt=891&fdt=508&idt=508&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=1882&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=5&uci=a!5&btvi=1&fsb=1&xpc=sLOdx45KA0&p=https%3A//www.hackread.com&dtd=537
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
test_cookie=CheckForPermission
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:53:35 GMT
server
cafe
content-length
204
x-xss-protection
0
set-cookie
IDE=AHWqTUmD8Wn7I2CnuLwzn03IyZOeVT2PBVBRwkmEcX9__goAi9TxN79lYclEG-4R; expires=Mon, 19-Apr-2021 16:53:34 GMT; path=/; domain=.doubleclick.net; Secure; HttpOnly; SameSite=none test_cookie=; domain=.doubleclick.net; path=/; expires=Mon, 21 Jul 2008 23:59:00 GMT; SameSite=none; Secure
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Wed, 25 Mar 2020 16:53:35 GMT
cache-control
private
ads
googleads.g.doubleclick.net/pagead/ Frame DC42
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1075612886&w=200&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214428&bpp=5&bdt=899&fdt=540&idt=540&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=2161&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=6&uci=a!6&btvi=2&fsb=1&xpc=5YBS4HyhIz&p=https%3A//www.hackread.com&dtd=545
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1075612886&w=200&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214428&bpp=5&bdt=899&fdt=540&idt=540&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=2161&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=6&uci=a!6&btvi=2&fsb=1&xpc=5YBS4HyhIz&p=https%3A//www.hackread.com&dtd=545
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUmHydpiLrO2Pm4QMSTgs2-O655vQ1UzyhgUerg7o_hBo35hEn0PLHCR-nVY
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:53:35 GMT
server
cafe
content-length
206
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j81&a=665796197&t=pageview&_s=1&dl=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&ul=en-us&de=UT...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-36230183-1&cid=1265396894.1585155215&jid=852545703&_gid=1534548082.1585155215&gjid=1008233399&_v=j81&z=138789679
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=1265396894.1585155215&jid=852545703&_v=j81&z=138789679
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=1265396894.1585155215&jid=852545703&_v=j81&z=138789679&slf_rd=1&random=3413212560
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=1265396894.1585155215&jid=852545703&_v=j81&z=138789679&slf_rd=1&random=3413212560
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 25 Mar 2020 16:53:35 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 25 Mar 2020 16:53:35 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=1265396894.1585155215&jid=852545703&_v=j81&z=138789679&slf_rd=1&random=3413212560
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 2B0B
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=4061625637&w=200&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214433&bpp=7&bdt=904&fdt=565&idt=566&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=2161&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=7&uci=a!7&btvi=3&fsb=1&xpc=7iRn8XwDyr&p=https%3A//www.hackread.com&dtd=571
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=4061625637&w=200&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214433&bpp=7&bdt=904&fdt=565&idt=566&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=2161&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=7&uci=a!7&btvi=3&fsb=1&xpc=7iRn8XwDyr&p=https%3A//www.hackread.com&dtd=571
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUmHydpiLrO2Pm4QMSTgs2-O655vQ1UzyhgUerg7o_hBo35hEn0PLHCR-nVY
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:53:35 GMT
server
cafe
content-length
205
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
ads
googleads.g.doubleclick.net/pagead/ Frame 308E
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=296273166&adf=1167544308&w=300&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214440&bpp=14&bdt=911&fdt=616&idt=616&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=2921&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=8&uci=a!8&btvi=4&fsb=1&xpc=fezAluslwI&p=https%3A//www.hackread.com&dtd=621
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=296273166&adf=1167544308&w=300&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214440&bpp=14&bdt=911&fdt=616&idt=616&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=2921&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=8&uci=a!8&btvi=4&fsb=1&xpc=fezAluslwI&p=https%3A//www.hackread.com&dtd=621
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUl4q6Xw8eldlQBZ7vqk-BsVZ3EXye5ZB20jb3m56AcYoDRcGn_yBB8jWHUl
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:53:35 GMT
server
cafe
content-length
205
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
ads
googleads.g.doubleclick.net/pagead/ Frame 06E4
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=3056409154&w=200&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214454&bpp=5&bdt=925&fdt=633&idt=633&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=3200&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=9&uci=a!9&btvi=5&fsb=1&xpc=PGSN1KnwGs&p=https%3A//www.hackread.com&dtd=640
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=3056409154&w=200&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214454&bpp=5&bdt=925&fdt=633&idt=633&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=3200&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=9&uci=a!9&btvi=5&fsb=1&xpc=PGSN1KnwGs&p=https%3A//www.hackread.com&dtd=640
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUl4q6Xw8eldlQBZ7vqk-BsVZ3EXye5ZB20jb3m56AcYoDRcGn_yBB8jWHUl
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:53:35 GMT
server
cafe
content-length
205
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
ads
googleads.g.doubleclick.net/pagead/ Frame EED8
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1506880035&w=200&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214459&bpp=4&bdt=930&fdt=653&idt=653&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=3200&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=10&uci=a!a&btvi=6&fsb=1&xpc=aMog6eocl0&p=https%3A//www.hackread.com&dtd=656
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1506880035&w=200&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214459&bpp=4&bdt=930&fdt=653&idt=653&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=3200&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=10&uci=a!a&btvi=6&fsb=1&xpc=aMog6eocl0&p=https%3A//www.hackread.com&dtd=656
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUl4q6Xw8eldlQBZ7vqk-BsVZ3EXye5ZB20jb3m56AcYoDRcGn_yBB8jWHUl
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:53:35 GMT
server
cafe
content-length
205
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
ads
googleads.g.doubleclick.net/pagead/ Frame CD48
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=296273166&adf=2095955190&w=300&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214463&bpp=5&bdt=934&fdt=696&idt=696&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=3692&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=11&uci=a!b&btvi=7&fsb=1&xpc=Gmj8ZKtveI&p=https%3A//www.hackread.com&dtd=702
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=296273166&adf=2095955190&w=300&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214463&bpp=5&bdt=934&fdt=696&idt=696&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=3692&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=11&uci=a!b&btvi=7&fsb=1&xpc=Gmj8ZKtveI&p=https%3A//www.hackread.com&dtd=702
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUmD8Wn7I2CnuLwzn03IyZOeVT2PBVBRwkmEcX9__goAi9TxN79lYclEG-4R
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:53:35 GMT
server
cafe
content-length
203
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
ads
googleads.g.doubleclick.net/pagead/ Frame 217A
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=3813488108&w=200&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214468&bpp=6&bdt=939&fdt=729&idt=729&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=3740&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=12&uci=a!c&btvi=8&fsb=1&xpc=3Gu3jMoVCQ&p=https%3A//www.hackread.com&dtd=735
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=3813488108&w=200&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214468&bpp=6&bdt=939&fdt=729&idt=729&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=3740&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=12&uci=a!c&btvi=8&fsb=1&xpc=3Gu3jMoVCQ&p=https%3A//www.hackread.com&dtd=735
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUmD8Wn7I2CnuLwzn03IyZOeVT2PBVBRwkmEcX9__goAi9TxN79lYclEG-4R
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:53:35 GMT
server
cafe
content-length
203
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
rev2.min.css
cdn.revcontent.com/build/css/
83 KB
26 KB
Stylesheet
General
Full URL
https://cdn.revcontent.com/build/css/rev2.min.css?v=b8105739289accd23ebdbf436f27bfccb40d2ffe
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
92092346680de76a5598060f7827a818c95b1ae9dc8b527d6123dca3778b51d9

