Submitted URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/#ftag=RSSbaffb68
Effective URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Submission: On December 17 via api from US — Scanned from DE

Summary

This website contacted 41 IPs in 4 countries across 27 domains to perform 197 HTTP transactions. The main IP is 2a04:4e42:4c::666, located in United States and belongs to FASTLY, US. The main domain is www.zdnet.com.
TLS certificate: Issued by R3 on October 26th 2021. Valid for: 3 months.
This is the only time www.zdnet.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
19 2a04:4e42:4c:... 54113 (FASTLY)
5 2606:4700::68... 13335 (CLOUDFLAR...)
3 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
4 2606:4700:303... 13335 (CLOUDFLAR...)
1 2606:4700:10:... 13335 (CLOUDFLAR...)
2 52.73.158.59 14618 (AMAZON-AES)
3 151.101.130.154 54113 (FASTLY)
1 34.120.203.121 15169 (GOOGLE)
2 151.101.129.194 54113 (FASTLY)
14 142.250.185.66 15169 (GOOGLE)
3 18.66.139.25 16509 (AMAZON-02)
14 52.202.128.45 14618 (AMAZON-AES)
2 52.5.105.31 14618 (AMAZON-AES)
35 2.18.235.40 16625 (AKAMAI-AS)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
3 3.11.215.107 16509 (AMAZON-02)
5 2a00:1450:400... 15169 (GOOGLE)
1 151.101.66.137 54113 (FASTLY)
10 2a00:1450:400... 15169 (GOOGLE)
2 162.247.243.146 13335 (CLOUDFLAR...)
10 2a00:1450:400... 15169 (GOOGLE)
5 2.16.107.33 20940 (AKAMAI-ASN1)
1 2 54.154.149.33 16509 (AMAZON-02)
1 3 142.250.184.230 15169 (GOOGLE)
5 2a00:1450:400... 15169 (GOOGLE)
1 18.159.156.184 16509 (AMAZON-02)
1 3 2a00:1450:400... 15169 (GOOGLE)
17 52.6.9.44 14618 (AMAZON-AES)
3 2600:9000:223... 16509 (AMAZON-02)
1 13.32.121.115 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
2 142.250.185.162 15169 (GOOGLE)
2 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
1 2a00:1450:400... 15169 (GOOGLE)
7 107.21.138.34 14618 (AMAZON-AES)
3 34.117.228.201 15169 (GOOGLE)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
197 41
Apex Domain
Subdomains
Transfer
25 moatads.com
z.moatads.com
mb.moatads.com
geo.moatads.com
px.moatads.com
425 KB
21 googlesyndication.com
4357ee97dce36347f7ec16a6fa3ba201.safeframe.googlesyndication.com
pagead2.googlesyndication.com
tpc.googlesyndication.com
149 KB
20 doubleclick.net
securepubads.g.doubleclick.net
ad.doubleclick.net
googleads.g.doubleclick.net
googleads4.g.doubleclick.net
207 KB
20 zdnet.com
www.zdnet.com
urs.zdnet.com
373 KB
18 clipcentric.com
tr.clipcentric.com
ad.clipcentric.com
6 KB
14 rvapps.io
ingest.make.rvapps.io
2 KB
13 moatpixel.com
redventuresgamheader644747280705.s.moatpixel.com
redventuresgamdisplay60805146916.s.moatpixel.com
3 KB
12 adsafeprotected.com
pixel.adsafeprotected.com
static.adsafeprotected.com
dt.adsafeprotected.com
95 KB
5 doubleverify.com
cdn.doubleverify.com
tps.doubleverify.com
tpsc-ue1.doubleverify.com
96 KB
5 ampproject.org
cdn.ampproject.org
103 KB
5 akamaihd.net
clipcentric-a.akamaihd.net
1 MB
5 googletagservices.com
www.googletagservices.com
131 KB
5 cohesionapps.com
cdn.cohesionapps.com
taggy.cohesionapps.com
33 KB
5 cookielaw.org
cdn.cookielaw.org
116 KB
4 google.com
adservice.google.com
www.google.com
2 KB
4 myfinance.com
static.myfinance.com
www.myfinance.com
66 KB
3 redventures.io
at.adtech.redventures.io
179 KB
3 go-mpulse.net
c.go-mpulse.net
52 KB
2 nr-data.net
bam-cell.nr-data.net
1 KB
2 akstat.io
684dd311.akstat.io
02179917.akstat.io
708 B
2 fastly.net
confiant-integrations.global.ssl.fastly.net
93 KB
2 myfidevs.io
a.myfidevs.io
166 B
1 2mdn.net
s0.2mdn.net
39 KB
1 clarium.io
protected-by.clarium.io
345 B
1 newrelic.com
js-agent.newrelic.com
17 KB
1 google.de
adservice.google.de
792 B
1 onetrust.com
geolocation.onetrust.com
374 B
197 27
Domain Requested by
19 www.zdnet.com www.zdnet.com
18 px.moatads.com www.zdnet.com
17 tr.clipcentric.com www.zdnet.com
ad.clipcentric.com
14 ingest.make.rvapps.io www.zdnet.com
14 securepubads.g.doubleclick.net www.zdnet.com
www.googletagservices.com
10 redventuresgamdisplay60805146916.s.moatpixel.com
10 tpc.googlesyndication.com www.zdnet.com
cdn.ampproject.org
ad.doubleclick.net
tpc.googlesyndication.com
10 pagead2.googlesyndication.com www.zdnet.com
tpc.googlesyndication.com
ad.doubleclick.net
www.googletagservices.com
7 dt.adsafeprotected.com
5 cdn.ampproject.org confiant-integrations.global.ssl.fastly.net
5 clipcentric-a.akamaihd.net www.zdnet.com
clipcentric-a.akamaihd.net
5 www.googletagservices.com www.zdnet.com
www.googletagservices.com
5 cdn.cookielaw.org www.zdnet.com
4 z.moatads.com www.zdnet.com
3 redventuresgamheader644747280705.s.moatpixel.com
3 static.adsafeprotected.com pixel.adsafeprotected.com
www.zdnet.com
3 www.google.com 1 redirects www.zdnet.com
3 ad.doubleclick.net 1 redirects www.zdnet.com
www.googletagservices.com
3 cdn.cohesionapps.com www.zdnet.com
cdn.cohesionapps.com
3 at.adtech.redventures.io www.zdnet.com
3 c.go-mpulse.net www.zdnet.com
c.go-mpulse.net
2 tpsc-ue1.doubleverify.com cdn.doubleverify.com
2 cdn.doubleverify.com ad.doubleclick.net
www.zdnet.com
2 googleads4.g.doubleclick.net ad.doubleclick.net
2 pixel.adsafeprotected.com 1 redirects www.zdnet.com
2 bam-cell.nr-data.net www.zdnet.com
2 geo.moatads.com z.moatads.com
2 taggy.cohesionapps.com www.zdnet.com
2 confiant-integrations.global.ssl.fastly.net www.zdnet.com
2 www.myfinance.com www.zdnet.com
2 a.myfidevs.io www.zdnet.com
2 static.myfinance.com www.zdnet.com
1 02179917.akstat.io c.go-mpulse.net
1 tps.doubleverify.com cdn.doubleverify.com
1 s0.2mdn.net www.zdnet.com
1 googleads.g.doubleclick.net
1 ad.clipcentric.com clipcentric-a.akamaihd.net
1 protected-by.clarium.io
1 js-agent.newrelic.com www.zdnet.com
1 mb.moatads.com z.moatads.com
1 684dd311.akstat.io www.zdnet.com
1 4357ee97dce36347f7ec16a6fa3ba201.safeframe.googlesyndication.com www.zdnet.com
1 adservice.google.com www.zdnet.com
1 adservice.google.de www.zdnet.com
1 urs.zdnet.com www.zdnet.com
1 geolocation.onetrust.com www.zdnet.com
197 46
Subject Issuer Validity Valid
*.zdnet.com
R3
2021-10-26 -
2022-01-24
3 months crt.sh
cookielaw.org
Cloudflare Inc ECC CA-3
2021-06-01 -
2022-05-31
a year crt.sh
akstat.io
DigiCert SHA2 Secure Server CA
2021-06-08 -
2022-06-13
a year crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2021-06-18 -
2022-06-17
a year crt.sh
onetrust.com
Cloudflare Inc ECC CA-3
2021-02-12 -
2022-02-11
a year crt.sh
*.myfidevs.io
Amazon
2021-12-07 -
2023-01-04
a year crt.sh
at.adtech.redventures.io
R3
2021-12-04 -
2022-03-04
3 months crt.sh
*.freetls.fastly.net
GlobalSign Atlas R3 DV TLS CA 2020
2021-04-27 -
2022-05-29
a year crt.sh
*.g.doubleclick.net
GTS CA 1C3
2021-11-29 -
2022-02-21
3 months crt.sh
cdn.cohesionapps.com
Amazon
2021-12-17 -
2023-01-14
a year crt.sh
ingest.make.rvapps.io
Amazon
2021-09-26 -
2022-10-24
a year crt.sh
*.taggy.cohesionapps.com
Amazon
2021-02-27 -
2022-03-28
a year crt.sh
moatads.com
DigiCert SHA2 Secure Server CA
2021-01-21 -
2022-01-25
a year crt.sh
*.google.de
GTS CA 1C3
2021-11-29 -
2022-02-21
3 months crt.sh
*.google.com
GTS CA 1C3
2021-11-29 -
2022-02-21
3 months crt.sh
*.moatads.com
DigiCert TLS RSA SHA256 2020 CA1
2021-05-25 -
2022-06-25
a year crt.sh
js-agent.newrelic.com
GlobalSign Atlas R3 DV TLS CA H2 2021
2021-10-06 -
2022-11-07
a year crt.sh
*.nr-data.net
DigiCert SHA2 Secure Server CA
2020-02-05 -
2022-02-08
2 years crt.sh
tpc.googlesyndication.com
GTS CA 1C3
2021-11-29 -
2022-02-21
3 months crt.sh
aka.clipcentric.com
R3
2021-11-20 -
2022-02-18
3 months crt.sh
fw.adsafeprotected.com
Amazon
2021-08-11 -
2022-09-09
a year crt.sh
misc-sni.google.com
GTS CA 1C3
2021-11-29 -
2022-02-21
3 months crt.sh
protected-by.clarium.io
Gandi Standard SSL CA 2
2020-04-03 -
2022-04-26
2 years crt.sh
www.google.com
GTS CA 1C3
2021-11-29 -
2022-02-21
3 months crt.sh
clipcentric.com
Amazon
2021-02-05 -
2022-03-06
a year crt.sh
static.adsafeprotected.com
Amazon
2021-09-05 -
2022-10-04
a year crt.sh
*.doubleclick.net
GTS CA 1C3
2021-11-29 -
2022-02-21
3 months crt.sh
*.doubleverify.com
DigiCert SHA2 Secure Server CA
2021-01-10 -
2022-01-17
a year crt.sh
dt.adsafeprotected.com
Amazon
2021-04-22 -
2022-05-21
a year crt.sh

This page contains 17 frames:

Primary Page: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Frame ID: 33376CE5ADE9E3577540B8CC9B8F90BA
Requests: 107 HTTP requests in this frame

Frame: https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Frame ID: 523758D60DDBF3C2EA280BDCF1747424
Requests: 2 HTTP requests in this frame

Frame: https://cdn.cohesionapps.com/cohesion/xs2.html
Frame ID: 29C574A40BBB93AFA9C060052E9BB490
Requests: 2 HTTP requests in this frame

Frame: https://4357ee97dce36347f7ec16a6fa3ba201.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Frame ID: 9750626417F847A9FD0CC5A7B9BDC374
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsu7L-cH9zydfij0MMgeCU1cZmv3wWgF-X0Zbybzx_1oF3K_8-pZMpXfPkxqj6WQXYFuRQTHsqFqiWTzW7hYmYY05N_ZL87vCuwISiNZcseKIzPeXA_nwS5jnMCbvGZ4rN_stvVED1vze8DIQbnv_JzMaAv3012VyxGVaiH8M9qFOi0aw2s4irdvIVqZ3tGBv8XbzdxasTOJHdz41VS4Lv1x99tgTvEOvHqnuZD2eUvIVlTJ6E3w9yHUna6macVoQtyJWe6KpbYraviH4WgeNKhvXvYkYuflLWs3TTPm14A8EpEDd11gQxjw-DaoInzZrlFZt-NmR4maHjz1qYI&sai=AMfl-YS7Gb32872AlbSlwuv14ek9Utin2AXm2_XbpTlmqolwcqIVD1_7wWINqy-1YS1rGH2rig98E0BfcO5LBQ8ShBsQfMTtqatpdVV4pIHcpRuoWWj8bpKN7aYX8JiEToN2&sig=Cg0ArKJSzKt47mHSWVCbEAE&uach_m=[UACH]&urlfix=1&adurl=
Frame ID: 52F71A1E2369289B11D3060451CBE774
Requests: 4 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvUGYoWS4IKCeZTNhip7M-1itTIC5Uk1av1-IakL4WPx_Ccum3zVMEFbHd4iv-M5hm9QIjsnPr_AllTnocW2OAxDdfUEyZ8aJ8GYmeV8DOC4Cgked5tTdVtx42XQ51UD1t9beLQakGudwcH4G0wfALwy0BMm5otJfpAktzOyD9DFka6k5YW8eUYBY0U7cM34PV-cmaClaWYshuHT04q1xYlcXf2NfNLXbnBc2k153pJNbXEmDtZ2kbHgJOF-5AGSE1VGPGJpfR3SQn-uQVh5dzqSNH1zGXLyu6FDkkBTyGZDXiBygSwXYQfkDaMi4K8aTQGsyofBBeoHJ7K9rTrNd1e&sai=AMfl-YQswMccUz-LSmhVzCKV2B4R5Bjj8lx4lqSY28ny3dDNdYu3OIotO6vEYN7OZ-0PzuN3ZpsiAJOkWwAe_Bg-PZzkfqyfALOdWcA_y86akB-BeiKUF0olTuStFEJOZJSp&sig=Cg0ArKJSzASgiohvfbs9EAE&uach_m=[UACH]&urlfix=1&adurl=
Frame ID: E29DAAE56067047E7483FDC5390B43A9
Requests: 29 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/012111011823000/amp4ads-v0.mjs
Frame ID: 6F54FDA282DE3F34BAD98531315616A9
Requests: 15 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
Frame ID: 9A670B781F44A523E204216D3F4C52FE
Requests: 2 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/aframe
Frame ID: DDE58BEFDEC930447D707420AF7DE98E
Requests: 2 HTTP requests in this frame

