www.hackread.com
Open in
urlscan Pro
67.227.194.195
Public Scan
Effective URL: https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Submission: On March 25 via api from US
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on February 13th 2020. Valid for: 3 months.
This is the only time www.hackread.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
ASN15169 (GOOGLE, US)
pagead2.googlesyndication.com | |
adservice.google.de | |
adservice.google.com | |
googleads.g.doubleclick.net | |
www.googletagservices.com |
ASN15169 (GOOGLE, US)
www.googletagmanager.com |
ASN16509 (AMAZON-02, US)
PTR: ec2-63-34-125-93.eu-west-1.compute.amazonaws.com
trends.revcontent.com |
ASN29990 (ASN-APPNEX, US)
PTR: 319.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
ib.adnxs.com |
ASN16509 (AMAZON-02, US)
PTR: ec2-52-29-122-216.eu-central-1.compute.amazonaws.com
x.bidswitch.net |
ASN16509 (AMAZON-02, US)
PTR: ec2-18-184-169-93.eu-central-1.compute.amazonaws.com
rtb.mfadsrvr.com |
ASN15169 (GOOGLE, US)
www.google-analytics.com |
ASN20446 (HIGHWINDS3, US)
cdn.revcontent.com | |
img.revcontent.com |
ASN15169 (GOOGLE, US)
PTR: 4.115.211.130.bc.googleusercontent.com
data.ad-score.com |
ASN15169 (GOOGLE, US)
tpc.googlesyndication.com |
Domain | Requested by | |
---|---|---|
41 | www.hackread.com |
1 redirects
www.hackread.com
ajax.googleapis.com |
17 | googleads.g.doubleclick.net |
pagead2.googlesyndication.com
|
9 | img.revcontent.com |
cdn.revcontent.com
|
7 | data.ad-score.com |
js.ad-score.com
|
7 | trends.revcontent.com |
www.hackread.com
trends.revcontent.com cdn.revcontent.com |
4 | pagead2.googlesyndication.com |
www.hackread.com
pagead2.googlesyndication.com |
3 | x.bidswitch.net | 3 redirects |
3 | secure.gravatar.com |
www.hackread.com
|
2 | tpc.googlesyndication.com |
pagead2.googlesyndication.com
tpc.googlesyndication.com |
2 | js.ad-score.com |
www.hackread.com
js.ad-score.com |
2 | cdn.revcontent.com |
www.hackread.com
|
2 | www.google-analytics.com |
1 redirects
www.googletagmanager.com
|
2 | rtb.mfadsrvr.com | 2 redirects |
2 | ib.adnxs.com | 2 redirects |
2 | b1sync.zemanta.com | 2 redirects |
2 | fonts.gstatic.com |
ajax.googleapis.com
|
2 | cdnjs.cloudflare.com |
www.hackread.com
|
1 | www.google.de |
www.hackread.com
|
1 | www.google.com | 1 redirects |
1 | stats.g.doubleclick.net | 1 redirects |
1 | bttrack.com |
www.hackread.com
|
1 | green.erne.co | 1 redirects |
1 | www.googletagservices.com |
pagead2.googlesyndication.com
|
1 | adservice.google.com |
pagead2.googlesyndication.com
|
1 | adservice.google.de |
pagead2.googlesyndication.com
|
1 | www.googletagmanager.com |
www.hackread.com
|
1 | fonts.googleapis.com |
ajax.googleapis.com
|
1 | ajax.googleapis.com |
www.hackread.com
|
107 | 28 |
This site contains links to these domains. Also see Links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
hackread.com Let's Encrypt Authority X3 |
2020-02-13 - 2020-05-13 |
3 months | crt.sh |
cloudflare.com CloudFlare Inc ECC CA-2 |
2020-01-07 - 2020-10-09 |
9 months | crt.sh |
*.storage.googleapis.com GTS CA 1O1 |
2020-03-03 - 2020-05-26 |
3 months | crt.sh |
*.google.com GTS CA 1O1 |
2020-03-03 - 2020-05-26 |
3 months | crt.sh |
*.gravatar.com COMODO RSA Domain Validation Secure Server CA |
2018-09-06 - 2020-09-05 |
2 years | crt.sh |
*.g.doubleclick.net GTS CA 1O1 |
2020-03-03 - 2020-05-26 |
3 months | crt.sh |
*.google-analytics.com GTS CA 1O1 |
2020-03-03 - 2020-05-26 |
3 months | crt.sh |
revcontent.com Amazon |
2019-09-19 - 2020-10-19 |
a year | crt.sh |
*.bttrack.com Sectigo RSA Domain Validation Secure Server CA |
2019-03-19 - 2021-04-13 |
2 years | crt.sh |
www.google.de GTS CA 1O1 |
2020-03-03 - 2020-05-26 |
3 months | crt.sh |
cdn.revcontent.com Sectigo RSA Domain Validation Secure Server CA |
2020-02-09 - 2020-05-09 |
3 months | crt.sh |
*.ad-score.com Go Daddy Secure Certificate Authority - G2 |
2019-09-02 - 2020-11-01 |
a year | crt.sh |
img.revcontent.com Sectigo RSA Domain Validation Secure Server CA |
2020-02-09 - 2020-05-09 |
3 months | crt.sh |
tpc.googlesyndication.com GTS CA 1O1 |
2020-03-03 - 2020-05-26 |
3 months | crt.sh |