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Wed, 25 Mar 2020 16:53:35 GMT
content-encoding
gzip
last-modified
Wed, 18 Mar 2020 21:50:06 GMT
access-control-allow-origin
*
etag
"1584568206"
x-hw
1585155215.cds121.am5.hn,1585155215.cds083.am5.c
content-type
text/css
status
200
cache-control
max-age=17
accept-ranges
bytes
content-length
26346
rev2.min.js
cdn.revcontent.com/build/js/
280 KB
98 KB
Script
General
Full URL
https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
de08c0b7fbe466f95d1706487b3d0c468598ea2a1b8becd8e174a5cd0de6bc42

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:53:35 GMT
content-encoding
gzip
last-modified
Wed, 18 Mar 2020 21:50:06 GMT
access-control-allow-origin
*
etag
"1584568206"
x-hw
1585155215.cds121.am5.hn,1585155215.cds140.am5.c
content-type
application/javascript
status
200
cache-control
max-age=60
accept-ranges
bytes
content-length
100286
score.min.js
js.ad-score.com/
281 KB
96 KB
Script
General
Full URL
https://js.ad-score.com/score.min.js?pid=1000177
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:1901:0:fcac:: , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
4c99f11609e3619943ac5c1a242de35d2f7feaa0f9f870b5fba38cf919370ed3