Frame: data://truncated
Frame ID: 930CE30BC6427BA02F0D3AC0B46E64C6
Requests: 2 HTTP requests in this frame

Frame: data://truncated
Frame ID: 98CF86DF43F8D6A7A5BBD2267D50E465
Requests: 4 HTTP requests in this frame

Frame: https://clipcentric-a.akamaihd.net/user-9/resources/ad.html
Frame ID: 21C16F75DDFCDC5B8BC2C2DDC3F6CF8C
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvybQTwthyCKUjCvQU2VebBs-wsVEaoKyZeIJga0TnNou8reDXuf1xdX_iGJu5M21PFsuXQgpUTNGE8IsGXEPJ6ifSxi2JCnM_FzTVdM3n82sAo9NPPkBNVJN7bFX6Ap-UcAxw4_lbkznNN04SA-5W9LJp2M5AdfLtSr1LbL-cRZzaqPoMOK8n2v_X9MMIWPuhQISXYFhdO-yPFkCiILFeCcRQxw0BftzGy3UfMgE3I0qHeC19S3hLgEMvCXbRLC-EntZfxEoEXxhu0Bar_FAve0x-7esmZHDrJRYAGH9NaTgkK3Kyyz6V952HouUg5Fy3B6Z5J4_e-7YWFwoV-&sai=AMfl-YQyTKvJ5gSZjDGUJ-4VTk4dyG8Q38Ecs29hUrPgoUQq-6aGC-ghIUaSZUmdpsoHy12r_2iTHWupDOf1yMq_AdU5MPAHWy_fyZJ5_FMOLBxEk9PArBbsER243BQeKT0&sig=Cg0ArKJSzDhegm5SgLCjEAE&uach_m=[UACH]&urlfix=1&adurl=
Frame ID: 8C945E431AB4F6DF93ECF1B002BA3A4C
Requests: 16 HTTP requests in this frame

Frame: https://ad.clipcentric.com/user-9/resources/store.phtml?v200530
Frame ID: 442FE6769EF3DDF8A8CC13A727592CA8
Requests: 3 HTTP requests in this frame

Frame: https://static.adsafeprotected.com/sca.17.5.12.js
Frame ID: 8E5629883F26AB66B1469B62A5290685
Requests: 1 HTTP requests in this frame

Frame: https://cdn.doubleverify.com/dv-measurements1950.js
Frame ID: 4D651E0EF89139E37FCC3272753EACFA
Requests: 4 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/Enqz_20U.html
Frame ID: 96947B6089E5D4A96050E65AC7580C31
Requests: 3 HTTP requests in this frame

Screenshot

Page Title

Suspected Iranian hackers target airline with new backdoor | ZDNet

Detected technologies

Overall confidence: 100%
Detected patterns
  • require.*\.js

Overall confidence: 100%
Detected patterns
  • 2mdn\.net

Overall confidence: 100%
Detected patterns
  • googlesyndication\.com/
  • 2mdn\.net

Overall confidence: 100%
Detected patterns
  • moatads\.com

Overall confidence: 100%
Detected patterns
  • cdn\.cookielaw\.org
  • otSDKStub\.js

Page Statistics

197
Requests

98 %
HTTPS

48 %
IPv6

27
Domains

46
Subdomains

41
IPs

4
Countries

3423 kB
Transfer

8177 kB
Size

29
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 89
  • https://ad.doubleclick.net/ddm/trackimp/N418801.3776911CBSINTERACTIVE.CO/B26977839.323096029;dc_trk_aid=515145530;dc_trk_cid=162954749;ord=1097836088;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;gdpr=;gdpr_consent=;ltd= HTTP 302
  • https://ad.doubleclick.net/ddm/trackimp/N418801.3776911CBSINTERACTIVE.CO/B26977839.323096029;dc_pre=CLiY-4TZ6vQCFZriuwgdc-cJoQ;dc_trk_aid=515145530;dc_trk_cid=162954749;ord=1097836088;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;gdpr=;gdpr_consent=;ltd=
Request Chain 133
  • https://www.google.com/pagead/drt/ui HTTP 302
  • https://googleads.g.doubleclick.net/pagead/drt/si?st=NO_DATA
Request Chain 143
  • https://pixel.adsafeprotected.com/rfw/st/903347/59128494/skeleton.js?ias_dspID=64&adsafe_url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&adsafe_type=abq&adsafe_url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F&adsafe_type=df&adsafe_jsinfo=,id:cacd4a8a-3130-cc67-ef57-62bc1f683105,c:x3emDq,sl:inView,em:true,fr:true,thd:1,mn:jsserver-primary-6d588df4d9-z8ncm,rg:ie,pt:1-5-15,wc:0.0.1600.1200,ac:0.0.1600.105,am:i,cc:0.0.1600.105,piv:100,obst:0,th:0,reas:,br:u,abv:na,an:n,oam:0,nbld:0,mtim:180,fm:sRQD997+11%7C12%7C13%7C14%7C15*.903347-59128494%7C151%7C152%7C153%7C154%7C155%7C156%7C16%7C17%7C18%7C19,idMap:15*,pl:,rmeas:1,rend:1,renddet:IMG.qs,es:0,sc:1,ha:1,fif:0,gmnp:0,for:1,b11:1,cnod:1,gm:0,tt:rjss,et:196,oid:b9c1db5e-5f29-11ec-8ae0-8602c6e304be,v:19.8.273,sp:1,st:0,fwm:1,wr:1600.1200,sr:1600.1200,ov:0 HTTP 302
  • https://static.adsafeprotected.com/skeleton.js

197 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
209 KB
89 KB
Document
General
Full URL
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
9f77135f04c4da1b12859455c051cb85c363a0fbef82fe3c6ea8f17b0c77d62f
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

content-encoding
gzip
content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-type
text/html; charset=UTF-8
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
link
<https://www.zdnet.com/a/fly/css/core/main-61ec7c25fb-rev.css>; rel="preload"; as="style"; nopush
referrer-policy
no-referrer-when-downgrade
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-tx-id
9572c45f-b629-446c-a29b-cb82cb46a4ac
x-xss-protection
1; mode=block
date
Fri, 17 Dec 2021 11:08:54 GMT
via
1.1 varnish
cache-control
max-age=5400, private
expires
Fri, 17 Dec 2021 12:35:15 GMT
strict-transport-security
max-age=63072000; includeSubDomains; preload
accept-ranges
bytes
vary
Accept-Encoding, User-Agent
content-length
90218
main-61ec7c25fb-rev.css
www.zdnet.com/a/fly/css/core/
304 KB
53 KB
Stylesheet
General
Full URL
https://www.zdnet.com/a/fly/css/core/main-61ec7c25fb-rev.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
83575e34525331ea577205e94ffcb89cb9bb5cbb6e9f1c852dacaf941276de5b
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:54 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
53705
x-xss-protection
1; mode=block
last-modified
Thu, 16 Dec 2021 20:56:56 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=31536000
content-type
text/css
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 23 Dec 2021 20:58:43 GMT
otSDKStub.js
cdn.cookielaw.org/scripttemplates/
19 KB
7 KB
Script
General
Full URL
https://cdn.cookielaw.org/scripttemplates/otSDKStub.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:9540 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
4d2a74d8b25e1ccd4b1294b0b937804bc24aeea7f46edad3f3c1f91604d2708c
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Fri, 17 Dec 2021 11:08:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
content-md5
BXRr8anumVFsMvgN5QlueA==
age
3
vary
Accept-Encoding
content-length
6508
x-ms-lease-status
unlocked
last-modified
Thu, 16 Dec 2021 21:12:11 GMT
server
cloudflare
etag
0x8D9C0D8BA367D8A
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/javascript
access-control-allow-origin
*
x-ms-request-id
ac48080f-c01e-0069-13c1-f2874a000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
cf-ray
6befb237d85c4ee0-FRA
expires
Fri, 17 Dec 2021 15:08:54 GMT
optanon-v1.1.0.js
www.zdnet.com/a/privacy/optanon/
36 KB
10 KB
Script
General
Full URL
https://www.zdnet.com/a/privacy/optanon/optanon-v1.1.0.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
a0a97a5a7dc2b30e9a76ff211332f36d435293c19ed91ca1ad6a66adc1dc50cd
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:54 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
10444
x-xss-protection
1; mode=block
last-modified
Thu, 04 Mar 2021 19:22:21 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"46e2aa30cbebb708b5fc468d57d56d8b"
strict-transport-security
max-age=31536000
content-language
en
via
1.1 varnish
cache-control
public, max-age=86400
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
content-type
application/javascript
expires
Thu, 18 Nov 2021 07:05:01 GMT
controls-ce6ece0b43-rev.css
www.zdnet.com/a/fly/css/video/htmlPlayerControls/
25 KB
4 KB
Stylesheet
General
Full URL
https://www.zdnet.com/a/fly/css/video/htmlPlayerControls/controls-ce6ece0b43-rev.css
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
d32763388ba6d9bba0619b8912021d30345002aa0d5dcba3ce01a05da23f72db
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:54 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
4330
x-xss-protection
1; mode=block
last-modified
Thu, 16 Dec 2021 20:56:57 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=31536000
content-type
text/css
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 23 Dec 2021 20:58:43 GMT
YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
c.go-mpulse.net/boomerang/ Frame 5237
205 KB
50 KB
Script
General
Full URL
https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2a02:26f0:6c00:1bb::11a6 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
Akamai Resource Optimizer /
Resource Hash
09ebd7f407439990aac227e70da23e1a819e8e30282928e324370805f480bec4

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Date
Fri, 17 Dec 2021 11:08:54 GMT
Content-Encoding
br
Last-Modified
Thu, 14 Oct 2021 03:09:47 GMT
Server
Akamai Resource Optimizer
Vary
Accept-Encoding
Content-Type
application/javascript;charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=604800, s-maxage=604800
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
50393
truncated
/
31 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f3e2e0f12c5badfe408d69bf6c0fa9ce6247f9a45c849851a53b8647637cfcd0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
dfd272053c730cd470302af475eb401d9be41c81f0081c20d7910f6c12732c9d

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
95783bf43b78701a92daf5ec7268db97c7144599c774821126b8cc5396724bfa

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/png
charlie-osborne.jpg
www.zdnet.com/a/img/resize/c8ef739a72ea5f7507a32fca52940befe437ac45/2014/07/22/36b8334d-1175-11e4-9732-00505685119a/
924 B
1 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/c8ef739a72ea5f7507a32fca52940befe437ac45/2014/07/22/36b8334d-1175-11e4-9732-00505685119a/charlie-osborne.jpg?width=50&height=50&fit=crop&auto=webp
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
f6a1d1301a41d925a220c3cac7f9d927356bff1c809259b16601325663de156d
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:54 GMT
via
1.1 varnish
fastly-io-info
ifsz=11429 idim=350x250 ifmt=jpeg ofsz=924 odim=50x50 ofmt=webp
x-goog-meta-x-goog-reserved-source-generation
1588631330699120
fastly-stats
io=1
content-length
924
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"+syrtNFOJHcaa/T8DZP/qt2kgH1Jbet5hqlMrCh94N4"
vary
Accept-Encoding, Accept
strict-transport-security
max-age=31536000
content-language
en
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
content-type
image/webp
expires
Mon, 06 Dec 2021 09:31:39 GMT
charlie-osborne.jpg
www.zdnet.com/a/img/resize/ae8b429306581e2c4e0430de956e3cf4ec97dd0d/2014/07/22/36b8334d-1175-11e4-9732-00505685119a/
1 KB
1 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/ae8b429306581e2c4e0430de956e3cf4ec97dd0d/2014/07/22/36b8334d-1175-11e4-9732-00505685119a/charlie-osborne.jpg?width=70&height=70&fit=crop&auto=webp
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
c98713a27c661e04f9aecf37a7794088451f73bab4b9bb615ed29ff5a5fd75e1
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:54 GMT
via
1.1 varnish
fastly-io-info
ifsz=11429 idim=350x250 ifmt=jpeg ofsz=1362 odim=70x70 ofmt=webp
x-goog-meta-x-goog-reserved-source-generation
1588631330699120
fastly-stats
io=1
content-length
1362
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"WJx6jKkdQae/xT/2CLMZ+wj9F2L05l7GfidXOzIiG/Q"
vary
Accept-Encoding, Accept
strict-transport-security
max-age=31536000
content-language
en
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
content-type
image/webp
expires
Mon, 06 Dec 2021 09:31:39 GMT
require-2.1.2.js
www.zdnet.com/a/fly/js/libs/
16 KB
6 KB
Script
General
Full URL
https://www.zdnet.com/a/fly/js/libs/require-2.1.2.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
a70d5b9ad136255942779acf94da5cc72316fde5c10c5e7707d6f1888f43dcb8
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:54 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
6169
x-xss-protection
1; mode=block
last-modified
Tue, 14 Dec 2021 16:01:53 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"ef4ea9601b2a10c6fa6a76408a1d97b4"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 21 Dec 2021 18:20:59 GMT
inlineMedia_core.js
static.myfinance.com/widget/
184 KB
63 KB
Script
General
Full URL
https://static.myfinance.com/widget/inlineMedia_core.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6815:2b8a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0c2898711aa44688968b5769b7ca3a50be196c4897657ab6ce34f215b07f455d
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:54 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
age
358
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
x-amz-request-id
HHSJP7534EDWQCG3
x-amz-id-2
Ko19KzwjZiLsOj2lCJFOTqS9WvYxwFid2E6CS14yXQmbV0jEqPWA5XNNGBZenh2WKw8BnJJ41h4=
last-modified
Thu, 09 Dec 2021 19:58:40 GMT
server
cloudflare
etag
W/"874805badaa992bae7fba35738ee6edc"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=f34ZGjXGYtLTO8peRoblryqo8vjZW1YiEGNu6tFmR4YucGfZPBe3vk1zKK%2FjwS1pgfA4PurxnGtUiEY8q5TiP2LZ7aGDqWaf5injWoHSOYz1RReEwxohLg%2FvsFW1RWnHTxYe9JPGdIAy6c7M75gvvJfg3w%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript
vary
Accept-Encoding
cache-control
max-age=14400
cf-ray
6befb2381e22433f-FRA
inlineMedia.css
static.myfinance.com/widget/
3 KB
1 KB
Stylesheet
General
Full URL
https://static.myfinance.com/widget/inlineMedia.css
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6815:2b8a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c50d5d10df377bd960648973b53891bfcaf48f457503eed023ad2c29f28e49b2
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:54 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
age
346
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
x-amz-request-id
RM9EMK8GHMB7NW7G
x-amz-id-2
rO4/tb/v63P6c/qJxa0JBYiRUj2pmFCIHFUoYyKlU+xVn/UKNLDsHpQEB0iQ2jT47cP+krHxRTQ=
last-modified
Mon, 12 Jul 2021 14:22:18 GMT
server
cloudflare
etag
W/"528a38ce39fc58a866c1226253bbb189"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=FGerY1O46USEGzlRCXW%2BmtDUn%2FLvMbbKWOH3JFSr5xMHmvNxiRCvuTd54ne5kvlZCaEdS3PnuIOYu7VKro%2F%2FgsGMelMdbBgFFZiiwu6Ige%2B8vV0oTtworkYf4zw%2FD8xJVjJmhCaBqFnSeg6zHuohv8ft%2BA%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
text/css
vary
Accept-Encoding
cache-control
max-age=14400
cf-ray
6befb2381e25433f-FRA
logo.png
www.zdnet.com/a/fly/1639688064-asset/bundles/zdnetcss/images/core/
4 KB
4 KB
Image
General
Full URL
https://www.zdnet.com/a/fly/1639688064-asset/bundles/zdnetcss/images/core/logo.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/a/fly/css/core/main-61ec7c25fb-rev.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
ff2ae991ac0efdb5ae8b4428ba8555a0aeb0fd94b8014ce290c484242c524097
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/a/fly/css/core/main-61ec7c25fb-rev.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