This page contains 20 frames:
Primary Page:
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/
Frame ID: D718EA4B7B4AF94414C4C4084E2A50A9
Requests: 91 HTTP requests in this frame
Frame:
https://googleads.g.doubleclick.net/pagead/html/r20200319/r20190131/zrt_lookup.html
Frame ID: BFCD07D1F5B62D8DAAAA58EBD16BC411
Requests: 1 HTTP requests in this frame
Frame:
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1024134837&w=200&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214376&bpp=27&bdt=847&fdt=203&idt=203&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&correlator=1984266593890&frm=20&pv=2&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3565349704969215&dssz=58&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=306&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2980027295595708&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=1&uci=a!1&fsb=1&xpc=UGc4JhFIOl&p=https%3A//www.hackread.com&dtd=233
Frame ID: F9AE82AD702076C1BE0DF0392169AE23
Requests: 1 HTTP requests in this frame
Frame:
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=301552094&w=200&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214403&bpp=5&bdt=874&fdt=309&idt=309&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_slotnames=5266209419&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399743279103&dssz=64&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=1026&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2980027295595708&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=2&uci=a!2&fsb=1&xpc=QurURhVPbd&p=https%3A//www.hackread.com&dtd=314
Frame ID: E70ECD9B70C352005AAE39A95340073B
Requests: 1 HTTP requests in this frame
Frame:
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&adk=1812271804&adf=3025194257&lmt=1585155214&plat=1%3A32776%2C2%3A16809992%2C8%3A134250504%2C9%3A134250504%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&ea=0&flash=0&pra=7&wgl=1&adsid=NT&dt=1585155214793&bpp=4&bdt=1264&fdt=5&idt=5&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_slotnames=5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=68&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2980027295595708&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&ifi=16&uci=a!g&fsb=1&dtd=17
Frame ID: 8A6AC2C4B504AD4F5551A6D62223AC6A
Requests: 1 HTTP requests in this frame
Frame:
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=3012150858&w=200&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214408&bpp=6&bdt=879&fdt=408&idt=409&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0&prev_slotnames=5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=68&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=1125&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=3&uci=a!3&fsb=1&xpc=cN0iKBus9k&p=https%3A//www.hackread.com&dtd=421
Frame ID: 153D346B51CC54D3B42C8037F92A8042
Requests: 1 HTTP requests in this frame
Frame:
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1854264899&w=200&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214414&bpp=6&bdt=885&fdt=457&idt=457&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0&prev_slotnames=5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=68&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=1125&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=4&uci=a!4&fsb=1&xpc=6HtRi0ePCf&p=https%3A//www.hackread.com&dtd=462
Frame ID: FED5902D8B4F5328A66B63C7E1257A22
Requests: 1 HTTP requests in this frame
Frame:
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=296273166&adf=1489503786&w=300&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214420&bpp=7&bdt=891&fdt=508&idt=508&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=1882&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=5&uci=a!5&btvi=1&fsb=1&xpc=sLOdx45KA0&p=https%3A//www.hackread.com&dtd=537
Frame ID: 14AA803047CF5B4B518857A27E0A336E
Requests: 1 HTTP requests in this frame
Frame:
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1075612886&w=200&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214428&bpp=5&bdt=899&fdt=540&idt=540&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=2161&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=6&uci=a!6&btvi=2&fsb=1&xpc=5YBS4HyhIz&p=https%3A//www.hackread.com&dtd=545