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 19:04:42 GMT
content-encoding
gzip
last-modified
Tue, 24 Mar 2020 19:04:42 GMT
age
78533
access-control-allow-methods
GET
content-type
application/javascript
status
200
alt-svc
clear
cache-control
public, max-age=86400
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
access-control-allow-origin
*
content-length
97809
via
1.1 google
expires
Wed, 25 Mar 2020 19:04:42 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 10EA
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=4145652818&w=200&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214474&bpp=9&bdt=945&fdt=787&idt=787&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399751929852&dssz=71&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=3740&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=13&uci=a!d&btvi=9&fsb=1&xpc=wk1L8ytDWE&p=https%3A//www.hackread.com&dtd=791
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=4145652818&w=200&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214474&bpp=9&bdt=945&fdt=787&idt=787&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399751929852&dssz=71&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=3740&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=13&uci=a!d&btvi=9&fsb=1&xpc=wk1L8ytDWE&p=https%3A//www.hackread.com&dtd=791
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUmD8Wn7I2CnuLwzn03IyZOeVT2PBVBRwkmEcX9__goAi9TxN79lYclEG-4R
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:53:35 GMT
server
cafe
content-length
205
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
ads
googleads.g.doubleclick.net/pagead/ Frame AB56
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=1082465236&adk=2250471325&adf=2036033552&w=570&fwrn=4&lmt=1585155215&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=570x90_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&fwr=0&wgl=1&adsid=NT&dt=1585155214483&bpp=7&bdt=954&fdt=812&idt=812&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399751929852&dssz=71&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=458&ady=3828&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=14&uci=a!e&btvi=10&fsb=1&xpc=gOECN7rFUA&p=https%3A//www.hackread.com&dtd=814
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=1082465236&adk=2250471325&adf=2036033552&w=570&fwrn=4&lmt=1585155215&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=570x90_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&fwr=0&wgl=1&adsid=NT&dt=1585155214483&bpp=7&bdt=954&fdt=812&idt=812&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399751929852&dssz=71&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=458&ady=3828&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=14&uci=a!e&btvi=10&fsb=1&xpc=gOECN7rFUA&p=https%3A//www.hackread.com&dtd=814
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUmD8Wn7I2CnuLwzn03IyZOeVT2PBVBRwkmEcX9__goAi9TxN79lYclEG-4R
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:53:35 GMT
server
cafe
content-length
203
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
ads
googleads.g.doubleclick.net/pagead/ Frame 1F12
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=600&slotname=3047884612&adk=2945537484&adf=1398944667&w=300&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&format=300x600&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214527&bpp=4&bdt=998&fdt=845&idt=845&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250%2C300x250%2C570x90_0ads_al&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399751929852&dssz=71&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1113&ady=945&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7Cm%7CoeE%7C&abl=NS&pfx=0&fu=16&bc=31&ifi=15&uci=a!f&fsb=1&xpc=UOvkhdKzuW&p=https%3A//www.hackread.com&dtd=849
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=600&slotname=3047884612&adk=2945537484&adf=1398944667&w=300&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&format=300x600&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214527&bpp=4&bdt=998&fdt=845&idt=845&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250%2C300x250%2C570x90_0ads_al&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399751929852&dssz=71&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1113&ady=945&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7Cm%7CoeE%7C&abl=NS&pfx=0&fu=16&bc=31&ifi=15&uci=a!f&fsb=1&xpc=UOvkhdKzuW&p=https%3A//www.hackread.com&dtd=849
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUmD8Wn7I2CnuLwzn03IyZOeVT2PBVBRwkmEcX9__goAi9TxN79lYclEG-4R
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 25 Mar 2020 16:53:35 GMT
server
cafe
content-length
9248
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
cors
data.ad-score.com/data/
42 B
711 B
XHR
General
Full URL
https://data.ad-score.com/data/cors?pm_st=JsdKPkyRLLHjfiosmKrLPurSoLOMUiAW-EU/fPcRldVPkNSMZ033JEknF-E0/JOc1gbVTqNA==&pm_ct=0f4d71ab87880a82fe02310d&pm_pl=1585155215516&pm_td=14&pid=1000177&en=1&callback=__pm_glbl_w5yICGlddW5hx9TSh2zww9D5._gc1&v=764caaa
Requested by
Host: js.ad-score.com
URL: https://js.ad-score.com/score.min.js?pid=1000177
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
130.211.115.4 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
4.115.211.130.bc.googleusercontent.com
Software
/
Resource Hash
c68832025754f8a9a7123117c7424c9463ef4e50012098f39fc4c8cc3337a6f1

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Wed, 25 Mar 2020 16:53:35 GMT
Age
0
Access-Control-Allow-Methods
POST
P3p
CP="CURa ADMa DEVa TAIi PSAi PSDi IVAi IVDi CONi HISa TELi OUR IND DSP CAO COR"
Access-Control-Allow-Origin
https://www.hackread.com
Cache-Control
post-check=0, pre-check=0, false, proxy-revalidate, no-cache, no-cache=Set-Cookie, no-store, must-revalidate, max-age=0, s-maxage=0
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/plain; charset=utf-8
Content-Length
42
a77a6c89-0b60-48f8-88ed-4ff34394595d
https://www.hackread.com/
720 B
0
Other
General
Full URL
blob:https://www.hackread.com/a77a6c89-0b60-48f8-88ed-4ff34394595d
Requested by
Host: js.ad-score.com
URL: https://js.ad-score.com/score.min.js?pid=1000177
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d2ec07a6e77bc3abc56f801e141e9889c018ca8e96dfbe4042f49378699ee85f

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
worker

Response headers

Content-Length
720
Content-Type
application/javascript
x.html
js.ad-score.com/ Frame 684E
0
0
Document
General
Full URL
https://js.ad-score.com/x.html?pid=1000177
Requested by
Host: js.ad-score.com
URL: https://js.ad-score.com/score.min.js?pid=1000177
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:1901:0:fcac:: , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

:method
GET
:authority
js.ad-score.com
:scheme
https
:path
/x.html?pid=1000177
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
date
Tue, 24 Mar 2020 19:04:08 GMT
content-type
text/html; charset=utf-8
accept-ranges
bytes
access-control-allow-credentials
true
access-control-allow-methods
GET
access-control-allow-origin
*
content-encoding
gzip
last-modified
Tue, 24 Mar 2020 18:41:10 GMT
via
1.1 google
content-length
5981
age
78567
cache-control
public, max-age=86400
alt-svc
clear
truncated
/
68 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5e89733d8a8e055100cda68bf7a712ab0e1b24fefee7e39792b47cb5ff7c3cb1