content-security-policy
default-src https://*.zdnet.com:*
via
1.1 varnish
last-modified
Thu, 16 Dec 2021 19:54:03 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
date
Fri, 17 Dec 2021 11:08:54 GMT
vary
Accept-Encoding, Accept
content-type
image/png
cache-control
max-age=31536000
strict-transport-security
max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
content-length
4105
x-xss-protection
1; mode=block
expires
Thu, 23 Dec 2021 20:08:24 GMT
Regular.woff2
www.zdnet.com/a/fly/bundles/zdnetcss/fonts/Proxima%20Nova/
20 KB
20 KB
Font
General
Full URL
https://www.zdnet.com/a/fly/bundles/zdnetcss/fonts/Proxima%20Nova/Regular.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
7fa1c7b1686f9f116183456c39f7b3ed9cce063cfb428e575fe4a29ae05c4fa6
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Origin
https://www.zdnet.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:54 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
content-length
20256
x-xss-protection
1; mode=block
last-modified
Fri, 12 Nov 2021 15:35:30 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"2d636d9395b2da27ce67040250333ca4"
strict-transport-security
max-age=31536000
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 16 Nov 2022 18:20:56 GMT
Semibold.woff2
www.zdnet.com/a/fly/bundles/zdnetcss/fonts/Proxima%20Nova/
20 KB
20 KB
Font
General
Full URL
https://www.zdnet.com/a/fly/bundles/zdnetcss/fonts/Proxima%20Nova/Semibold.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
21c9c7889404394d4e4c780022b56b5fa39e83b19c34eb0508561a115a1dcc6a
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Origin
https://www.zdnet.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:54 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
content-length
20344
x-xss-protection
1; mode=block
last-modified
Fri, 12 Nov 2021 15:35:29 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"a96ff4477074c6395b7305d2d98fde8e"
strict-transport-security
max-age=31536000
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 16 Nov 2022 18:20:56 GMT
e70f246a-fd9b-4805-9fd4-fcd89020aca5.json
cdn.cookielaw.org/consent/e70f246a-fd9b-4805-9fd4-fcd89020aca5/
3 KB
2 KB
XHR
General
Full URL
https://cdn.cookielaw.org/consent/e70f246a-fd9b-4805-9fd4-fcd89020aca5/e70f246a-fd9b-4805-9fd4-fcd89020aca5.json
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:9540 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
eaf765d314b24473895a9ece61135d31023528c3b65129051b2c5a471d780604
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Fri, 17 Dec 2021 11:08:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
content-md5
xkIaWO5Hr0+rNu9IdoYHdw==
age
13885
vary
Accept-Encoding
content-length
1425
x-ms-lease-status
unlocked
last-modified
Thu, 08 Jul 2021 15:15:53 GMT
server
cloudflare
etag
0x8D94223473B0939
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
6b7a330a-601e-004d-2d15-b61e04000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
cf-ray
6befb2384df72b41-FRA
expires
Fri, 17 Dec 2021 15:08:54 GMT
main.default.js
www.zdnet.com/a/fly/046431-fly/js/
223 KB
70 KB
Script
General
Full URL
https://www.zdnet.com/a/fly/046431-fly/js/main.default.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
022185811a029208da14948f296e29ce3ebb9aa90dfaf6a14570245e89a80165
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:54 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
71889
x-xss-protection
1; mode=block
last-modified
Thu, 16 Dec 2021 20:56:48 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 23 Dec 2021 20:58:44 GMT
config.json
c.go-mpulse.net/api/ Frame 5237
2 KB
1 KB
XHR
General
Full URL
https://c.go-mpulse.net/api/config.json?key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&d=www.zdnet.com&t=5465798&v=1.720.0&if=&sl=0&si=7b61c548-58c6-47b7-93b1-fc3b044590b8-r49ayu&plugins=ConfigOverride,Continuity,PageParams,IFrameDelay,AutoXHR,SPA,History,Angular,Backbone,Ember,RT,CrossDomain,BW,PaintTiming,NavigationTiming,ResourceTiming,Memory,CACHE_RELOAD,Errors,TPAnalytics,UserTiming,Akamai,Early,EventTiming,LOGN&acao=
Requested by
Host: c.go-mpulse.net
URL: https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2a02:26f0:6c00:1bb::11a6 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
63c93c795a3c8799f217f3502e7a808ac3861f8b159efc3ea7fe575c14644892

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Date
Fri, 17 Dec 2021 11:08:54 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/json
Access-Control-Allow-Origin
*
Cache-Control
private, max-age=300, stale-while-revalidate=60, stale-if-error=120
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
804
location
geolocation.onetrust.com/cookieconsentpub/v1/geo/
165 B
374 B
Script
General
Full URL
https://geolocation.onetrust.com/cookieconsentpub/v1/geo/location
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:b944 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
77ae4fb56d2da594993ef6f0203c0cef103af28f7e4c5e0ac045909137422cf9
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:54 GMT
content-encoding
gzip
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
strict-transport-security
max-age=31536000; includeSubDomains; preload
cf-ray
6befb2388fe64a7a-FRA
record
a.myfidevs.io/ Frame
0
0
Preflight
General
Full URL
https://a.myfidevs.io/record
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.73.158.59 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-73-158-59.compute-1.amazonaws.com
Software
Python/3.7 aiohttp/3.7.4.post0 /
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
content-type,x-api-key
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:08:54 GMT
access-control-allow-origin
*
access-control-allow-credentials
true
access-control-allow-methods
POST
access-control-allow-headers
*
server
Python/3.7 aiohttp/3.7.4.post0
record
a.myfidevs.io/
0
166 B
XHR
General
Full URL
https://a.myfidevs.io/record
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.73.158.59 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-73-158-59.compute-1.amazonaws.com
Software
Python/3.7 aiohttp/3.7.4.post0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept
application/json
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
x-api-key
yuH27H1QId6afXAojow6Tafi7Vw9v1spaLD5Yznw
Content-Type
application/json

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:08:54 GMT
access-control-allow-credentials
true
server
Python/3.7 aiohttp/3.7.4.post0
access-control-allow-headers
*
access-control-allow-methods
POST
v1.5
www.myfinance.com/api/au/ Frame
0
0
Preflight
General
Full URL
https://www.myfinance.com/api/au/v1.5?imre=aHR0cHM6Ly93d3cuemRuZXQuY29tL2FydGljbGUvc3VzcGVjdGVkLWlyYW5pYW4taGFja2Vycy10YXJnZXQtYWlybGluZS13aXRoLW5ldy1iYWNrZG9vci8=
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6815:2b8a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
content-type
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:08:54 GMT
content-type
text/html; charset=utf-8
vary
Origin
access-control-allow-credentials
true
access-control-allow-origin
https://www.zdnet.com
access-control-allow-headers
x-requested-with, content-type, accept, origin, authorization, x-csrftoken, x-api-key, Access-Control-Allow-Origin
access-control-allow-methods
DELETE, GET, OPTIONS, PATCH, POST, PUT
access-control-max-age
86400
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=TTyYyTxyNu7A%2BmLkBG90Jowajq3NaGnTvKMxkySUwHTA5om6re0pm6XVxHzjhlrnz%2FcSwGPr88UzKDBqPnLyMrD5VnkJEVIsUYZooYn4XrOBWY8Jgpdx%2F05fKMoe3OGJkrwPyZ8JpZnWYk2C9hPWmQ%3D%3D"}],"group":"cf-nel","max_age":604800}
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
strict-transport-security
max-age=15552000
x-content-type-options
nosniff
server
cloudflare
cf-ray
6befb238ceca2bc6-FRA
content-encoding
br
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
v1.5
www.myfinance.com/api/au/
1 KB
1 KB
XHR
General
Full URL
https://www.myfinance.com/api/au/v1.5?imre=aHR0cHM6Ly93d3cuemRuZXQuY29tL2FydGljbGUvc3VzcGVjdGVkLWlyYW5pYW4taGFja2Vycy10YXJnZXQtYWlybGluZS13aXRoLW5ldy1iYWNrZG9vci8=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:3037::6815:2b8a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7e91278e50f67b763fdba4fee2eb51877a8579675b8614de95b103bf970a1e11
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

Accept
application/json
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
application/json

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
DYNAMIC
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
content-type
application/json
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
allow
POST, GET
server
cloudflare
x-frame-options
SAMEORIGIN
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=NjWcv1br99R0s%2FOGPmcXygpYWJ5jtfKHTB0pl0VfURGlTKZJyud7tly9iGmIPxEJmPG9C6COsNAFclDr3eRXT79hi%2FMQY0cgsj%2FGriLv0DW8RKzlwtT3QzaA6wVPekeAxTdlwCj6dD4Ii9NbR1VWWQ%3D%3D"}],"group":"cf-nel","max_age":604800}
content-language
en-us
access-control-allow-origin
https://www.zdnet.com
vary
Accept, Accept-Language, Origin, Cookie
cache-control
max-age=0, no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cf-ray
6befb23b7de24e55-FRA
expires
Fri, 17 Dec 2021 11:08:55 GMT
bidbarrel-zdnet-rv.min.js
at.adtech.redventures.io/lib/dist/prod/
607 KB
177 KB
Script
General
Full URL
https://at.adtech.redventures.io/lib/dist/prod/bidbarrel-zdnet-rv.min.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.130.154 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
6c0cd7b80611259d4ccce9165e8b5dd062aad43e3e3e19a404fe967c49795d03

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:54 GMT
via
1.1 9e62923882d737ac8cd27f0d1b1c24cf.cloudfront.net (CloudFront), 1.1 varnish
age
62
x-cache
Hit from cloudfront, HIT
content-encoding
gzip
content-length
180330
x-served-by
cache-fra19150-FRA
last-modified
Thu, 28 Oct 2021 17:15:17 GMT
server
AmazonS3
x-timer
S1639739335.539419,VS0,VE11
etag
"873be44731952ce6844f825d0be702dd"
vary
Accept-Encoding, Origin
content-type
application/javascript
cache-control
max-age=900, public, must-revalidate
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
x-amz-cf-id
gR2fiLfvKwteblQ23sPNxcBywweGcbdlJTs6Uu-Jbu3uCBy_Gv-87Q==
x-cache-hits
1
otBannerSdk.js
cdn.cookielaw.org/scripttemplates/6.20.0/
376 KB
84 KB
Script
General
Full URL
https://cdn.cookielaw.org/scripttemplates/6.20.0/otBannerSdk.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:9540 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
295c66c14524b77dd1271317457dec037b5ef0943da346b9b73681e54da826e0
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Fri, 17 Dec 2021 11:08:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
content-md5
jOOTzA5W9ewbfwCUPpt/mw==
age
5137283
vary
Accept-Encoding
content-length
86053
x-ms-lease-status
unlocked
last-modified
Wed, 07 Jul 2021 06:41:48 GMT
server
cloudflare
etag
0x8D941124BEC2620
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/javascript
access-control-allow-origin
*
x-ms-request-id
b5562596-701e-0174-096c-c418f5000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
cf-ray
6befb238c9fe4ee0-FRA
urs.js
urs.zdnet.com/sdk/
50 KB
50 KB
Script
General
Full URL
https://urs.zdnet.com/sdk/urs.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.120.203.121 Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
121.203.120.34.bc.googleusercontent.com
Software
/
Resource Hash
fb7a86f12d2f0ac2f4111c147415ab30f9c7d84c5e15faba3875fce7ce590127
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:54 GMT
via
1.1 google
last-modified
Tue, 12 Jan 2021 17:00:48 GMT
etag
"5ffdd5c0-c803"
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/javascript
accept-ranges
bytes
alt-svc
clear
content-length
51203
mpulse-1.0.2.js
www.zdnet.com/a/fly/js/libs/
61 KB
12 KB
Script
General
Full URL
https://www.zdnet.com/a/fly/js/libs/mpulse-1.0.2.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
ea7373d7059ab32d4304249b48a91311f91d2dce5e1ebf10450f33f9a8c5f5ec
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:54 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
12449
x-xss-protection
1; mode=block
last-modified
Mon, 13 Dec 2021 22:34:51 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"148d7e6acc80b32c08a3cbf8e3164307"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 21 Dec 2021 05:39:11 GMT
config.json
c.go-mpulse.net/api/v2/
2 KB
1 KB
XHR
General
Full URL
https://c.go-mpulse.net/api/v2/config.json?key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&t=1639739334547&s=140633f8c49bbc1ccbab665469b3a9182f8b74efa549dc13a81a07e9fd31ec00
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2a02:26f0:6c00:1bb::11a6 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
6044611fe31b4f58f790c0597b05a079cb25af2e2ded652e4c721a89d840c3d3