Frame ID: DC428F412ECDF49A3F28DAB45327F370
Requests: 1 HTTP requests in this frame
Frame:
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=4061625637&w=200&lmt=1585155214&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214433&bpp=7&bdt=904&fdt=565&idt=566&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=2161&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=7&uci=a!7&btvi=3&fsb=1&xpc=7iRn8XwDyr&p=https%3A//www.hackread.com&dtd=571
Frame ID: 2B0B1A72D882951EFF09F231B2BD250E
Requests: 1 HTTP requests in this frame
Frame:
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=296273166&adf=1167544308&w=300&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214440&bpp=14&bdt=911&fdt=616&idt=616&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=2921&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=8&uci=a!8&btvi=4&fsb=1&xpc=fezAluslwI&p=https%3A//www.hackread.com&dtd=621
Frame ID: 308EE55E4365B03CD02D8E379FC71086
Requests: 1 HTTP requests in this frame
Frame:
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=3056409154&w=200&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214454&bpp=5&bdt=925&fdt=633&idt=633&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=3200&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=9&uci=a!9&btvi=5&fsb=1&xpc=PGSN1KnwGs&p=https%3A//www.hackread.com&dtd=640
Frame ID: 06E45FDF193DB9C63365162650A6B493
Requests: 1 HTTP requests in this frame
Frame:
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=1506880035&w=200&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214459&bpp=4&bdt=930&fdt=653&idt=653&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=3200&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=10&uci=a!a&btvi=6&fsb=1&xpc=aMog6eocl0&p=https%3A//www.hackread.com&dtd=656
Frame ID: EED891CEA1B875C5729A3D6AFE701941
Requests: 1 HTTP requests in this frame
Frame:
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=296273166&adf=2095955190&w=300&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214463&bpp=5&bdt=934&fdt=696&idt=696&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=3692&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=11&uci=a!b&btvi=7&fsb=1&xpc=Gmj8ZKtveI&p=https%3A//www.hackread.com&dtd=702
Frame ID: CD48DFCC2212A3E39D0576577A80B213
Requests: 1 HTTP requests in this frame
Frame:
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=3813488108&w=200&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214468&bpp=6&bdt=939&fdt=729&idt=729&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399718375420&dssz=69&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=541&ady=3740&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=12&uci=a!c&btvi=8&fsb=1&xpc=3Gu3jMoVCQ&p=https%3A//www.hackread.com&dtd=735
Frame ID: 217A9F7ACC6333BBFE633727416267BF
Requests: 1 HTTP requests in this frame
Frame:
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=5266209419&adk=2177846468&adf=4145652818&w=200&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214474&bpp=9&bdt=945&fdt=787&idt=787&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399751929852&dssz=71&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=746&ady=3740&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=13&uci=a!d&btvi=9&fsb=1&xpc=wk1L8ytDWE&p=https%3A//www.hackread.com&dtd=791
Frame ID: 10EA1FEF323093BAC2F5B322E9D196D2
Requests: 1 HTTP requests in this frame
Frame:
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=1082465236&adk=2250471325&adf=2036033552&w=570&fwrn=4&lmt=1585155215&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=570x90_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&fwr=0&wgl=1&adsid=NT&dt=1585155214483&bpp=7&bdt=954&fdt=812&idt=812&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250%2C300x250&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399751929852&dssz=71&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=458&ady=3828&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=14&uci=a!e&btvi=10&fsb=1&xpc=gOECN7rFUA&p=https%3A//www.hackread.com&dtd=814