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
cors
data.ad-score.com/data/
1 B
272 B
XHR
General
Full URL
https://data.ad-score.com/data/cors?pm_st=JsdKPkyRLLHjfiosmKrLPurSoLOMUiAW-EU/fPcRldVPkNSMZ033JEknF-E0/JOc1gbVTqNA==&pm_ct=0f4d71ab87880a82fe02310d&pm_pl=1585155215516&pm_td=412&pid=1000177&en=1&callback=__pm_glbl_w5yICGlddW5hx9TSh2zww9D5._gc2&v=764caaa
Requested by
Host: js.ad-score.com
URL: https://js.ad-score.com/score.min.js?pid=1000177
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
130.211.115.4 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
4.115.211.130.bc.googleusercontent.com
Software
/
Resource Hash
5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Access-Control-Allow-Origin
https://www.hackread.com
Date
Wed, 25 Mar 2020 16:53:36 GMT
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
1
Access-Control-Allow-Methods
POST
Content-Type
text/plain; charset=utf-8
truncated
/
35 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/gif
imp.php
trends.revcontent.com/
0
205 B
XHR
General
Full URL
https://trends.revcontent.com/imp.php
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
63.34.125.93 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-63-34-125-93.eu-west-1.compute.amazonaws.com
Software
Apache/2.4.25 (Debian) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=931536000; includeSubDomains

Request headers

Accept
*/*
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Wed, 25 Mar 2020 16:53:36 GMT
server
Apache/2.4.25 (Debian)
status
200
strict-transport-security
max-age=931536000; includeSubDomains
content-type
text/html; charset=UTF-8
access-control-allow-origin
https://www.hackread.com
access-control-allow-credentials
true
content-length
0
cors
data.ad-score.com/data/
1 B
272 B
XHR
General
Full URL
https://data.ad-score.com/data/cors?pm_st=JsdKPkyRLLHjfiosmKrLPurSoLOMUiAW-EU/fPcRldVPkNSMZ033JEknF-E0/JOc1gbVTqNA==&pm_ct=0f4d71ab87880a82fe02310d&pm_pl=1585155215516&pm_td=505&pid=1000177&en=1&callback=__pm_glbl_w5yICGlddW5hx9TSh2zww9D5._gc3&v=764caaa
Requested by
Host: js.ad-score.com
URL: https://js.ad-score.com/score.min.js?pid=1000177
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
130.211.115.4 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
4.115.211.130.bc.googleusercontent.com
Software
/
Resource Hash
5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Access-Control-Allow-Origin
https://www.hackread.com
Date
Wed, 25 Mar 2020 16:53:36 GMT
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
1
Access-Control-Allow-Methods
POST
Content-Type
text/plain; charset=utf-8
cors
data.ad-score.com/data/
1 B
272 B
XHR
General
Full URL
https://data.ad-score.com/data/cors?pm_st=JsdKPkyRLLHjfiosmKrLPurSoLOMUiAW-EU/fPcRldVPkNSMZ033JEknF-E0/JOc1gbVTqNA==&pm_ct=0f4d71ab87880a82fe02310d&pm_pl=1585155215516&pm_td=563&pid=1000177&en=1&callback=__pm_glbl_w5yICGlddW5hx9TSh2zww9D5._gc4&v=764caaa
Requested by
Host: js.ad-score.com
URL: https://js.ad-score.com/score.min.js?pid=1000177
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
130.211.115.4 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
4.115.211.130.bc.googleusercontent.com
Software
/
Resource Hash
5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Access-Control-Allow-Origin
https://www.hackread.com
Date
Wed, 25 Mar 2020 16:53:36 GMT
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
1
Access-Control-Allow-Methods
POST
Content-Type
text/plain; charset=utf-8
cors
data.ad-score.com/data/
1 B
272 B
XHR
General
Full URL
https://data.ad-score.com/data/cors?pm_st=JsdKPkyRLLHjfiosmKrLPurSoLOMUiAW-EU/fPcRldVPkNSMZ033JEknF-E0/JOc1gbVTqNA==&pm_ct=0f4d71ab87880a82fe02310d&pm_pl=1585155215516&pm_td=745&pid=1000177&en=1&callback=__pm_glbl_w5yICGlddW5hx9TSh2zww9D5._gc5&v=764caaa
Requested by
Host: js.ad-score.com
URL: https://js.ad-score.com/score.min.js?pid=1000177
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
130.211.115.4 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
4.115.211.130.bc.googleusercontent.com
Software
/
Resource Hash
5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Access-Control-Allow-Origin
https://www.hackread.com
Date
Wed, 25 Mar 2020 16:53:36 GMT
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
1
Access-Control-Allow-Methods
POST
Content-Type
text/plain; charset=utf-8
cors
data.ad-score.com/data/
1 B
272 B
XHR
General
Full URL
https://data.ad-score.com/data/cors?pm_st=JsdKPkyRLLHjfiosmKrLPurSoLOMUiAW-EU/fPcRldVPkNSMZ033JEknF-E0/JOc1gbVTqNA==&pm_ct=0f4d71ab87880a82fe02310d&pm_pl=1585155215516&pm_td=842&pid=1000177&en=1&callback=__pm_glbl_w5yICGlddW5hx9TSh2zww9D5._gc6&v=764caaa
Requested by
Host: js.ad-score.com
URL: https://js.ad-score.com/score.min.js?pid=1000177
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
130.211.115.4 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
4.115.211.130.bc.googleusercontent.com
Software
/
Resource Hash
5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Access-Control-Allow-Origin
https://www.hackread.com
Date
Wed, 25 Mar 2020 16:53:36 GMT
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
1
Access-Control-Allow-Methods
POST
Content-Type
text/plain; charset=utf-8
sodar
pagead2.googlesyndication.com/getconfig/
7 KB
6 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gda&tv=r20200319&st=env
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
99d6cac40c8fdabc6fec73aa09f1c2f25ee36399ff77589da23577e3d08ed13a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 25 Mar 2020 16:53:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5088
x-xss-protection
0
/
img.revcontent.com/
46 KB
46 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/15801221400901971217.png&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
75075710368bda47a257ed7b18c7799b7400fdd7e0b9fc854e1b4cc12b509bfb