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Date
Fri, 17 Dec 2021 11:08:54 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
private, max-age=300, stale-while-revalidate=60, stale-if-error=120
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
874
en.json
cdn.cookielaw.org/consent/e70f246a-fd9b-4805-9fd4-fcd89020aca5/069e0a06-a1be-44f5-9a8f-926f2985d489/
93 KB
20 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/consent/e70f246a-fd9b-4805-9fd4-fcd89020aca5/069e0a06-a1be-44f5-9a8f-926f2985d489/en.json
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:9540 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c83de3876b70820a0a835648010dc49a5600d6c3dd65f1a1e19ff44d33663083
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Fri, 17 Dec 2021 11:08:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
content-md5
AlmWtxV11YCExQkuyz0PJA==
age
13885
vary
Accept-Encoding
content-length
20136
x-ms-lease-status
unlocked
last-modified
Thu, 08 Jul 2021 15:15:59 GMT
server
cloudflare
etag
0x8D942234AE979B3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
04e26c27-701e-00bc-7615-b6cf97000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
cf-ray
6befb2390f522b41-FRA
expires
Fri, 17 Dec 2021 15:08:54 GMT
otFlat.json
cdn.cookielaw.org/scripttemplates/6.20.0/assets/
13 KB
3 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/scripttemplates/6.20.0/assets/otFlat.json
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:9540 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
72562f00bd821b6edc0368065bf009468955ba01f8ead742d8bbc2470c4358c4
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Fri, 17 Dec 2021 11:08:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
content-md5
/OL7qnwFOarng5AW29V9Pw==
age
5137258
vary
Accept-Encoding
content-length
2950
x-ms-lease-status
unlocked
last-modified
Wed, 07 Jul 2021 06:41:42 GMT
server
cloudflare
etag
0x8D94112485FC2D3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/json
access-control-allow-origin
*
x-ms-request-id
84c52ef2-f01e-0048-626c-c4ea7b000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
cf-ray
6befb2393fb62b41-FRA
diff
at.adtech.redventures.io/lib/api/v1/zdnet-rv/prod/config/ Frame
0
0
Preflight
General
Full URL
https://at.adtech.redventures.io/lib/api/v1/zdnet-rv/prod/config/diff?variant=core
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.130.154 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
Google Frontend /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
*/*
Access-Control-Request-Method
GET
Access-Control-Request-Headers
cat,content-type,variant,version
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

content-type
text/html; charset=utf-8
x-dns-prefetch-control
off
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=15552000; includeSubDomains
x-download-options
noopen
x-content-type-options
nosniff
x-xss-protection
1; mode=block
access-control-allow-origin
https://www.zdnet.com
access-control-allow-headers
*
allow
GET,HEAD
etag
W/"8-ZRAf8oNBS3Bjb/SU2GYZCmbtmXg"
x-cloud-trace-context
b13e388a68a0e53825188d5b382d9bbb
server
Google Frontend
accept-ranges
bytes
date
Fri, 17 Dec 2021 11:08:54 GMT
via
1.1 varnish
x-served-by
cache-fra19160-FRA
x-cache
MISS
x-cache-hits
0
x-timer
S1639739335.672952,VS0,VE112
vary
Accept-Encoding, Origin
content-length
8
config.js
confiant-integrations.global.ssl.fastly.net/J3UXFee1xclY-bfFlWh1mIZ_phU/gpt_and_prebid/
163 KB
32 KB
Script
General
Full URL
https://confiant-integrations.global.ssl.fastly.net/J3UXFee1xclY-bfFlWh1mIZ_phU/gpt_and_prebid/config.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.129.194 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
40a3d46590200a193c0556b55b04e888bc2399faa60ffc3aa95e83cda8981601

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Date
Fri, 17 Dec 2021 11:08:54 GMT
Content-Encoding
gzip
Age
990
X-Cache
HIT
Connection
keep-alive
Content-Length
32255
x-amz-id-2
kVDHvB6ykPPTAEDAabCm3ccFM2DDxb53Rg9M1jY4izZQIlKbR33qen8jCcCieZdsM/+rFXJ7AOY=
X-Served-By
cache-fra19125-FRA
Last-Modified
Fri, 17 Dec 2021 10:42:57 GMT
Server
AmazonS3
X-Timer
S1639739335.654198,VS0,VE0
ETag
"4ad6984a8f154c16b986a4ba17b2cc66"
x-amz-request-id
6TJN4Q6TBVDSFYKZ
Via
1.1 varnish
Cache-Control
public, max-age=900, stale-while-revalidate=3600
Accept-Ranges
bytes
Content-Type
text/javascript
X-Cache-Hits
18
diff
at.adtech.redventures.io/lib/api/v1/zdnet-rv/prod/config/
26 KB
3 KB
Fetch
General
Full URL
https://at.adtech.redventures.io/lib/api/v1/zdnet-rv/prod/config/diff?variant=core
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.130.154 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
Google Frontend /
Resource Hash
3e279129e0b32c21501807eddb0c582841a0536e6dac62169361c51d5a9baed1
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

cat
5zTciER5s
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
application/json
Accept
application/json
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
variant
core
version
rv2.25.6

Response headers

strict-transport-security
max-age=15552000; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
age
604
x-dns-prefetch-control
off
x-cache
HIT
ttl
900s
content-length
2720
x-xss-protection
1; mode=block
x-served-by
cache-fra19160-FRA
access-control-allow-origin
*
server
Google Frontend
x-timer
S1639739335.791236,VS0,VE1
x-frame-options
SAMEORIGIN
date
Fri, 17 Dec 2021 11:08:54 GMT
x-download-options
noopen
vary
Accept-Encoding, Origin
content-type
application/json; charset=utf-8
via
1.1 varnish
x-cloud-trace-context
ba88bbff27fa65d1c7d69ed7cf7226c8
cache-control
max-age=900
etag
W/a2d3576aa9cd593699dde9d75b9183cf051d0dcf
accept-ranges
bytes
access-control-allow-headers
*
x-cache-hits
1
gpt.js
securepubads.g.doubleclick.net/tag/js/
78 KB
27 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/tag/js/gpt.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
sffe /
Resource Hash
1907478e8fa62801a1db26be87cab0755288131c9c8e80320582e560825df3cc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1073 / 158 of 1000 / last-modified: 1639397097"
vary
Accept-Encoding
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
content-type
text/javascript
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
26912
x-xss-protection
0
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
expires
Fri, 17 Dec 2021 11:08:54 GMT
cohesion-latest.min.js
cdn.cohesionapps.com/cohesion/
77 KB
22 KB
Script
General
Full URL
https://cdn.cohesionapps.com/cohesion/cohesion-latest.min.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
18.66.139.25 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-18-66-139-25.fra60.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
6d5246d5f81b078b8d850b3fbe4ac7c44d05c0755ea14786c6fee453e6805fff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

x-amz-version-id
null
content-encoding
gzip
etag
W/"9f7be06169d1d8c9558378c9b8f53586"
last-modified
Tue, 14 Dec 2021 17:07:13 GMT
server
AmazonS3
age
64895
x-amz-server-side-encryption
AES256
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/javascript
via
1.1 ed7f977b6d983a16331e3fe3f4764e9a.cloudfront.net (CloudFront)
date
Thu, 16 Dec 2021 17:07:19 GMT
x-amz-cf-pop
FRA60-P4
x-amz-cf-id
jCQ7Q8wV8nL5-dYJHe0OBWIY8CoWt5Fqhom9O1cg2B-ffsm3erTHJw==
wrap.js
confiant-integrations.global.ssl.fastly.net/gptprebidnative/202112021159/
189 KB
61 KB
Script
General
Full URL
https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202112021159/wrap.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.129.194 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
80da370ad41bee2716b42d1583e139eac39f5c7c243c5fe6439b9754013116c6

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Date
Fri, 17 Dec 2021 11:08:54 GMT
Content-Encoding
gzip
Age
691
X-Cache
HIT
Connection
keep-alive
Content-Length
61460
x-amz-id-2
mhjLBwq4ofP4Ht18aFXJwavbMA7sAA+j53tdu5a+bQynUB9jggNi8MPZBXPh5JJbJapjzT+KHSM=
X-Served-By
cache-fra19125-FRA
Last-Modified
Thu, 02 Dec 2021 17:00:39 GMT
Server
AmazonS3
X-Timer
S1639739335.774683,VS0,VE0
ETag
"0bad6e8b774e2623401e436c2a44f48e"
x-amz-request-id
K526S02KR1DXHTEX
Via
1.1 varnish
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
Content-Type
application/javascript; charset=utf-8
X-Cache-Hits
355
article-6ebc50982c-rev.js
www.zdnet.com/a/fly/js/pages/
102 KB
26 KB
Script
General
Full URL
https://www.zdnet.com/a/fly/js/pages/article-6ebc50982c-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
5b6e97cf069d0d1a67390ad12ef50237963c77addfd1c8f15399b916993dd143
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:54 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
26736
x-xss-protection
1; mode=block
last-modified
Tue, 14 Dec 2021 15:00:39 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"077e6dbcc2328e1aabe9b3b472aa6e18"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 21 Dec 2021 15:23:17 GMT
pubads_impl_2021120601.js
securepubads.g.doubleclick.net/gpt/
348 KB
117 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021120601.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
sffe /
Resource Hash
2d5ae5a515a688823dc98d032242c2ed6f490a74c4281bdd599567898f9fa675
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
119476
x-xss-protection
0
last-modified
Mon, 06 Dec 2021 09:34:20 GMT
server
sffe
vary
Accept-Encoding
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
content-type
text/javascript
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
expires
Fri, 17 Dec 2021 11:08:54 GMT
ppub_config
securepubads.g.doubleclick.net/pagead/
233 B
160 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/pagead/ppub_config?ippd=www.zdnet.com
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
8884ad54b3b16ad4e66af3377c4b475899c1c70807bb0bc3eca9227a0b09444b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:08:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private, max-age=3600, stale-while-revalidate=3600
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
135
x-xss-protection
0
expires
Fri, 17 Dec 2021 11:08:54 GMT
t
ingest.make.rvapps.io/v2/ Frame
0
0
Preflight
General
Full URL
https://ingest.make.rvapps.io/v2/t
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.128.45 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-128-45.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
authorization,content-type
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-length
0
access-control-allow-credentials
true
access-control-allow-headers
Authorization, Content-Type
access-control-allow-methods
POST
access-control-allow-origin
*
access-control-max-age
900
vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
t
ingest.make.rvapps.io/v2/ Frame
0
0
Preflight
General
Full URL
https://ingest.make.rvapps.io/v2/t
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.128.45 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-128-45.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
authorization,content-type
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-length
0
access-control-allow-credentials
true
access-control-allow-headers
Authorization, Content-Type
access-control-allow-methods
POST
access-control-allow-origin
*
access-control-max-age
900
vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
t
ingest.make.rvapps.io/v2/ Frame
0
0
Preflight
General
Full URL
https://ingest.make.rvapps.io/v2/t
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.128.45 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-128-45.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
authorization,content-type
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-length
0
access-control-allow-credentials
true
access-control-allow-headers
Authorization, Content-Type
access-control-allow-methods
POST
access-control-allow-origin
*
access-control-max-age
900
vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
t
ingest.make.rvapps.io/v2/ Frame
0
0
Preflight
General
Full URL
https://ingest.make.rvapps.io/v2/t
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.128.45 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-128-45.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
authorization,content-type
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-length
0
access-control-allow-credentials
true
access-control-allow-headers
Authorization, Content-Type
access-control-allow-methods
POST
access-control-allow-origin
*
access-control-max-age
900
vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
t
ingest.make.rvapps.io/v2/ Frame
0
0
Preflight
General
Full URL
https://ingest.make.rvapps.io/v2/t
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.128.45 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-128-45.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
authorization,content-type
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-length
0
access-control-allow-credentials
true
access-control-allow-headers
Authorization, Content-Type
access-control-allow-methods
POST
access-control-allow-origin
*
access-control-max-age
900
vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
t
ingest.make.rvapps.io/v2/
138 B
271 B
XHR
General
Full URL
https://ingest.make.rvapps.io/v2/t
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.128.45 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-128-45.compute-1.amazonaws.com
Software
/
Resource Hash
fb83615340db35569e782b4dffde2a5f730375b00b089fb8f759eea99c5a751c

Request headers

User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
Authorization
Basic d2tfMWtZc0FkSHN4MVhWd1Q1RWJYOU9RWWw0bkpNOg==
Content-Type
application/json;charset=UTF-8

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:08:55 GMT
access-control-allow-credentials
true
content-length
138
vary
Origin
content-type
application/json
t
ingest.make.rvapps.io/v2/
138 B
271 B
XHR
General
Full URL
https://ingest.make.rvapps.io/v2/t
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.128.45 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-128-45.compute-1.amazonaws.com
Software
/
Resource Hash
651a0ae622d8a5e8707d74229c577a5d503ddae683dcb8c94eb84b4c9a5fc4fb

Request headers

User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
Authorization
Basic d2tfMWtZc0FkSHN4MVhWd1Q1RWJYOU9RWWw0bkpNOg==
Content-Type
application/json;charset=UTF-8

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:08:55 GMT
access-control-allow-credentials
true
content-length
138
vary
Origin
content-type
application/json
t
ingest.make.rvapps.io/v2/
138 B
271 B
XHR
General
Full URL
https://ingest.make.rvapps.io/v2/t
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.128.45 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-128-45.compute-1.amazonaws.com
Software
/
Resource Hash
ad91cf29023e658fd9297ec5dddb4da37187671202ad3b140b5be708b3412372