Frame ID: AB56EC38BCB643FCCE11FFA98023A06F
Requests: 1 HTTP requests in this frame
Frame:
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=600&slotname=3047884612&adk=2945537484&adf=1398944667&w=300&lmt=1585155215&psa=0&guci=1.2.0.0.2.2.0.0&format=300x600&url=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&flash=0&wgl=1&adsid=NT&dt=1585155214527&bpp=4&bdt=998&fdt=845&idt=845&shv=r20200319&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250%2C300x250%2C300x250%2C570x90_0ads_al&prev_slotnames=5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419%2C5266209419&nras=1&correlator=1984266593890&frm=20&pv=1&ga_vid=1265396894.1585155215&ga_sid=1585155215&ga_hid=665796197&ga_fc=0&iag=0&icsg=3002399751929852&dssz=71&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1113&ady=945&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQYTKkoi1aPcjPnkYLghCB96RN8NBEzsfhBgYa081PTsImMMaMp8f0%2CABP-KfT8985lfijMh9asPX7Cu_pmcr6GEm1zV8hGSw13Jjj6Bvx9gFkOX7U%2CABP-KfSRYsJ1af0iRToYOpfnYOzhJS94PGE4b_K176llm0PFxLBhOX6vBWU%2CABP-KfSF2KqgXi1iIoJrk5NoafA0tInsRoMQMhpg6RMGSGvf5QP3QTriLdU&pvsid=2980027295595708&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7Cm%7CoeE%7C&abl=NS&pfx=0&fu=16&bc=31&ifi=15&uci=a!f&fsb=1&xpc=UOvkhdKzuW&p=https%3A//www.hackread.com&dtd=849
Frame ID: 1F12C9628BF957168B316FB77FB21832
Requests: 1 HTTP requests in this frame
Frame:
https://js.ad-score.com/x.html?pid=1000177
Frame ID: 684E2C74805A54C1E5FD70A4CAC036AA
Requests: 1 HTTP requests in this frame
Frame:
https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Frame ID: E4DC1A3D8F22C4C06A801D28EC056CFB
Requests: 1 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://www.hackread.com/coronavirus-extort=
HTTP 301
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/ Page URL
Detected technologies
WordPress (CMS) ExpandDetected patterns
- html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
- script /\/wp-(?:content|includes)\//i
- headers link /rel="https:\/\/api\.w\.org\/"/i
PHP (Programming Languages) Expand
Detected patterns
- html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
- script /\/wp-(?:content|includes)\//i
- headers link /rel="https:\/\/api\.w\.org\/"/i
MySQL (Databases) Expand
Detected patterns
- html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
- script /\/wp-(?:content|includes)\//i
- headers link /rel="https:\/\/api\.w\.org\/"/i
Bootstrap (Web Frameworks) Expand
Detected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Google AdSense (Advertising Networks) Expand
Detected patterns
- script /googlesyndication\.com\//i
Google Analytics (Analytics) Expand
Detected patterns
- script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i
Google Font API (Font Scripts) Expand
Detected patterns
- script /googleapis\.com\/.+webfont/i
Page Statistics
31 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Sophos
Search URL Search Domain Scan URL
Title: IPVanish
Search URL Search Domain Scan URL
Title: Share on Facebook
Search URL Search Domain Scan URL
Title: Share on Twitter
Search URL Search Domain Scan URL
Title: ExecuteMalware
Search URL Search Domain Scan URL
Title: Ncov2019.live
Search URL Search Domain Scan URL
Title: live map
Search URL Search Domain Scan URL
Title: Facebook
Search URL Search Domain Scan URL
Title: Facebook
Search URL Search Domain Scan URL
Title: Twitter
Search URL Search Domain Scan URL
Title: Google+
Search URL Search Domain Scan URL
Title: LinkedIn
Search URL Search Domain Scan URL
Title: Pinterest
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: If Your Partner Uses These Too Often - the Relationship is over
Search URL Search Domain Scan URL
Title: Doctors Stunned: This Melts Belly Fat Like Crazy! (Try Tonight)
Search URL Search Domain Scan URL
Title: Dermatologists Stunned by Gran's Easy Wrinkle Removal Tip
Search URL Search Domain Scan URL
Title: New 'Genius Pill' Finally Legalized! IQ Booster (Try It)
Search URL Search Domain Scan URL
Title: New 'Legal Steroid' Turning Men into Beasts
Search URL Search Domain Scan URL
Title: Doing This Simple Morning Ritual Might Help You Get Rid of Stubborn Body Fat!