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:53:38 GMT
last-modified
Mon, 27 Jan 2020 10:49:01 GMT
etag
"1580122141"
x-hw
1585155218.cds029.am5.hn,1585155218.cds004.am5.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
46826
/
img.revcontent.com/
59 KB
59 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/5e70e2f83cb353-67835351.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
cca78b58201c1b982371dcf68961d416dcae3d84bb49608f2da15ed128e507e0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:53:38 GMT
last-modified
Tue, 17 Mar 2020 14:47:21 GMT
etag
"1584456441"
x-hw
1585155218.cds029.am5.hn,1585155218.cds013.am5.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
60079
/
img.revcontent.com/
57 KB
57 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/15752662701748374154.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
fca6ed39b3d202c616ab680f112ac83f14c03eb55abd5415b311b2262a4babac

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:53:38 GMT
last-modified
Mon, 02 Dec 2019 05:57:51 GMT
etag
"1575266271"
x-hw
1585155218.cds029.am5.hn,1585155218.cds143.am5.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
57899
/
img.revcontent.com/
24 KB
24 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/15729741680091955400.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
5e35fe89a6f3fa478624998b26258ebfa9d912c534f5d8fccd8cb54aa043ea76

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:53:38 GMT
last-modified
Tue, 05 Nov 2019 17:16:10 GMT
etag
"1572974170"
x-hw
1585155218.cds029.am5.hn,1585155218.cds006.am5.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
24195
/
img.revcontent.com/
34 KB
34 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/5e78b0ff47d4a4-07431216.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
5a6abe671a7791aa29fb805870467bd8592bba5c5f84ef5c05ff991535b4bc53

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:53:38 GMT
last-modified
Mon, 23 Mar 2020 12:52:16 GMT
etag
"1584967936"
x-hw
1585155218.cds029.am5.hn,1585155218.cds121.am5.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
34565
/
img.revcontent.com/
57 KB
57 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/9955ebc35862110f040d95fd5464fb28.jpeg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
222f07f569fef2250cca005e5ffd50d28e32992be5a4ecaa38ebd46a7ce11997

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:53:38 GMT
last-modified
Thu, 16 Jan 2020 22:37:52 GMT
etag
"1579214272"
x-hw
1585155218.cds029.am5.hn,1585155218.cds128.am5.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
58079
/
img.revcontent.com/
45 KB
45 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/15598363901880845829.png&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
ecbd550ca05f984d786910c643aa8906945f78fa09b5f31b9b6b826c0035fe18

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:53:38 GMT
last-modified
Thu, 06 Jun 2019 15:53:11 GMT
etag
"1559836391"
x-hw
1585155218.cds029.am5.hn,1585155218.cds133.am5.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
46224
/
img.revcontent.com/
56 KB
56 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/15638930661450943390.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
a3006a4ba1788aa66cc66f4c99560718fc23c57044da1cc36c4fbae740999520

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:53:38 GMT
last-modified
Tue, 23 Jul 2019 14:44:27 GMT
etag
"1563893067"
x-hw
1585155218.cds029.am5.hn,1585155218.cds110.am5.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
57447
/
img.revcontent.com/
30 KB
30 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/15638280240882112983.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
c535929fe3220d5ae520484038c48759686d06764d90cc5789b07be0c7a0125a