Request headers

User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
Authorization
Basic d2tfMWtZc0FkSHN4MVhWd1Q1RWJYOU9RWWw0bkpNOg==
Content-Type
application/json;charset=UTF-8

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:08:55 GMT
access-control-allow-credentials
true
content-length
138
vary
Origin
content-type
application/json
t
ingest.make.rvapps.io/v2/
137 B
270 B
XHR
General
Full URL
https://ingest.make.rvapps.io/v2/t
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.128.45 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-128-45.compute-1.amazonaws.com
Software
/
Resource Hash
c9cd6877788a30a545123c4e0872f87c4d2193b31e5e8d140da067b53209e682

Request headers

User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
Authorization
Basic d2tfMWtZc0FkSHN4MVhWd1Q1RWJYOU9RWWw0bkpNOg==
Content-Type
application/json;charset=UTF-8

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:08:55 GMT
access-control-allow-credentials
true
content-length
137
vary
Origin
content-type
application/json
t
ingest.make.rvapps.io/v2/
137 B
270 B
XHR
General
Full URL
https://ingest.make.rvapps.io/v2/t
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.128.45 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-128-45.compute-1.amazonaws.com
Software
/
Resource Hash
cc666b7ed486227d9ccda81846900b8f84b2c642925955a7d45bda1a22f3dd06

Request headers

User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
Authorization
Basic d2tfMWtZc0FkSHN4MVhWd1Q1RWJYOU9RWWw0bkpNOg==
Content-Type
application/json;charset=UTF-8

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:08:55 GMT
access-control-allow-credentials
true
content-length
137
vary
Origin
content-type
application/json
xs1.html
cdn.cohesionapps.com/cohesion/ Frame 29C5
2 KB
1 KB
Document
General
Full URL
https://cdn.cohesionapps.com/cohesion/xs1.html
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
18.66.139.25 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-18-66-139-25.fra60.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
afac3a301d848688d0748228296ec7ae26369f67c2df29f3f480ef3ab0bc6ef9

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/

Response headers

content-type
text/html
last-modified
Tue, 14 Dec 2021 17:07:14 GMT
x-amz-server-side-encryption
AES256
x-amz-version-id
null
server
AmazonS3
content-encoding
gzip
date
Thu, 16 Dec 2021 17:07:28 GMT
etag
W/"10b2c1751c2247b1aeccc91060f971cf"
vary
Accept-Encoding
x-cache
Hit from cloudfront
via
1.1 ed7f977b6d983a16331e3fe3f4764e9a.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA60-P4
x-amz-cf-id
GS-Inl7k-lDL5Do_xLO0rtTfDp5jTSblIPf1SSt1rOXf512xf8I3Hg==
age
64887
public
taggy.cohesionapps.com/implementations/
9 KB
9 KB
XHR
General
Full URL
https://taggy.cohesionapps.com/implementations/public
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.105.31 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-5-105-31.compute-1.amazonaws.com
Software
/ Express
Resource Hash
13631760fe58e5e9c2cf16890b9869a78629cb3769f552fb3b0eaf3fba8e934e

Request headers

Source-Key
src_1kYsAcdpfzbZ8UlNLYht1RPg3m2
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
Page-URL
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/#ftag=RSSbaffb68
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
application/json;charset=UTF-8

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:08:55 GMT
x-powered-by
Express
etag
W/"23f1-I/Ne1r04eidCtHXfz5YfX2yJL70"
content-length
9201
content-type
application/json; charset=utf-8
public
taggy.cohesionapps.com/implementations/ Frame
0
0
Preflight
General
Full URL
https://taggy.cohesionapps.com/implementations/public
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.105.31 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-5-105-31.compute-1.amazonaws.com
Software
/ Express
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
GET
Access-Control-Request-Headers
content-type,page-url,source-key
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
x-powered-by
Express
access-control-allow-origin
*
access-control-allow-methods
GET,HEAD,PUT,PATCH,POST,DELETE
vary
Access-Control-Request-Headers
access-control-allow-headers
content-type,page-url,source-key
moatheader.js
z.moatads.com/redventuresgamheader644747280705/
240 KB
82 KB
Script
General
Full URL
https://z.moatads.com/redventuresgamheader644747280705/moatheader.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
ba5c9b5823ef1377da70e73357b85ef2dca7ade9afe70c93d0aa163c61c9bf03

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-encoding
gzip
last-modified
Thu, 02 Dec 2021 16:10:34 GMT
server
AmazonS3
x-amz-request-id
DG2H92XYZRQZ4RSV
etag
"33d2b31f29685690d6e2e3d016555f04"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=15263
accept-ranges
bytes
content-length
83699
x-amz-id-2
TnGeV4HtYB4NVPsPbHr+b5g34xbNmb7VjpQ7zI9/ywXjEabCjusxmRc+mMFbdi/bypbtdhI7jN0=
integrator.js
adservice.google.de/adsid/
107 B
792 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:829::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
a4a1824defec1084ca81d496ee77891684c26196924bdc4fc21dd3482ce15e14
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:08:55 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
cache-control
private, no-cache, no-store
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3="googleads.g.doubleclick.net:443"; ma=2592000,h3=":443"; ma=2592000,h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
100
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
107 B
549 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80e::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
a4a1824defec1084ca81d496ee77891684c26196924bdc4fc21dd3482ce15e14
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:08:55 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
cache-control
private, no-cache, no-store
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
100
x-xss-protection
0
ads
securepubads.g.doubleclick.net/gampad/
26 KB
11 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=1713214506163158&correlator=2777057700352241&output=ldjh&impl=fifs&eid=44752541%2C31063247%2C31062930%2C44755509&vrg=2021120601&ptt=17&sc=1&sfv=1-0-38&ecs=20211217&iu_parts=22309610186%2Caw-zdnet%2Ctechnology%2Csecurity&enc_prev_ius=%2F0%2F1%2F2%2F3&prev_iu_szs=728x90%7C970x66%7C5x5&prev_scp=pos%3Dnav%26sl%3Dnav-ad-plus-leader%253FT-1000%26iid%3Dunit%253Dnav-ad-plus-leader%257Cvguid%253D1f8fc507-22e1-4084-b232-490f1c9ac87e%257Cpv%253D1&eri=1&cust_params=test%3Dseamless%257C1%257Cb%26buyingcycle%3Ddiscover%26topic%3Dsecurity%26mfr%3Dslack%252Cibm%26tag%3Dcyber-security%252Ctarget%26device%3Ddesktop%26ptype%3Darticle%26cid%3Dsuspected-iranian-hackers-target-airline-with-new-backdoor%26env%3Dprod%26user%3Danon%26userGroup%3Dfirst_impression%26type%3Dgpt%26region%3Daw%26subses%3D6%26session%3Dd%26pv%3D1%26vguid%3D1f8fc507-22e1-4084-b232-490f1c9ac87e&cookie_enabled=1&bc=31&abxe=1&lmt=1639739335&dt=1639739335071&dlt=1639739334332&idt=683&frm=20&biw=1600&bih=1200&oid=2&adxs=436&adys=50&adks=3529097836&ucis=1&ifi=1&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1600x100&msz=1600x100&ga_vid=1833504792.1639739335&ga_sid=1639739335&ga_hid=1833218873&ga_fc=false&fws=4&ohw=1600&btvi=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0.&nvt=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
a5012e7c817cdba2b187c0eb16a5a08e6506350566fda24411c3686e564203a3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
10936
x-xss-protection
0
google-lineitem-id
5840893800
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138375198164
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
container.html
4357ee97dce36347f7ec16a6fa3ba201.safeframe.googlesyndication.com/safeframe/1-0-38/html/ Frame 9750
6 KB
4 KB
Document
General
Full URL
https://4357ee97dce36347f7ec16a6fa3ba201.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a73730123a43c3040d889aaee11ec35094277ce5f778076b262c23a293870adb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/

Response headers

accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
cross-origin-resource-policy
cross-origin
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
timing-allow-origin
*
content-length
3108
date
Fri, 17 Dec 2021 11:08:55 GMT
expires
Sat, 17 Dec 2022 11:08:55 GMT
cache-control
public, immutable, max-age=31536000
last-modified
Tue, 02 Mar 2021 20:17:03 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
ads
securepubads.g.doubleclick.net/gampad/
20 KB
9 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=1713214506163158&correlator=4479416074195677&output=ldjh&impl=fifs&eid=44752541%2C31063247%2C31062930%2C44755509&vrg=2021120601&ptt=17&sc=1&sfv=1-0-38&ecs=20211217&iu_parts=22309610186%2Caw-zdnet%2Ctechnology%2Csecurity&enc_prev_ius=%2F0%2F1%2F2%2F3&prev_iu_szs=300x250%7C300x600&prev_scp=pos%3Dtop%26sl%3Dmpu-plus-top%253FLL%257CT-1000%26iid%3Dunit%253Dmpu-plus-top%257Cvguid%253D1f8fc507-22e1-4084-b232-490f1c9ac87e%257Cpv%253D1&eri=1&cust_params=test%3Dseamless%257C1%257Cb%26buyingcycle%3Ddiscover%26topic%3Dsecurity%26mfr%3Dslack%252Cibm%26tag%3Dcyber-security%252Ctarget%26device%3Ddesktop%26ptype%3Darticle%26cid%3Dsuspected-iranian-hackers-target-airline-with-new-backdoor%26env%3Dprod%26user%3Danon%26userGroup%3Dfirst_impression%26type%3Dgpt%26region%3Daw%26subses%3D6%26session%3Dd%26pv%3D1%26vguid%3D1f8fc507-22e1-4084-b232-490f1c9ac87e&cookie_enabled=1&bc=31&abxe=1&lmt=1639739335&dt=1639739335114&dlt=1639739334332&idt=683&frm=20&biw=1600&bih=1200&oid=2&adxs=1050&adys=450&adks=1139850431&ucis=2&ifi=2&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&vis=1&dmc=8&scr_x=0&scr_y=0&psz=370x280&msz=370x30&ga_vid=1833504792.1639739335&ga_sid=1639739335&ga_hid=1833218873&ga_fc=false&fws=4&ohw=370&btvi=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0.&nvt=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
ddd1a971a6a2f3499fc3cf22e31d9ccf237356291ddba27cccc397583d081f47
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
9415
x-xss-protection
0
google-lineitem-id
5821501893
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138370168508
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
41 KB
10 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=1713214506163158&correlator=1661285892333781&output=ldjh&impl=fifs&eid=44752541%2C31063247%2C31062930%2C44755509&vrg=2021120601&ptt=17&sc=1&sfv=1-0-38&ecs=20211217&iu_parts=22309610186%2Caw-zdnet%2Ctechnology%2Csecurity&enc_prev_ius=%2F0%2F1%2F2%2F3&prev_iu_szs=300x250&prev_scp=pos%3Dmiddle%26sl%3Dmpu-middle%253FLL%257CT-1000%26iid%3Dunit%253Dmpu-middle%257Cvguid%253D1f8fc507-22e1-4084-b232-490f1c9ac87e%257Cpv%253D1&eri=1&cust_params=test%3Dseamless%257C1%257Cb%26buyingcycle%3Ddiscover%26topic%3Dsecurity%26mfr%3Dslack%252Cibm%26tag%3Dcyber-security%252Ctarget%26device%3Ddesktop%26ptype%3Darticle%26cid%3Dsuspected-iranian-hackers-target-airline-with-new-backdoor%26env%3Dprod%26user%3Danon%26userGroup%3Dfirst_impression%26type%3Dgpt%26region%3Daw%26subses%3D6%26session%3Dd%26pv%3D1%26vguid%3D1f8fc507-22e1-4084-b232-490f1c9ac87e&cookie_enabled=1&bc=31&abxe=1&lmt=1639739335&dt=1639739335116&dlt=1639739334332&idt=683&frm=20&biw=1600&bih=1200&oid=2&adxs=1050&adys=1230&adks=3640736402&ucis=3&ifi=3&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&vis=1&dmc=8&scr_x=0&scr_y=0&psz=370x530&msz=370x30&ga_vid=1833504792.1639739335&ga_sid=1639739335&ga_hid=1833218873&ga_fc=false&fws=4&ohw=370&btvi=1&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0.&nvt=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
6a03abd718f55a7bff3dedfe64a13a126f185dc797dee1d7caf62ac66815ccf4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
10545
x-xss-protection
0
google-lineitem-id
-1
pragma
no-cache
server
cafe
google-creative-id
-1
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
access-control-expose-headers
x-google-amp-ad-validated-version
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
23 KB
10 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=1713214506163158&correlator=1688314061443664&output=ldjh&impl=fifs&eid=44752541%2C31063247%2C31062930%2C44755509&vrg=2021120601&ptt=17&sc=1&sfv=1-0-38&ecs=20211217&iu_parts=22309610186%2Caw-zdnet%2Ctechnology%2Csecurity&enc_prev_ius=%2F0%2F1%2F2%2F3&prev_iu_szs=320x50%7C11x11&fluid=height&prev_scp=pos%3Dtop%26strnativekey%3D8ec3a4f3%26sl%3Dsharethrough-top%253FLL%257CT-1000%26iid%3Dunit%253Dsharethrough-top%257Cvguid%253D1f8fc507-22e1-4084-b232-490f1c9ac87e%257Cpv%253D1&eri=1&cust_params=test%3Dseamless%257C1%257Cb%26buyingcycle%3Ddiscover%26topic%3Dsecurity%26mfr%3Dslack%252Cibm%26tag%3Dcyber-security%252Ctarget%26device%3Ddesktop%26ptype%3Darticle%26cid%3Dsuspected-iranian-hackers-target-airline-with-new-backdoor%26env%3Dprod%26user%3Danon%26userGroup%3Dfirst_impression%26type%3Dgpt%26region%3Daw%26subses%3D6%26session%3Dd%26pv%3D1%26vguid%3D1f8fc507-22e1-4084-b232-490f1c9ac87e&cookie_enabled=1&bc=31&abxe=1&lmt=1639739335&dt=1639739335118&dlt=1639739334332&idt=683&frm=20&biw=1600&bih=1200&oid=2&adxs=215&adys=1434&adks=2408233683&ucis=4&ifi=4&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&vis=1&dmc=8&scr_x=0&scr_y=0&psz=770x150&msz=770x0&ga_vid=1833504792.1639739335&ga_sid=1639739335&ga_hid=1833218873&ga_fc=false&fws=4&ohw=770&btvi=2&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0.&nvt=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
1459c6042d3a4b6d2821ac4ece860f9d59da13560a0d0179c5b46c72a26e97e7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
10046
x-xss-protection
0
google-lineitem-id
5667186874
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138346938775
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
xs2.html
cdn.cohesionapps.com/cohesion/ Frame 29C5
473 B
835 B
Document
General
Full URL
https://cdn.cohesionapps.com/cohesion/xs2.html
Requested by
Host: cdn.cohesionapps.com
URL: https://cdn.cohesionapps.com/cohesion/xs1.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
18.66.139.25 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-18-66-139-25.fra60.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
88b8a3cb9df436d6910440c58428516accee080be4fa556d3cf10ec6905cf1b9