Search URL Search Domain Scan URL
Title: Put Garlic Under Your Pillow and This Will Happen to You
Search URL Search Domain Scan URL
Title: Here's Why a Las Vegas Lake is Covered in 96 Million Floating Black Balls
Search URL Search Domain Scan URL
Title: This Baby Has Never Eaten Sugar or Carbs, and the Results Are Incredible
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.hackread.com/coronavirus-extort=
HTTP 301
https://www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 62- https://b1sync.zemanta.com/usersync/revcontent/?puid=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%3D&cb=https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fexchange_uid%3DZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%253D%26bidder%3D3%26bidder_uid%3D__ZUID__&rev_dt=1585155214 HTTP 302
- https://b1sync.zemanta.com/usersync/revcontent/?cb=https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fexchange_uid%3DZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%253D%26bidder%3D3%26bidder_uid%3D__ZUID__&puid=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%3D&rev_dt=1585155214&s=2 HTTP 302
- https://trends.revcontent.com/cm/pixel_sync?exchange_uid=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%3D&bidder=3&bidder_uid=wnuz9CFlmMQQjkmX3-dc
- https://ib.adnxs.com/getuid?https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fbidder%3D115%26bidder_uid%3D%24UID%26exchange_uid%3DZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%253D&geo=35&rev_dt=1585155214 HTTP 307
- https://ib.adnxs.com/bounce?%2Fgetuid%3Fhttps%253A%252F%252Ftrends.revcontent.com%252Fcm%252Fpixel_sync%253Fbidder%253D115%2526bidder_uid%253D%2524UID%2526exchange_uid%253DZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%25253D%26geo%3D35%26rev_dt%3D1585155214 HTTP 302
- https://trends.revcontent.com/cm/pixel_sync?bidder=115&bidder_uid=2176843529322094555&exchange_uid=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%3D&geo=35&rev_dt=1585155214
- https://x.bidswitch.net/sync?ssp=revcontent&rev_dt=1585155214 HTTP 302
- https://x.bidswitch.net/ul_cb/sync?ssp=revcontent&rev_dt=1585155214 HTTP 302
- https://green.erne.co/bidswitch/cm?bidswitch_ssp_id=revcontent&gdpr=&gdpr_consent= HTTP 302
- https://x.bidswitch.net/sync?dsp_id=270&expires=10&user_id=ilgaApnJx9xds3ONJxmXUhr1&ssp=revcontent HTTP 302
- https://trends.revcontent.com/cm/pixel_sync?bidder=118&bidder_uid=85f0be1e-59db-4c14-8837-efaed6c47886
- https://rtb.mfadsrvr.com/sync?ssp=revcontent&ssp_user_id=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%3D&rev_dt=1585155214 HTTP 302
- https://rtb.mfadsrvr.com/ul_cb/sync?ssp=revcontent&ssp_user_id=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ%3D&rev_dt=1585155214 HTTP 302
- https://trends.revcontent.com/cm/pixel_sync?exchange_uid=ZmIxZTU1OTU4N2U0ZDY0Zjc1ZjM5NThlOTFlZGUwNWQ=&bidder=154&bidder_uid=15b1f8ad-bb0a-47a7-8a47-a2e9b757450d
- https://www.google-analytics.com/r/collect?v=1&_v=j81&a=665796197&t=pageview&_s=1&dl=https%3A%2F%2Fwww.hackread.com%2Fcoronavirus-extortion-scam-threatens-to-infect-victims-family%2F&ul=en-us&de=UTF-8&dt=Coronavirus%20extortion%20scam%20threatens%20to%20infect%20victim%27s%20family&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=IAhAAUAB~&jid=852545703&gjid=1008233399&cid=1265396894.1585155215&tid=UA-36230183-1&_gid=1534548082.1585155215&_r=1>m=2ou3i0&z=138789679 HTTP 302
- https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-36230183-1&cid=1265396894.1585155215&jid=852545703&_gid=1534548082.1585155215&gjid=1008233399&_v=j81&z=138789679 HTTP 302
- https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=1265396894.1585155215&jid=852545703&_v=j81&z=138789679 HTTP 302
- https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=1265396894.1585155215&jid=852545703&_v=j81&z=138789679&slf_rd=1&random=3413212560
107 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.hackread.com/coronavirus-extortion-scam-threatens-to-infect-victims-family/ Redirect Chain
|
91 KB 18 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.min.css
www.hackread.com/wp-includes/css/dist/block-library/ |
29 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
blocks.style.build.css
www.hackread.com/wp-content/plugins/quick-adsense-reloaded/includes/gutenberg/dist/ |
184 B 514 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles.css
www.hackread.com/wp-content/plugins/contact-form-7/includes/css/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mashsb.min.css
www.hackread.com/wp-content/plugins/mashsharer/assets/css/ |
46 KB 28 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/ |
120 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mip.external.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/ |
87 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
www.hackread.com/wp-content/themes/newsgamer/ |
113 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
media-queries.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/ |
26 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dynamic.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/ |
308 KB 12 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
typography.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/ |