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 25 Mar 2020 16:53:38 GMT
last-modified
Mon, 22 Jul 2019 20:40:25 GMT
etag
"1563828025"
x-hw
1585155218.cds029.am5.hn,1585155218.cds109.am5.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
30857
sodar2.js
tpc.googlesyndication.com/sodar/
14 KB
5 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a47f17d6ebbf4621d8fe87ab790d8d8fb5c3086629194d9ff2d64faaa6e46ab6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 25 Mar 2020 16:53:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1582746470043195"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5456
x-xss-protection
0
expires
Wed, 25 Mar 2020 16:53:38 GMT
cors
data.ad-score.com/data/
1 B
272 B
XHR
General
Full URL
https://data.ad-score.com/data/cors?pm_st=JsdKPkyRLLHjfiosmKrLPurSoLOMUiAW-EU/fPcRldVPkNSMZ033JEknF-E0/JOc1gbVTqNA==&pm_ct=0f4d71ab87880a82fe02310d&pm_pl=1585155215516&pm_td=2942&pid=1000177&en=1&callback=__pm_glbl_w5yICGlddW5hx9TSh2zww9D5._gc7&v=764caaa
Requested by
Host: js.ad-score.com
URL: https://js.ad-score.com/score.min.js?pid=1000177
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
130.211.115.4 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
4.115.211.130.bc.googleusercontent.com
Software
/
Resource Hash
5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Access-Control-Allow-Origin
https://www.hackread.com
Date
Wed, 25 Mar 2020 16:53:38 GMT
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
1
Access-Control-Allow-Methods
POST
Content-Type
text/plain; charset=utf-8
runner.html
tpc.googlesyndication.com/sodar/sodar2/209/ Frame E4DC
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/209/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
5727
date
Wed, 25 Mar 2020 16:28:56 GMT
expires
Thu, 25 Mar 2021 16:28:56 GMT
last-modified
Tue, 25 Feb 2020 17:32:01 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
1482
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
gen_204
pagead2.googlesyndication.com/pagead/
0
54 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=209&t=2&li=gda_r20200319&jk=2980027295595708&bg=!MjGlMSlYRra9lFhFcNYCAAAAhVIAAAAfmQFcub1HXmyE8HvlvQt0qeWPQ7tGCdCl389ZRlwhzoIILCQWUymgpLPC4icjp7PYifU4EoWwqGJivITUs2pXnFNF-CDD3BIOm1y5PIxVorVQYr99pt4ux0cBa74Kaeio6shkofeDn_wf-HLHVavZ00yPiu7LjwREUlo2ygX2Z9QzRemPDe28NmPBopos97F0XgZnh--KbmCRTIyjOPuommYLoQ23qysV5xI6aCGbRgVhVSrvBDUmII1EA1mqTm1Og_DZAfge4TFo1rWiwBlEAcmE01Yfjl6qQr5xQ0Mn0w6t0BVeYfLDc3iSI9zzRtsWX9rKzHA9lTvXa0sdz71PMur6ctwKnVzB9cxyWPNq88I2GnW4Re82WU7JVHA-_mcC5Ycd-1lHhkcMiYQgqNFWmuIhkakUN4bf5IKHAdQ-XWRTqwkqGfz1G4MhBEU-rcg9S4lh6gd_FBdQWyIxXHFd
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Wed, 25 Mar 2020 16:53:38 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Verdicts & Comments Add Verdict or Comment

123 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| WebFontConfig object| _wpemojiSettings object| webfont object| WebFont object| twemoji object| wp undefined| $ function| jQuery object| cookieconsent number| initStickyMenu object| adsbygoogle object| google_js_reporting_queue number| google_srt object| google_ad_modifications object| google_logging_queue object| ggeac boolean| google_measure_js_timing object| googleToken object| googleIMState function| processGoogleToken object| google_reactive_ads_global_state boolean| _gfp_a_ object| google_sa_queue object| google_sl_win function| google_process_slots boolean| google_apltlad boolean| _gfp_p_ function| google_spfd number| google_lpabyc number| google_unique_id object| google_sv_map object| google_t12n_vars boolean| miptheme_smooth_scrolling number| miptheme_ajaxpagination_timer number| miptheme_sticky_sidebar_margin number| miptheme_parallax_image_height object| mipthemeLocalCache object| wpcf7 object| mashsb undefined| strict object| thirsty_global_vars object| thirstyFunctions object| jQuery1124006929800867637792 function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter function| google_sa_impl object| google_jobrunner object| google_persistent_state_async object| __google_ad_urls number| google_global_correlator number| __google_ad_urls_id object| google_prev_clients object| gaGlobal object| ampInaboxIframes object| ampInaboxPendingMessages object| google_iframe_oncopy boolean| google_osd_loaded boolean| google_onload_fired function| SocialMediaStats function| smooth_scroll function| setCookie function| getCookie object| _photobox function| wNumb function| Cookies function| shareSelectedText object| miptheme_ajax_url function| setVideoHeights object| miptheme_ajax_post_views object| addComment function| gtag object| dataLayer object| google_tag_manager function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb string| GoogleAnalyticsObject function| ga object| ak_js object| commentForm undefined| replyRowContainer undefined| children object| google_tag_data object| gaplugins object| gaData boolean| clean_io_required object| rc_head object| rc_body object| rc2css object| rc2js object| rc2js_beacon_5e7b8c8f1cee6 object| rcel object| rcds object| beaconNoScript object| rc_segmented_creatives object| rc_segmented_widgets object| rc_loaded_widgets undefined| rc_chosen_interests number| rc_loader_limit number| rc_loader_runs object| rc_loaded_hashes object| rcsc object| RevContentLoader string| rc_p_uuid number| provider string| do_branding object| Base64 function| rcjq boolean| scrolled boolean| swiped boolean| resized boolean| rc_segments_sent function| Hammer object| __pm_glbl object| __pm_glbl_w5yICGlddW5hx9TSh2zww9D5 object| __pm_ads_list string| AdScoreObject function| adScore object| jQuery11020024130890283945883 object| GoogleGcLKhOms object| google_image_requests