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://cdn.cohesionapps.com/cohesion/xs1.html

Response headers

content-type
text/html
content-length
473
last-modified
Tue, 14 Dec 2021 17:07:14 GMT
x-amz-server-side-encryption
AES256
x-amz-version-id
null
accept-ranges
bytes
server
AmazonS3
date
Thu, 16 Dec 2021 17:07:20 GMT
etag
"ffa03bed298484a7755ca23c5431cb28"
x-cache
Hit from cloudfront
via
1.1 ed7f977b6d983a16331e3fe3f4764e9a.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA60-P4
x-amz-cf-id
jppt-xMdiKrouhc6x5z8QOqXdciWfDEqzKR7VF7GZacbWC5Eth7YKw==
age
64896
/
684dd311.akstat.io/
0
354 B
XHR
General
Full URL
https://684dd311.akstat.io/?h.pg=article&h.ab=seamless_b_1&when=1639739335087&cdim.Site_View=desktop&t_other=custom4%7C243&d=zdnet.com&h.key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&h.d=zdnet.com&h.cr=f512cb5ec9dd28daaf36241ad5be41d9dde31976-a7787067-2192eff8&h.t=1639739334583&http.initiator=api&rt.start=api&rt.si=589b107a-fa9f-4154-8b86-5e6c7bd379c1&rt.ss=1639739335003&rt.sl=0&api=1&api.v=2&api.l=js&api.lv=0.0.1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2a02:26f0:6c00:287::11a6 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 Dec 2021 11:08:55 GMT
Content-Type
image/gif
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
X-XSS-Protection
0
Expires
Fri, 17 Dec 2021 11:08:55 GMT
v2
mb.moatads.com/yi/
356 B
531 B
Script
General
Full URL
https://mb.moatads.com/yi/v2?ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-mix2djWwZ10QbMk%2BqjMratT%2F8IKBUGMSV3C%2FvEJM65hND7UVt69nIRrqyNQFcZFf7egP&rs=1-k0RseVcsuGC81Q%3D%3D&sc=1&os=1-8g%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=225203003676&callback=MoatNadoAllJsonpRequest_72994312
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/redventuresgamheader644747280705/moatheader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.11.215.107 London, United Kingdom, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-11-215-107.eu-west-2.compute.amazonaws.com
Software
TornadoServer/5.1.1 /
Resource Hash
a2db3edd49291c72d04a8754b195e23a12019a1af6dc9575a2e269b3c0231f01

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
cache-control
max-age=900
server
TornadoServer/5.1.1
timing-allow-origin
*
etag
"8083d86d174b309c23e64251990e2a9bc00e4bf8"
content-length
356
content-type
text/html; charset=UTF-8
n.js
geo.moatads.com/
84 B
258 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-mix2djWwZ10QbMk%2BqjMratT%2F8IKBUGMSV3C%2FvEJM65hND7UVt69nIRrqyNQFcZFf7egP&rs=1-k0RseVcsuGC81Q%3D%3D&sc=1&os=1-8g%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=225203003676&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&i=REDVENTURES_GAM_HEADER1&hp=1&wf=1&pxm=&sgs=3&vb=6&kq=1&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&bq=11&f=0&j=&t=1639739335132&de=128432776697&m=0&ar=8ab009d7785-clean&iw=04a0275&q=1&cb=0&cu=1639739335132&ll=2&lm=0&ln=0&em=0&en=0&d=undefined%3Aundefined%3Aundefined%3Aundefined&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&id=1&ii=4&bo=undefined&bd=undefined&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&gw=redventuresgamheader644747280705&fd=1&ac=1&it=500&pe=1%3A336%3A336%3A0%3A297&jk=-1&jm=-1&fs=195979&na=792640022&cs=0&ord=1639739335132&jv=72032894&callback=DOMlessLLDcallback_72994312
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/redventuresgamheader644747280705/moatheader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.11.215.107 London, United Kingdom, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-11-215-107.eu-west-2.compute.amazonaws.com
Software
TornadoServer/5.1.1 /
Resource Hash
5eba8784b6c95dd54fc2886b4ff696c22ab9c7bbb0da0ffa1dfcd22cf2ace66a

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
cache-control
max-age=900
server
TornadoServer/5.1.1
timing-allow-origin
*
etag
"a1ab7946df7008d670f63eeef9fe0761fc0530fe"
content-length
84
content-type
text/html; charset=UTF-8
n.js
geo.moatads.com/
85 B
259 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-mix2djWwZ10QbMk%2BqjMratT%2F8IKBUGMSV3C%2FvEJM65hND7UVt69nIRrqyNQFcZFf7egP&rs=1-k0RseVcsuGC81Q%3D%3D&sc=1&os=1-8g%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=225203003676&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&i=REDVENTURES_GAM_HEADER1&hp=1&wf=1&pxm=&sgs=3&vb=6&kq=1&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&bq=11&f=0&j=&t=1639739335132&de=128432776697&m=0&ar=8ab009d7785-clean&iw=04a0275&q=2&cb=0&cu=1639739335132&ll=2&lm=0&ln=0&em=0&en=0&d=undefined%3Aundefined%3Aundefined%3Aundefined&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&id=1&ii=4&bo=undefined&bd=undefined&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&gw=redventuresgamheader644747280705&fd=1&ac=1&it=500&pe=1%3A336%3A336%3A0%3A297&jk=-1&jm=-1&fs=195979&na=768949173&cs=0&callback=MoatDataJsonpRequest_72994312
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/redventuresgamheader644747280705/moatheader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.11.215.107 London, United Kingdom, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-11-215-107.eu-west-2.compute.amazonaws.com
Software
TornadoServer/5.1.1 /
Resource Hash
39ff0a646d7651b781f9d92a1f394fa294cc1d1af938ad005850aedd79b6095b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
cache-control
max-age=900
server
TornadoServer/5.1.1
timing-allow-origin
*
etag
"409ff27e7ec15788b9c93cb814731d44fd560463"
content-length
85
content-type
text/html; charset=UTF-8
t
ingest.make.rvapps.io/v2/ Frame
0
0
Preflight
General
Full URL
https://ingest.make.rvapps.io/v2/t
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.128.45 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-128-45.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
authorization,content-type
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-length
0
access-control-allow-credentials
true
access-control-allow-headers
Authorization, Content-Type
access-control-allow-methods
POST
access-control-allow-origin
*
access-control-max-age
900
vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
t
ingest.make.rvapps.io/v2/ Frame
0
0
Preflight
General
Full URL
https://ingest.make.rvapps.io/v2/t
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.128.45 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-128-45.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
authorization,content-type
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-length
0
access-control-allow-credentials
true
access-control-allow-headers
Authorization, Content-Type
access-control-allow-methods
POST
access-control-allow-origin
*
access-control-max-age
900
vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
t
ingest.make.rvapps.io/v2/
137 B
270 B
XHR
General
Full URL
https://ingest.make.rvapps.io/v2/t
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.128.45 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-128-45.compute-1.amazonaws.com
Software
/
Resource Hash
762efb8a7c6a14d8228a51bcaed3410b43bb0848d4ccf4450bdf01d380f7cb14

Request headers

User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
Authorization
Basic d2tfMWtZc0FkSHN4MVhWd1Q1RWJYOU9RWWw0bkpNOg==
Content-Type
application/json;charset=UTF-8

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:08:55 GMT
access-control-allow-credentials
true
content-length
137
vary
Origin
content-type
application/json
t
ingest.make.rvapps.io/v2/
138 B
271 B
XHR
General
Full URL
https://ingest.make.rvapps.io/v2/t
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.128.45 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-202-128-45.compute-1.amazonaws.com
Software
/
Resource Hash
a441459efd47b55ab98db29f9ea9367cfb09d5b7c7ad648df43d9d347cb73344

Request headers

User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
Authorization
Basic d2tfMWtZc0FkSHN4MVhWd1Q1RWJYOU9RWWw0bkpNOg==
Content-Type
application/json;charset=UTF-8

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:08:55 GMT
access-control-allow-credentials
true
content-length
138
vary
Origin
content-type
application/json
view
securepubads.g.doubleclick.net/pcs/ Frame 52F7
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsu7L-cH9zydfij0MMgeCU1cZmv3wWgF-X0Zbybzx_1oF3K_8-pZMpXfPkxqj6WQXYFuRQTHsqFqiWTzW7hYmYY05N_ZL87vCuwISiNZcseKIzPeXA_nwS5jnMCbvGZ4rN_stvVED1vze8DIQbnv_JzMaAv3012VyxGVaiH8M9qFOi0aw2s4irdvIVqZ3tGBv8XbzdxasTOJHdz41VS4Lv1x99tgTvEOvHqnuZD2eUvIVlTJ6E3w9yHUna6macVoQtyJWe6KpbYraviH4WgeNKhvXvYkYuflLWs3TTPm14A8EpEDd11gQxjw-DaoInzZrlFZt-NmR4maHjz1qYI&sai=AMfl-YS7Gb32872AlbSlwuv14ek9Utin2AXm2_XbpTlmqolwcqIVD1_7wWINqy-1YS1rGH2rig98E0BfcO5LBQ8ShBsQfMTtqatpdVV4pIHcpRuoWWj8bpKN7aYX8JiEToN2&sig=Cg0ArKJSzKt47mHSWVCbEAE&uach_m=[UACH]&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:08:55 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
expires
Fri, 17 Dec 2021 11:08:55 GMT
rx_lidar.js
www.googletagservices.com/activeview/js/current/ Frame 52F7
119 KB
37 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
87f7f86b17eacf56e623a69be05e5f5487470d6b30347efe12742aefa3f5af48
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
37305
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="active-view-scs-read-write-acl"
etag
"1638461285297402"
vary
Accept-Encoding
report-to
{"group":"active-view-scs-read-write-acl","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:08:55 GMT
moatad.js
z.moatads.com/redventuresgamdisplay60805146916/ Frame 52F7
335 KB
112 KB
Script
General
Full URL
https://z.moatads.com/redventuresgamdisplay60805146916/moatad.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
ec3300dff5a35315ea608c5dc57e965957897133eb6a543533566d6e2c35ed07

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-encoding
gzip
last-modified
Thu, 09 Dec 2021 16:36:30 GMT
server
AmazonS3
x-amz-request-id
SXBZ8ADYT77KW7MP
etag
"9c75e5b0c5bc0a53e0cdef53eae89c77"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=15150
accept-ranges
bytes
content-length
114446
x-amz-id-2
Js3u1th+lEwEMVGKInxoBehDmEsPJoYn2GSrvSApeaA9h/kdmOzjLJkUhJKG3pI/I9LMlptFND8=
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=REDVENTURES_GAM_DISPLAY1&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=11x11&zMoatPS=top&zMoatSZPS=11x11%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1639739335362&de=433151739483&m=0&ar=cc97a930ec1-clean&iw=101177c&q=6&cb=0&ym=0&cu=1639739335362&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=5009920773%3A2843412950%3A5667186874%3A138346938775&zMoatW=11&zMoatH=11&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatSN=d&zMoatSL=sharethrough-top%3FLL%7CT-1000&zMoatMMV_MAX=na&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&id=1&ii=4&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&gw=redventuresgamdisplay60805146916&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A336%3A336%3A0%3A297&iq=na&tt=na&tu=&tp=&jk=-1&jm=-1&fs=195926&na=1042976245&cs=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:55 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:55 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 52F7
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjss_Q2ivYhlx2TPtiK5b7H4riubWYFyU9Shv-7Lo4PVAjYubOWHDwMWdztsHeB62KCNWLqgtwgeIFmwMfVguumCjnsoCj5I3x6IFHjwGHR0HjmzCQs0ixkwQiUdZx3bj_0SCMxUzkro4_9K4QiGYCG_IkTgqCuebwFa2DaKt448fL3TsZ4Y0NmDe2fmcAEr5sY29w2JHkdJIOLBcTQ-2TRYonC_P9BNTr0PIdVUsqxOklxm2hdeYs5TNk5o42DESQcZT4FZ7ErDFpqHHWaQCASvbEOLhvrOqgqTFYP_MbgLZ5tlDbl6lp4jTyhwbarICKX8WLVuFwMoCFx4Gxdb-aw&sai=AMfl-YTcueIFZzXPA6U_29i6kt7mqlQSPStEp7X8Qj3D68OWe17NxV1twEOWFb3Kv6Z_Xeeka5_G-Guh9pFyhq0zvm6tkIWTQicraZVeQBCmlk2HE5S811qWF9XOEVzx9G2n&sig=Cg0ArKJSzN2RyrNlLcJUEAE&uach_m=[UACH]&urlfix=1&adurl=
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:08:55 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
expires
Fri, 17 Dec 2021 11:08:55 GMT
nr-spa-1212.min.js
js-agent.newrelic.com/
44 KB
17 KB
Script
General
Full URL
https://js-agent.newrelic.com/nr-spa-1212.min.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.66.137 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ebfe453394ff1be6ef75d380ab7c5535aea0b51832d045f0d5d0ef7e6535969c