19 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
www.hackread.com/wp-includes/js/jquery/ |
95 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-migrate.min.js
www.hackread.com/wp-includes/js/jquery/ |
10 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cookieconsent.min.css
cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cookieconsent.min.js
cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/ |
20 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hackread-logo.png
www.hackread.com/wp-content/uploads/2015/12/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
webfont.js
ajax.googleapis.com/ajax/libs/webfont/1.5.3/ |
17 KB 7 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wp-emoji-release.min.js
www.hackread.com/wp-includes/js/ |
14 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
4 KB 803 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v20/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
b46fad0ee0dc124087b9a350e249485f
secure.gravatar.com/avatar/ |
4 KB 4 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
410njbnz9ol_go1_icon.ico
www.hackread.com/wp-content/uploads/2015/12/ |
37 KB 3 KB |
Image
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/ |
107 KB 38 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Sextortion-mail-sample.jpg
www.hackread.com/wp-content/uploads/2020/03/ |
41 KB 38 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
b46fad0ee0dc124087b9a350e249485f
secure.gravatar.com/avatar/ |
5 KB 5 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
who-becomes-target-of-live-hack-attack-277x190.jpg
www.hackread.com/wp-content/uploads/2020/03/ |
11 KB 11 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
coronavirus-sextortion-scam-277x190.jpg
www.hackread.com/wp-content/uploads/2020/03/ |
13 KB 13 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hackers-launch-coronavirus-sale-to-sell-hacking-tools-at-low-cost-277x190.jpg
www.hackread.com/wp-content/uploads/2020/03/ |
14 KB 14 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
f002df08b025d37deabffc0b5b88b6ea
secure.gravatar.com/avatar/ |
1 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
who-becomes-target-of-live-hack-attack-350x245.jpg
www.hackread.com/wp-content/uploads/2020/03/ |
17 KB 17 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hackers-are-exploiting-a-critical-unpatched-flaw-in-windows-1-350x245.jpg
www.hackread.com/wp-content/uploads/2020/03/ |
12 KB 13 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
malware-family-generated-fake-ad-clicks-in-66-apps-on-android-2-350x245.jpg
www.hackread.com/wp-content/uploads/2020/03/ |
18 KB 19 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
coronavirus-sextortion-scam-350x245.jpg
www.hackread.com/wp-content/uploads/2020/03/ |
20 KB 21 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hackread-logo.png
www.hackread.com/wp-content/uploads/2015/12/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
scripts.js
www.hackread.com/wp-content/plugins/contact-form-7/includes/js/ |
14 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mashsb.min.js
www.hackread.com/wp-content/plugins/mashsharer/assets/js/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ta.js
www.hackread.com/wp-content/plugins/thirstyaffiliates/js/app/ |
10 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
www.hackread.com/wp-content/themes/newsgamer/assets/js/ |
36 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mip.external.min.js
www.hackread.com/wp-content/themes/newsgamer/assets/js/ |
135 KB 42 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
functions.js
www.hackread.com/wp-content/themes/newsgamer/assets/js/ |
17 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wp-embed.min.js
www.hackread.com/wp-includes/js/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
form.js
www.hackread.com/wp-content/plugins/akismet/_inc/ |
700 B 691 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
comment-reply.min.js
www.hackread.com/wp-includes/js/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
js
www.googletagmanager.com/gtag/ |
75 KB 28 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dynamic.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/ |
64 KB 64 KB |
Image
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome-webfont.woff2
www.hackread.com/wp-content/themes/newsgamer/assets/fonts/ |
75 KB 76 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vertical-right-shadow.png
www.hackread.com/wp-content/themes/newsgamer/images/ |
3 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
top-left-shadow.png
www.hackread.com/wp-content/themes/newsgamer/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
BngbUXZYTXPIvIBgJJSb6s3BzlRRfKOFbvjojISmb2RlV9Su1cai.woff
fonts.gstatic.com/s/robotoslab/v11/ |
15 KB 15 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
11 KB 11 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
integrator.js
adservice.google.de/adsid/ |
109 B 171 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
integrator.js
adservice.google.com/adsid/ |
109 B 171 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
show_ads_impl_fy2019.js