8 Cookies

Domain/Path Name / Value
js.ad-score.com/ Name: pme
Value: EcNfjLHVUGlV
.doubleclick.net/ Name: IDE
Value: AHWqTUmD8Wn7I2CnuLwzn03IyZOeVT2PBVBRwkmEcX9__goAi9TxN79lYclEG-4R
.redintelligence.net/ Name: 8lcfmzhxc8d6_uid
Value: fcd603c11757bfec
www.hackread.com/ Name: pmtimesig
Value: [[1585155215531,0]]
js.ad-score.com/ Name: pmah
Value: {"a":0,"t":1,"s":1585155215866}
.hackread.com/ Name: _gat_gtag_UA_36230183_1
Value: 1
.hackread.com/ Name: _gid
Value: GA1.2.1534548082.1585155215
.hackread.com/ Name: _ga
Value: GA1.2.1265396894.1585155215

4 Console Messages

Source Level URL
Text
console-api log URL: https://www.hackread.com/wp-includes/js/jquery/jquery-migrate.min.js(Line 2)
Message:
JQMIGRATE: Migrate is installed, version 1.4.1
console-api log URL: https://www.hackread.com/wp-content/plugins/mashsharer/assets/js/mashsb.min.js(Line 1)
Message:
not rate limited: 1585155242
console-api log URL: https://js.ad-score.com/score.min.js?pid=1000177(Line 181)
Message:
[object Text]
console-api debug URL: https://js.ad-score.com/score.min.js?pid=1000177(Line 156)
Message:

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

adservice.google.com
adservice.google.de
ajax.googleapis.com
b1sync.zemanta.com
bttrack.com
cdn.revcontent.com
cdnjs.cloudflare.com
data.ad-score.com
fonts.googleapis.com
fonts.gstatic.com
googleads.g.doubleclick.net
green.erne.co
ib.adnxs.com
img.revcontent.com
js.ad-score.com
pagead2.googlesyndication.com
rtb.mfadsrvr.com
secure.gravatar.com
stats.g.doubleclick.net
tpc.googlesyndication.com
trends.revcontent.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
www.hackread.com
x.bidswitch.net
130.211.115.4
151.139.128.10
18.184.169.93
185.33.223.204
192.132.33.46
2600:1901:0:fcac::
2606:4700::6811:4104
2a00:1450:4001:800::2002
2a00:1450:4001:800::2008
2a00:1450:4001:806::2004
2a00:1450:4001:808::200a
2a00:1450:4001:816::200a
2a00:1450:4001:817::200e
2a00:1450:4001:81b::2001
2a00:1450:4001:81c::2003
2a00:1450:4001:825::2003
2a00:1450:400c:c00::9c
2a04:fa87:fffe::c000:4902
52.29.122.216
63.34.125.93
67.227.194.195
70.42.32.95
94.23.144.220
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
0500bd58f47403106f2f10da96d8d196941a02a4046e88611a59494557861f98
0515cbd1f8aee97e1c8e0d1d015ca96c86def13e90d2e73bf813072ccc23d531
0841e797e3cdaa7b96e012d02451295da6c035e6c61733ff162f6cfac7dd24ba
106d020c501875011ff5aab5034da42ba83e096c17f901fda9e8f4c92ecde8b4
1392c66fd47cf940b980aa04cf6aad81b7bba5dc75894f692ba806ef2a3a5eb6
1db21d816296e6939ba1f42962496e4134ae2b0081e26970864c40c6d02bb1df
1fea51227a0d0a882dcf26ad5791bdf3bbb79958e076630e86427a8266300a2a
2152557cac69e2bd7d6debef5037a9f554f9209cc305b8141b3329acb10c42b7
222f07f569fef2250cca005e5ffd50d28e32992be5a4ecaa38ebd46a7ce11997
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe
31c020e98d623d9d86a904d64f4b923726a1ab664bff40a7550866ea2d4f5e03
31cb76c05cbf5d71466f93078e8ba0f6e39cd92d0acc86d385b8cf2899963695
31fbd99641c212a6ad3681a2397bde13c148c0ccd98385bce6a7eb7c81417d87
3329ee5bb1edc52b18015e9bdedd275415080788f9c1fdd7165bca609874c9c5
351e508c1da4f9d1535747086accb41121466a52044aa868eba4a36009fdb101
36ed85dd058e4c2843e06146946e0ff1f9ace65760c22af5eb4f1b22319dddb5
36ef095d011c4ced97b0acef551ca36d76b95299518595dc1acab792a2344601
37cca5e57f95b1b176e0f578b882175174b47204739b81b4ef52e66383eb5da3
3ac3228e00d2bbbcb08bb7c5586e8744512c0c43c3cf13b2b5df10cd75e6040a
3c005dba1d518d8fcd6bb8b0cd5264947d7c8c5b53363556d98c453428a376ef
48eb8b500ae6a38617b5738d2b3faec481922a7782246e31d2755c034a45cd5d
4a4de7903ea62d330e17410ea4db6c22bcbeb350ac6aa402d6b54b4c0cbed327
4b8fe5c3d0e5ef7a6582185cbf5c535b5d369c8df1da98c03ed69833e55f474d
4c99f11609e3619943ac5c1a242de35d2f7feaa0f9f870b5fba38cf919370ed3
53bb543544f977b6fe13f135cec807e6ae3f789037c2854117ea77547db010c4
56800b0f8b907015c53a2337585f8a6a12ad6a51e6501c347ceb17055641e999
5860e3441be752ad6ac03ce00d3965ed4de1f162dc5152aced616041b507fb46
5a6abe671a7791aa29fb805870467bd8592bba5c5f84ef5c05ff991535b4bc53
5d1bc9b443f3f81fa4b4ad4634c1bb9702194c1898e3a9de0ab5e2cdc0e9f479
5e35fe89a6f3fa478624998b26258ebfa9d912c534f5d8fccd8cb54aa043ea76
5e89733d8a8e055100cda68bf7a712ab0e1b24fefee7e39792b47cb5ff7c3cb1
5e98805013c507fe66d11c49fb428e28546821dc69c00cf0d4caea227542e7b9
5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
63f0d921cde3442ee319b51ae162fe49f1e28d0dd19ba634f235e71119a01055
6a0c466dd72e7d2fdd6ed71f97d8b6901714d154c572aeee1f18685ff30c92f2
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992
745caffca4b97cf5cf2374d82c6dfb6fb7c7b694e85432f92ec4dcb35f4418c9
75075710368bda47a257ed7b18c7799b7400fdd7e0b9fc854e1b4cc12b509bfb
79b378e8f3c1fece39a1472a2e7d920ab80eb5881525a1622d9dbaa954aa23c3
811e8960b8f79f14983e30df80a4ccc69d82430ccc0520d2a1a3d1405cfbb2a1
81d1aa922759e01b41a5290dcf461e8664d016d18cc24da57bfa6a06c98a8786
8afc1a2899ec2d2c29c203e17c69fe00b369d1aec1634a58653208d6db298958
90c59d72a87cb9ded609ce96b3752908e2ac97c6d199d8f2e815f270ce5c5f53
92092346680de76a5598060f7827a818c95b1ae9dc8b527d6123dca3778b51d9
99d6cac40c8fdabc6fec73aa09f1c2f25ee36399ff77589da23577e3d08ed13a
9d7611ff9ab02663f7cc226fef2c6e9b6f24402640bd037409ec94d9b088585b
a13a1fe4a87c09c6e9122834b5351f80012e2c539b32bc1d33c6982efab21b4b
a3006a4ba1788aa66cc66f4c99560718fc23c57044da1cc36c4fbae740999520
a47f17d6ebbf4621d8fe87ab790d8d8fb5c3086629194d9ff2d64faaa6e46ab6
a83b6dc4e04e6e657a3c36c83d61e410ac5ef9615e0c3dfcf3c454cde68bf243
afe9c8752a20b726104d37ce2f099e89eba3b62bb31a3307c5a9bbf9de3c2e2d
b5b0cab3bf2be0ec59bd3b301364a639d993e99d0d526e436442065b9406067b
b7e17926b30342edecee8b3a93029ac51462e2b479277d8e077ba57173eb1900
c30768df1b5c99e68664ae0ed7db9b2bc95e1c89e9e5c01b5ef92a408c3e6b13
c4289b26e4f32f2fdd514a4d1deb6aa6dca1f4e8e9989c1dc042eb20b29df57b
c535929fe3220d5ae520484038c48759686d06764d90cc5789b07be0c7a0125a
c68832025754f8a9a7123117c7424c9463ef4e50012098f39fc4c8cc3337a6f1
c89ff58885f6c99c896f0d833df56bd3ffd048276624c7b31b934cadc9e57ee1
c9dffa6a9bb791cd61eb337b47b34482cce48ded9fc7504c24d8dfab9e237bd1
ca78abe6a4c7431cdfdcead48913da3139b1d54bf09eea0582513954c2d2f1d1
cb41292903f6bd996333bdfe6fbc58e1dbdb6109074505ee3ea46373bb23be70
cca78b58201c1b982371dcf68961d416dcae3d84bb49608f2da15ed128e507e0
cd605c7d4107ef5b9d511b13cb1e053db59d2daa7df99e1e5754e54c0c7cec87
ce677696c57a6b97fee81d149546716b76f236cf7bb35845fa771feb91914f95
d2ec07a6e77bc3abc56f801e141e9889c018ca8e96dfbe4042f49378699ee85f
d343d38c960176d290455cd76eef64f1d71f73961fc16c87945382a6a66af14f
de08c0b7fbe466f95d1706487b3d0c468598ea2a1b8becd8e174a5cd0de6bc42
dfbf744b87270c5e4148371216220d1421d01dfdbf7ad35afff64763cb852484
e1240b4fff3ba45047d409abd5d38143700a153ae349b17cea437e16e3a71fc1
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
eaf1b128b927ac2868755cb7366d35554255c8af362235afe270f9614f8c806d
ecbd550ca05f984d786910c643aa8906945f78fa09b5f31b9b6b826c0035fe18
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
f4799ef2939b8377cf33f07b07b6d90a4a245adbf1c6eaf47ee3b0fcefcc07fe
f9934e8ca51663923f923910d8b0ac7e849f46e87f65f75fcd513dac5e9f16d5
fca6ed39b3d202c616ab680f112ac83f14c03eb55abd5415b311b2262a4babac