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

x-amz-version-id
wY72Ah.NJX5KzzqRFK3uhSo3Jh07tDe4
content-encoding
gzip
etag
"8bd93bf0ecb2f4e971a2055a41402bb6"
x-amz-request-id
VG6YBKXNYMJ05RRS
x-cache
HIT
cross-origin-resource-policy
cross-origin
content-length
16636
x-amz-id-2
CN/OtP3A9z0ShcwSC84Dp2716OPSVqHtXjTa3tL4kDFfrY9FTweTMDz1ynWsKHz8NETzizCEpEw=
x-served-by
cache-fra19163-FRA
last-modified
Thu, 04 Nov 2021 21:16:16 GMT
server
AmazonS3
x-timer
S1639739335.410997,VS0,VE0
date
Fri, 17 Dec 2021 11:08:55 GMT
vary
Accept-Encoding
content-type
application/javascript
via
1.1 varnish
cache-control
public, max-age=7200, stale-if-error=604800
accept-ranges
bytes
x-cache-hits
157
sodar
pagead2.googlesyndication.com/getconfig/
11 KB
9 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=2021120601&st=env
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
726ac30cdf2554e4383bef5c9dc56000841d693f7ba39d43705fde8a98782643
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:08:55 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
8445
x-xss-protection
0
/
www.zdnet.com/components/breaking-news/xhr/
1 KB
1 KB
XHR
General
Full URL
https://www.zdnet.com/components/breaking-news/xhr/?slug=breaking-news-banner
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
309c7f77b36ad8f0ecb6278afb0cf7bf91f525b2053ab757246a07e2879fe32d
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

X-NewRelic-ID
VgEBVlJWCRAGXVRVDwMDUlc=
tracestate
78034@nr=0-1-2767451-695782612-f5132f8683697c14----1639739335421
traceparent
00-ab9c9d0ebd32d14b51d2fac4cc531c40-f5132f8683697c14-01
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
newrelic
eyJ2IjpbMCwxXSwiZCI6eyJ0eSI6IkJyb3dzZXIiLCJhYyI6IjI3Njc0NTEiLCJhcCI6IjY5NTc4MjYxMiIsImlkIjoiZjUxMzJmODY4MzY5N2MxNCIsInRyIjoiYWI5YzlkMGViZDMyZDE0YjUxZDJmYWM0Y2M1MzFjNDAiLCJ0aSI6MTYzOTczOTMzNTQyMSwidGsiOiI3ODAzNCJ9fQ==
Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
X-Requested-With
XMLHttpRequest

Response headers

content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 17 Dec 2021 10:39:22 GMT
vary
Accept-Encoding, User-Agent
x-xss-protection
1; mode=block
referrer-policy
no-referrer-when-downgrade
x-newrelic-app-data
PxQFVlBUDAYBR1dbAgYPVFAFBRFORDQHUjZKA1ZLVVFHDFYPbU5yARBfWA86TFtcXRQODFJfQzkGQ1NSCQ8NBW8MXRVLGhgCHVUJUQFRH1JKBgNVVFMUHgFIQ1YCUAEDVQkPCwEEU1oEWgFAFF5VXkAAZA==
x-frame-options
SAMEORIGIN
date
Fri, 17 Dec 2021 11:08:55 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-tx-id
a6077814-46a4-4843-9a18-ba9b22285dde
content-type
application/json
via
1.1 varnish
cache-control
max-age=5400, private
accept-ranges
bytes
expires
Fri, 17 Dec 2021 12:09:22 GMT
track-cwv-72dfb3ae38-rev.js
www.zdnet.com/a/fly/js/components/
239 B
336 B
Script
General
Full URL
https://www.zdnet.com/a/fly/js/components/track-cwv-72dfb3ae38-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
9b7909cb9edd007095b41a13617b66208e4210fff9c5e411a7db116efefc8e71
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
199
x-xss-protection
1; mode=block
last-modified
Wed, 15 Dec 2021 17:45:18 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"a5d265f628012577e91fdf890dd49e32"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 22 Dec 2021 22:42:12 GMT
author-modal-d55d4e857c-rev.js
www.zdnet.com/a/fly/js/components/
573 B
424 B
Script
General
Full URL
https://www.zdnet.com/a/fly/js/components/author-modal-d55d4e857c-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
06c00948dd5d4c3109c9e00bb6c44938e1251feae65e2b7c2591f333ab230d9b
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
311
x-xss-protection
1; mode=block
last-modified
Thu, 09 Dec 2021 14:54:39 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"4da97158326b0293b09b6a931c98a1e3"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Mon, 20 Dec 2021 15:22:57 GMT
disqus-loader-17293b5282-rev.js
www.zdnet.com/a/fly/js/components/
1 KB
840 B
Script
General
Full URL
https://www.zdnet.com/a/fly/js/components/disqus-loader-17293b5282-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
0aee86f10613d80ea0542d89047ea3467747db993379daeb592178ebf943b534
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
684
x-xss-protection
1; mode=block
last-modified
Thu, 16 Dec 2021 16:41:54 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"0e5249bb6266844bc758597168d6931a"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 23 Dec 2021 17:11:52 GMT
NRBR-a22c617a7b2aab2da1c
bam-cell.nr-data.net/1/
49 B
725 B
Script
General
Full URL
https://bam-cell.nr-data.net/1/NRBR-a22c617a7b2aab2da1c?a=695782443&v=1212.e95d35c&to=NgYBNkBYWEEEAURQWg9MIgFGUFlcSgNCTVwCDwY9QVBYVQkH&rst=1348&ck=1&ref=https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/&ap=425&be=265&fe=1303&dc=297&af=err,xhr,stn,ins,spa&perf=%7B%22timing%22:%7B%22of%22:1639739334089,%22n%22:0,%22f%22:1,%22dn%22:2,%22dne%22:3,%22c%22:3,%22s%22:9,%22ce%22:19,%22rq%22:19,%22rp%22:240,%22rpe%22:255,%22dl%22:243,%22di%22:298,%22ds%22:298,%22de%22:298,%22dc%22:1303,%22l%22:1303,%22le%22:1316%7D,%22navigation%22:%7B%7D%7D&fp=335&fcp=335&at=GkEWQAhCSx5HAxIDThwe&jsonp=NREUM.setToken
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
162.247.243.146 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
dac715f087720dd7ff7067f5d2ec1988851fa93140ae8a9cbfaa15659dd7fd82

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Date
Fri, 17 Dec 2021 11:08:55 GMT
Content-Encoding
gzip
CF-Cache-Status
DYNAMIC
Server
cloudflare
Expect-CT
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
Vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, HEAD, OPTIONS
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Transfer-Encoding
chunked
Cross-Origin-Resource-Policy
cross-origin
Connection
keep-alive
access-control-allow-credentials
true
CF-Ray
6befb23e9cf64a6e-FRA
core-web-vitals-16efe3ae21-rev.js
www.zdnet.com/a/fly/js/managers/
545 B
488 B
Script
General
Full URL
https://www.zdnet.com/a/fly/js/managers/core-web-vitals-16efe3ae21-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
82f947d14a0a198dfe3cec2fde7896f6e332eb798cc193dad8da9ed2225277cd
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
366
x-xss-protection
1; mode=block
last-modified
Tue, 14 Dec 2021 16:02:01 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"456e04f37a1b5aa7af3e4f05d7a26227"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 21 Dec 2021 18:20:57 GMT
sodar2.js
tpc.googlesyndication.com/sodar/
17 KB
7 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
61c32059a5e94075a7ecff678b33907966fc9cfa384daa01aa057f872da14dbb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
etag
"1637097310169751"
vary
Accept-Encoding
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
6386
x-xss-protection
0
expires
Fri, 17 Dec 2021 11:08:55 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame E29D
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvUGYoWS4IKCeZTNhip7M-1itTIC5Uk1av1-IakL4WPx_Ccum3zVMEFbHd4iv-M5hm9QIjsnPr_AllTnocW2OAxDdfUEyZ8aJ8GYmeV8DOC4Cgked5tTdVtx42XQ51UD1t9beLQakGudwcH4G0wfALwy0BMm5otJfpAktzOyD9DFka6k5YW8eUYBY0U7cM34PV-cmaClaWYshuHT04q1xYlcXf2NfNLXbnBc2k153pJNbXEmDtZ2kbHgJOF-5AGSE1VGPGJpfR3SQn-uQVh5dzqSNH1zGXLyu6FDkkBTyGZDXiBygSwXYQfkDaMi4K8aTQGsyofBBeoHJ7K9rTrNd1e&sai=AMfl-YQswMccUz-LSmhVzCKV2B4R5Bjj8lx4lqSY28ny3dDNdYu3OIotO6vEYN7OZ-0PzuN3ZpsiAJOkWwAe_Bg-PZzkfqyfALOdWcA_y86akB-BeiKUF0olTuStFEJOZJSp&sig=Cg0ArKJSzASgiohvfbs9EAE&uach_m=[UACH]&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:08:55 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
ad.js
clipcentric-a.akamaihd.net/ad/B=608/F=1317278/C=603283/P=22/L=21/V=23/ST=1638969311/S=SzkmXuC3/ Frame E29D
162 KB
44 KB
Script
General
Full URL
https://clipcentric-a.akamaihd.net/ad/B=608/F=1317278/C=603283/P=22/L=21/V=23/ST=1638969311/S=SzkmXuC3/ad.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.16.107.33 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-16-107-33.deploy.static.akamaitechnologies.com
Software
Apache/2.2.34 /
Resource Hash
a65474aec3d05036fdc95a4459d85f1543f464934698df8e4a9d1bca61a0500c
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-encoding
br
last-modified
Thu Jan 1 00:00:00 1970
server
Apache/2.2.34
x-frame-options
SAMEORIGIN
content-type
text/javascript
cache-control
max-age=3600
content-length
44769
skeleton.js
pixel.adsafeprotected.com/rjss/st/903347/59128494/ Frame E29D
46 KB
12 KB
Script
General
Full URL
https://pixel.adsafeprotected.com/rjss/st/903347/59128494/skeleton.js?ias_dspID=64
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.149.33 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-149-33.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
67629a3544e550eca761d489db333c2960fa02697760be52c1ddf83f38123cf2

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:55 GMT
content-encoding
gzip
vary
accept-encoding
content-type
application/javascript;charset=utf-8
access-control-allow-origin
pixel.adsafeprotected.com
cache-control
no-cache
access-control-allow-credentials
true
expires
Wed, 31 Dec 1969 23:59:59 GMT
rx_lidar.js
www.googletagservices.com/activeview/js/current/ Frame E29D
119 KB
36 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
87f7f86b17eacf56e623a69be05e5f5487470d6b30347efe12742aefa3f5af48
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
37305
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="active-view-scs-read-write-acl"
etag
"1638461285297402"
vary
Accept-Encoding
report-to
{"group":"active-view-scs-read-write-acl","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:08:55 GMT
moatad.js
z.moatads.com/redventuresgamdisplay60805146916/ Frame E29D
335 KB
112 KB
Script
General
Full URL
https://z.moatads.com/redventuresgamdisplay60805146916/moatad.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
ec3300dff5a35315ea608c5dc57e965957897133eb6a543533566d6e2c35ed07

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-encoding
gzip
last-modified
Thu, 09 Dec 2021 16:36:30 GMT
server
AmazonS3
x-amz-request-id
SXBZ8ADYT77KW7MP
etag
"9c75e5b0c5bc0a53e0cdef53eae89c77"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=15150
accept-ranges
bytes
content-length
114446
x-amz-id-2
Js3u1th+lEwEMVGKInxoBehDmEsPJoYn2GSrvSApeaA9h/kdmOzjLJkUhJKG3pI/I9LMlptFND8=
B26977839.323096029;dc_pre=CLiY-4TZ6vQCFZriuwgdc-cJoQ;dc_trk_aid=515145530;dc_trk_cid=162954749;ord=1097836088;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;gdpr=;gdpr_consent=;ltd=
ad.doubleclick.net/ddm/trackimp/N418801.3776911CBSINTERACTIVE.CO/ Frame E29D
Redirect Chain
  • https://ad.doubleclick.net/ddm/trackimp/N418801.3776911CBSINTERACTIVE.CO/B26977839.323096029;dc_trk_aid=515145530;dc_trk_cid=162954749;ord=1097836088;dc_lat=;dc_rdid=;tag_for_child_directed_treatme...
  • https://ad.doubleclick.net/ddm/trackimp/N418801.3776911CBSINTERACTIVE.CO/B26977839.323096029;dc_pre=CLiY-4TZ6vQCFZriuwgdc-cJoQ;dc_trk_aid=515145530;dc_trk_cid=162954749;ord=1097836088;dc_lat=;dc_rd...
42 B
63 B
Image
General
Full URL
https://ad.doubleclick.net/ddm/trackimp/N418801.3776911CBSINTERACTIVE.CO/B26977839.323096029;dc_pre=CLiY-4TZ6vQCFZriuwgdc-cJoQ;dc_trk_aid=515145530;dc_trk_cid=162954749;ord=1097836088;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;gdpr=;gdpr_consent=;ltd=?
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Server
142.250.184.230 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s12-in-f6.1e100.net
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:55 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:55 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
content-type
text/html; charset=UTF-8
location
https://ad.doubleclick.net/ddm/trackimp/N418801.3776911CBSINTERACTIVE.CO/B26977839.323096029;dc_pre=CLiY-4TZ6vQCFZriuwgdc-cJoQ;dc_trk_aid=515145530;dc_trk_cid=162954749;ord=1097836088;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;gdpr=;gdpr_consent=;ltd=?
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
follow-only-when-prerender-shown
1
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
amp4ads-v0.mjs
cdn.ampproject.org/rtv/012111011823000/ Frame 6F54
189 KB
55 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012111011823000/amp4ads-v0.mjs
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202112021159/wrap.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
98ba8f881333898d751dabe4f8b4cacc4489a9f5b6b4fd1fc67c571dbfec95cf
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
1065
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
55592
x-xss-protection
0
server
sffe
date
Fri, 17 Dec 2021 10:51:10 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"11dee2040f5fc1d7"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Sat, 17 Dec 2022 10:51:10 GMT
amp-ad-exit-0.1.mjs
cdn.ampproject.org/rtv/012111011823000/v0/ Frame 6F54
13 KB
5 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012111011823000/v0/amp-ad-exit-0.1.mjs
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202112021159/wrap.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
65f6185cfe1cf88fa7981160dd6fa443e111887215b72953718ea70f8e2ba9f2
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
1065
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
4992
x-xss-protection
0
server
sffe
date
Fri, 17 Dec 2021 10:51:10 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"858600ba27ef7413"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Sat, 17 Dec 2022 10:51:10 GMT
amp-analytics-0.1.mjs
cdn.ampproject.org/rtv/012111011823000/v0/ Frame 6F54
89 KB
28 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012111011823000/v0/amp-analytics-0.1.mjs
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202112021159/wrap.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
9e97fc43ecd2f16948c3a8d2de65e0e5483db4ed5ab174058c178ca1c8665d0b
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
1065
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
28555
x-xss-protection
0
server
sffe
date
Fri, 17 Dec 2021 10:51:10 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"a64e482645fd262b"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Sat, 17 Dec 2022 10:51:10 GMT
amp-fit-text-0.1.mjs
cdn.ampproject.org/rtv/012111011823000/v0/ Frame 6F54
5 KB
2 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012111011823000/v0/amp-fit-text-0.1.mjs
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202112021159/wrap.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
3d76ab4ac854cafef51bbbb5177ea75816df90e3c775294991a016404f2b6bb5
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
1065
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1731
x-xss-protection
0
server
sffe
date
Fri, 17 Dec 2021 10:51:10 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"cb4f0e89d7d37d9b"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Sat, 17 Dec 2022 10:51:10 GMT
amp-form-0.1.mjs
cdn.ampproject.org/rtv/012111011823000/v0/ Frame 6F54
40 KB
13 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012111011823000/v0/amp-form-0.1.mjs
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202112021159/wrap.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
9a630b852e94f20cb8140704fd830bf40bfea0a2effaa67d06a0eadafbf3d508
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
1065
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
12826
x-xss-protection
0
server
sffe
date
Fri, 17 Dec 2021 10:51:10 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"f02165e023e70703"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Sat, 17 Dec 2022 10:51:10 GMT
truncated
/ Frame 6F54
214 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
719e143500cd32657bcbd6624b29594351cb5488ec7038216fb46ec1c664b347