pagead2.googlesyndication.com/pagead/js/r20200319/r20190131/ |
224 KB 84 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20200319/r20190131/ Frame BFCD |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
serve.js.php
trends.revcontent.com/ |
4 KB 2 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ads
googleads.g.doubleclick.net/pagead/ Frame F9AE |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
osd.js
www.googletagservices.com/activeview/js/current/ |
74 KB 27 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
coronavirus-sextortion-scam.jpg
www.hackread.com/wp-content/uploads/2020/03/ |
93 KB 93 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ads
googleads.g.doubleclick.net/pagead/ Frame E70E |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
admin-ajax.php
www.hackread.com/wp-admin/ |
13 B 590 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ads
googleads.g.doubleclick.net/pagead/ Frame 8A6A |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ads
googleads.g.doubleclick.net/pagead/ Frame 153D |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
serve.js.php
trends.revcontent.com/ |
113 KB 33 KB |
XHR
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pixel_sync
trends.revcontent.com/cm/ Redirect Chain
|
35 B 213 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pixel_sync
trends.revcontent.com/cm/ Redirect Chain
|
35 B 215 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pixel_sync
trends.revcontent.com/cm/ Redirect Chain
|
35 B 215 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cookiesync
bttrack.com/pixel/ |
35 B 380 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pixel_sync
trends.revcontent.com/cm/ Redirect Chain
|
35 B 215 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ads
googleads.g.doubleclick.net/pagead/ Frame FED5 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
analytics.js
www.google-analytics.com/ |
44 KB 18 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ads
googleads.g.doubleclick.net/pagead/ Frame 14AA |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ads
googleads.g.doubleclick.net/pagead/ Frame DC42 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ga-audiences
www.google.de/ads/ Redirect Chain
|
42 B 109 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ads
googleads.g.doubleclick.net/pagead/ Frame 2B0B |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ads
googleads.g.doubleclick.net/pagead/ Frame 308E |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ads
googleads.g.doubleclick.net/pagead/ Frame 06E4 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ads
googleads.g.doubleclick.net/pagead/ Frame EED8 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ads
googleads.g.doubleclick.net/pagead/ Frame CD48 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ads
googleads.g.doubleclick.net/pagead/ Frame 217A |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
rev2.min.css
cdn.revcontent.com/build/css/ |
83 KB 26 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
rev2.min.js
cdn.revcontent.com/build/js/ |
280 KB 98 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
score.min.js
js.ad-score.com/ |
281 KB 96 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ads
googleads.g.doubleclick.net/pagead/ Frame 10EA |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ads
googleads.g.doubleclick.net/pagead/ Frame AB56 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ads
googleads.g.doubleclick.net/pagead/ Frame 1F12 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
cors
data.ad-score.com/data/ |
42 B 711 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET BLOB |
a77a6c89-0b60-48f8-88ed-4ff34394595d
https://www.hackread.com/ |
720 B 0 |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
x.html
js.ad-score.com/ Frame 684E |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
68 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
cors
data.ad-score.com/data/ |
1 B 272 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
35 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
imp.php
trends.revcontent.com/ |
0 205 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
cors
data.ad-score.com/data/ |
1 B 272 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
cors
data.ad-score.com/data/ |
1 B 272 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
cors
data.ad-score.com/data/ |
1 B 272 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
cors
data.ad-score.com/data/ |
1 B 272 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sodar
pagead2.googlesyndication.com/getconfig/ |
7 KB 6 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
img.revcontent.com/ |
46 KB 46 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
img.revcontent.com/ |
59 KB 59 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
img.revcontent.com/ |
57 KB 57 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
img.revcontent.com/ |
24 KB 24 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
img.revcontent.com/ |
34 KB 34 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
img.revcontent.com/ |
57 KB 57 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
img.revcontent.com/ |
45 KB 45 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
img.revcontent.com/ |
56 KB 56 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
img.revcontent.com/ |
30 KB 30 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sodar2.js
tpc.googlesyndication.com/sodar/ |
14 KB 5 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
cors
data.ad-score.com/data/ |
1 B 272 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
runner.html
tpc.googlesyndication.com/sodar/sodar2/209/ Frame E4DC |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
gen_204
pagead2.googlesyndication.com/pagead/ |
0 54 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
123 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate object| WebFontConfig object| _wpemojiSettings object| webfont object| WebFont object| twemoji object| wp undefined| $ function| jQuery object| cookieconsent number| initStickyMenu object| adsbygoogle object| google_js_reporting_queue number| google_srt object| google_ad_modifications object| google_logging_queue object| ggeac boolean| google_measure_js_timing object| googleToken object| googleIMState function| processGoogleToken object| google_reactive_ads_global_state boolean| _gfp_a_ object| google_sa_queue object| google_sl_win function| google_process_slots boolean| google_apltlad boolean| _gfp_p_ function| google_spfd number| google_lpabyc number| google_unique_id object| google_sv_map object| google_t12n_vars boolean| miptheme_smooth_scrolling number| miptheme_ajaxpagination_timer number| miptheme_sticky_sidebar_margin number| miptheme_parallax_image_height object| mipthemeLocalCache object| wpcf7 object| mashsb undefined| strict object| thirsty_global_vars object| thirstyFunctions object| jQuery1124006929800867637792 function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter function| google_sa_impl object| google_jobrunner object| google_persistent_state_async object| __google_ad_urls number| google_global_correlator number| __google_ad_urls_id object| google_prev_clients object| gaGlobal object| ampInaboxIframes object| ampInaboxPendingMessages object| google_iframe_oncopy boolean| google_osd_loaded boolean| google_onload_fired function| SocialMediaStats function| smooth_scroll function| setCookie function| getCookie object| _photobox function| wNumb function| Cookies function| shareSelectedText object| miptheme_ajax_url function| setVideoHeights object| miptheme_ajax_post_views object| addComment function| gtag object| dataLayer object| google_tag_manager function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb string| GoogleAnalyticsObject function| ga object| ak_js object| commentForm undefined| replyRowContainer undefined| children object| google_tag_data object| gaplugins object| gaData boolean| clean_io_required object| rc_head object| rc_body object| rc2css object| rc2js object| rc2js_beacon_5e7b8c8f1cee6 object| rcel object| rcds object| beaconNoScript object| rc_segmented_creatives object| rc_segmented_widgets object| rc_loaded_widgets undefined| rc_chosen_interests number| rc_loader_limit number| rc_loader_runs object| rc_loaded_hashes object| rcsc object| RevContentLoader string| rc_p_uuid number| provider string| do_branding object| Base64 function| rcjq boolean| scrolled boolean| swiped boolean| resized boolean| rc_segments_sent function| Hammer object| __pm_glbl object| __pm_glbl_w5yICGlddW5hx9TSh2zww9D5 object| __pm_ads_list string| AdScoreObject function| adScore object| jQuery11020024130890283945883 object| GoogleGcLKhOms object| google_image_requests8 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
js.ad-score.com/ | Name: pme Value: EcNfjLHVUGlV |
|
.doubleclick.net/ | Name: IDE Value: AHWqTUmD8Wn7I2CnuLwzn03IyZOeVT2PBVBRwkmEcX9__goAi9TxN79lYclEG-4R |
|
.redintelligence.net/ | Name: 8lcfmzhxc8d6_uid Value: fcd603c11757bfec |
|
www.hackread.com/ | Name: pmtimesig Value: [[1585155215531,0]] |
|
js.ad-score.com/ | Name: pmah Value: {"a":0,"t":1,"s":1585155215866} |
|
.hackread.com/ | Name: _gat_gtag_UA_36230183_1 Value: 1 |
|
.hackread.com/ | Name: _gid Value: GA1.2.1534548082.1585155215 |
|
.hackread.com/ | Name: _ga Value: GA1.2.1265396894.1585155215 |
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
adservice.google.com
adservice.google.de
ajax.googleapis.com
b1sync.zemanta.com
bttrack.com
cdn.revcontent.com
cdnjs.cloudflare.com
data.ad-score.com
fonts.googleapis.com
fonts.gstatic.com
googleads.g.doubleclick.net
green.erne.co
ib.adnxs.com
img.revcontent.com
js.ad-score.com
pagead2.googlesyndication.com
rtb.mfadsrvr.com
secure.gravatar.com
stats.g.doubleclick.net
tpc.googlesyndication.com
trends.revcontent.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
www.hackread.com
x.bidswitch.net
130.211.115.4
151.139.128.10
18.184.169.93
185.33.223.204
192.132.33.46
2600:1901:0:fcac::
2606:4700::6811:4104
2a00:1450:4001:800::2002
2a00:1450:4001:800::2008
2a00:1450:4001:806::2004
2a00:1450:4001:808::200a
2a00:1450:4001:816::200a
2a00:1450:4001:817::200e
2a00:1450:4001:81b::2001
2a00:1450:4001:81c::2003
2a00:1450:4001:825::2003
2a00:1450:400c:c00::9c
2a04:fa87:fffe::c000:4902
52.29.122.216
63.34.125.93
67.227.194.195
70.42.32.95
94.23.144.220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