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/png
pixel
protected-by.clarium.io/
68 B
345 B
Image
General
Full URL
https://protected-by.clarium.io/pixel?tag=wt_SjNVWEZlZTF4Y2xZLWJmRmxXaDFtSVpfcGhVLzI4NzA3ODYwNzU6MzAweDI1MA==&v=5&s=v31fn4198rp&sb=-1&h=www.zdnet.com&cb=6025064&d=eyJ3aCI6IlNqTlZXRVpsWlRGNFkyeFpMV0ptUm14WGFERnRTVnBmY0doVkx6STROekEzT0RZd056VTZNekF3ZURJMU1BPT0iLCJ3ZCI6eyJvIjoyODcwNzg2MDc1LCJ3IjoiMzAwIiwiaCI6IjI1MCJ9LCJ3ciI6Mn0=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.159.156.184 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-18-159-156-184.eu-central-1.compute.amazonaws.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
69539b5b3777cffda28a66d7f2aa9b17c91ee1ec8fd50c00c442af91753a60f7

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 Dec 2021 11:08:55 GMT
Server
nginx/1.14.0 (Ubuntu)
Content-Type
image/png
Cache-Control
no-store, no-cache, must-revalidate, max-age=0
Connection
keep-alive
Content-Length
68
Expires
Sat, 26 Jul 1997 05:00:00 GMT
856114496422413000
tpc.googlesyndication.com/simgad/ Frame 6F54
33 KB
33 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/856114496422413000?sqp=4sqPyQQ7QjkqNxABHQAAtEIgASgBMAk4A0DwkwlYAWBfcAKAAQGIAQGdAQAAgD-oAQGwAYCt4gS4AV_FAS2ynT4&rs=AOga4qk_HHOql6urIoO0v4511fkWvJLnbw
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
245fa809aa43b27d3fe006d71779fe9ddbb79e0d1a566345f3bc480cb59cbe50
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Wed, 15 Dec 2021 05:51:10 GMT
x-content-type-options
nosniff
age
191865
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
33806
x-xss-protection
0
last-modified
Thu, 03 Dec 2020 00:29:04 GMT
server
sffe
report-to
{"group":"content-ads-owners","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/content-ads-owners"}]}
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="content-ads-owners"
expires
Thu, 15 Dec 2022 05:51:10 GMT
en.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 6F54
2 KB
2 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/en.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
36133ca07927c88a7cc578fddbaed3c668ab75087834d0ca13dca5de4ec856c1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 16 Dec 2021 20:15:16 GMT
x-content-type-options
nosniff
server
cafe
age
53619
etag
14819457070020093239
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
public, max-age=86400
cross-origin-resource-policy
cross-origin
content-type
image/png
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2502
x-xss-protection
0
expires
Fri, 17 Dec 2021 20:15:16 GMT
icon.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 6F54
295 B
319 B
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/icon.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7fd59024b6ca83f11f7a3448ec148309a13b705725716df134f699e60a96eb1b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 05:43:34 GMT
x-content-type-options
nosniff
server
cafe
age
19521
etag
426692510519060060
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
public, max-age=86400
cross-origin-resource-policy
cross-origin
content-type
image/png
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
295
x-xss-protection
0
expires
Sat, 18 Dec 2021 05:43:34 GMT
l
www.google.com/ads/measurement/ Frame 6F54
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaTRmIlh3Aed_S6w3J2u0n4QsTx0GTRv4rPWtyg31t-id1zTJUhOz8fQlEUMpJdkSnDPxGh-wiEnsnhxNlbO9xnLj-K3bA
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82f::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

adview
securepubads.g.doubleclick.net/pagead/ Frame 6F54
0
0
Image
General
Full URL
https://securepubads.g.doubleclick.net/pagead/adview?ai=CWNd5x2-8YeL1CZaCgQekjZzoBN2xh5RntMbOmsYMltPLeRABIPe7x4MBYJUCoAGu95nSA8gBAqkCvYFPHD85qj7gAgCoAwHIAwiqBNUCT9ChaenAuMdoHaW9uYWahKbD-E3tPPw8fxoLfRkDYh1f0LLAliAphRm4puuauAxru483DGB8hVjGVkndA5vhSvkTWyo3y-HVuB2N0mEZvhEw_B_R0_VpqygIETNxNoReWgkVRz8YaJMvoDPg_x3NU7GUOlNR19iGQg27bs7RZvO5oIco-x3BKn0cu7AQVGssSt9UafWsYvz2s3fQ1Wtb1cfxIO2VL9imRcTaUOaZQ8tophW3yCe5Wik-adNLQ1F8OCFjB9NHEC3EoxQG3ZLxhnzdcDrt0PxLQ2KB1Ra6FzPRJEkJAJ3WeBVagRX6Mae6dg65Rd-KIEQw_QjyFv3CL9lAb4bnAqScBjzsJN8T8_3lR6-_sHRvDOqEknBqygkcU5QXSrAlkBYziuFCDpK6G3W0df6Y2SkXA0bfE46MmLfbiHmzkbn1MoURQsjBheIUyXP3hOzABKTY5u3EA-AEAZIFBAgEGAGSBQQIBRgEoAYCgAe6iOYtqAeOzhuoB5PYG6gH7paxAqgH_p6xAqgH1ckbqAemvhvYBwHyBwQQkbc-0ggJCIjhgBAQARgdgAoDyAsB2BMM0BUBgBcBshceChwIABIUcHViLTg4MjAzNjI2MDU3MTExOTYYyZt6&sigh=b0gF8E2-QWY&uach_m=[UACH]&uap=UACH(platform)&uapv=UACH(platformVersion)&uaa=UACH(architecture)&uam=UACH(model)&uafv=UACH(uaFullVersion)&uab=UACH(bitness)
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=REDVENTURES_GAM_HEADER1&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=technology&zMoatAdUnit3=security&wf=1&ra=3&pxm=&sgs=3&vb=6&kq=1&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&bq=11&f=0&j=&t=1639739335132&de=799972505069&rx=225203003676&m=0&ar=8ab009d7785-clean&iw=04a0275&q=7&cb=0&cu=1639739335132&ll=2&lm=0&ln=0&em=0&en=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&zMoatAType=content_article&zMoatTest=zdnet&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&id=1&ii=4&bo=aw-zdnet&bd=security&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&gw=redventuresgamheader644747280705&fd=1&ac=1&it=500&zMoatpos=middle&zMoatvguid=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatptype=article&zMoatsl=mpu-middle%3FLL%7CT-1000&pe=1%3A336%3A336%3A1315%3A297&jk=-1&jm=-1&fs=195979&na=1483085131&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:55 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:55 GMT
show-hide-1.0-2b8cfc35ab-rev.js
www.zdnet.com/a/fly/js/components/
2 KB
880 B
Script
General
Full URL
https://www.zdnet.com/a/fly/js/components/show-hide-1.0-2b8cfc35ab-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
1a703d617fb31d56238372d5bf78e9861b3a09b7447a0184bd5f1c178461ed12
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
710
x-xss-protection
1; mode=block
last-modified
Thu, 09 Dec 2021 14:54:39 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"dd7ef257baebb2315958ebdd4603472f"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Mon, 20 Dec 2021 15:22:57 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/225/ Frame 9A67
13 KB
5 KB
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
55a119c0394f901a8a297e109c17b5e5402689708b999ab10691c16179f32a4a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/

Response headers

accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
cross-origin-resource-policy
cross-origin
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
content-length
5046
date
Fri, 17 Dec 2021 10:54:44 GMT
expires
Sat, 17 Dec 2022 10:54:44 GMT
last-modified
Mon, 21 Jun 2021 20:47:05 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
851
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
aframe
www.google.com/recaptcha/api2/ Frame DDE5
783 B
1002 B
Document
General
Full URL
https://www.google.com/recaptcha/api2/aframe
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82f::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
ef5d99b2bc220f2b2bae0fc4a428a1523101e1832521f32cfe88f17eb279a837
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-eIzeY5wpWACM9/qJRSmg0Q' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/

Response headers

cross-origin-resource-policy
cross-origin
cross-origin-embedder-policy
require-corp
report-to
{"group":"recaptcha","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/recaptcha"}]}
expires
Fri, 17 Dec 2021 11:08:55 GMT
date
Fri, 17 Dec 2021 11:08:55 GMT
cache-control
private, max-age=300
content-type
text/html; charset=utf-8
content-security-policy
script-src 'report-sample' 'nonce-eIzeY5wpWACM9/qJRSmg0Q' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
514
server
GSE
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
truncated
/ Frame E29D
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
dff8be69b697ed33ee88dedfe5ef0572cada0fc02bba5a061562031afa90d066

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame 930C
750 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
e9cac3eeba1fc86e06fdc013a4c52742e9b4bd14b7be6517321127d4515095ce

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/svg+xml
E=in,im,fi
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=40/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame E29D
35 B
160 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=40/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=in,im,fi
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:56 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
tavAo53F
clipcentric-a.akamaihd.net/file/1317301/ad_q60/1638969188/ Frame E29D
9 KB
9 KB
Image
General
Full URL
https://clipcentric-a.akamaihd.net/file/1317301/ad_q60/1638969188/tavAo53F?f=auto
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.16.107.33 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-16-107-33.deploy.static.akamaitechnologies.com
Software
Apache/2.2.34 /
Resource Hash
80564ff963220266c89e284ae65634312da063d0ea5ee747527fd38e8c398d96
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
last-modified
Wed, 08 Dec 2021 13:14:16 GMT
server
Apache/2.2.34
x-frame-options
SAMEORIGIN
content-type
image/avif
access-control-allow-origin
*
cache-control
private, max-age=31536000
content-length
9282
h1xcxKOE
clipcentric-a.akamaihd.net/file/1317303/ad_q60/1638969190/ Frame E29D
8 KB
8 KB
Image
General
Full URL
https://clipcentric-a.akamaihd.net/file/1317303/ad_q60/1638969190/h1xcxKOE?f=auto
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.16.107.33 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-16-107-33.deploy.static.akamaitechnologies.com
Software
Apache/2.2.34 /
Resource Hash
43fdf898c76171d1b5af752978ebeb6ed248bc677d0b1dfb204b7ae95658cd99
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
last-modified
Wed, 08 Dec 2021 13:14:14 GMT
server
Apache/2.2.34
x-frame-options
SAMEORIGIN
content-type
image/avif
access-control-allow-origin
*
cache-control
private, max-age=31536000
content-length
7924
E=ls:Clipcentric%20Site%20Fixes.0,li
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=43/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame E29D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=43/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=ls:Clipcentric%20Site%20Fixes.0,li
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:56 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
truncated
/ Frame 98CF
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/gif
E=ls:video%20auto.0
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=53/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame E29D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=53/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=ls:video%20auto.0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:56 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
E=ls:Super%20Billboard.0
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=56/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame E29D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=56/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=ls:Super%20Billboard.0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:56 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
E=ls:hotspots%20collapsed.0
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=66/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame E29D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=66/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=ls:hotspots%20collapsed.0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:56 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
E=ls:on%20scroll%20full%20collapse.0
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=67/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame E29D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=67/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=ls:on%20scroll%20full%20collapse.0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:56 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
E=ls:custom%20ad%20controls.0
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=69/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame E29D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=69/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=ls:custom%20ad%20controls.0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:56 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=REDVENTURES_GAM_DISPLAY1&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=5x5&zMoatPS=nav&zMoatSZPS=5x5%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1639739335608&de=809372111222&m=0&ar=cc97a930ec1-clean&iw=101177c&q=11&cb=0&ym=0&cu=1639739335608&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=5029899480%3A2942419878%3A5840893800%3A138375198164&zMoatW=5&zMoatH=5&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatSN=d&zMoatSL=nav-ad-plus-leader%3FT-1000&zMoatMMV_MAX=na&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&id=1&ii=4&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&gw=redventuresgamdisplay60805146916&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A336%3A336%3A1315%3A297&iq=na&tt=na&tu=&tp=&jk=-1&jm=-1&fs=195926&na=1269763658&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:55 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:55 GMT
ad.html
clipcentric-a.akamaihd.net/user-9/resources/ Frame 21C1
93 B
290 B
Document
General
Full URL
https://clipcentric-a.akamaihd.net/user-9/resources/ad.html
Requested by
Host: clipcentric-a.akamaihd.net
URL: https://clipcentric-a.akamaihd.net/ad/B=608/F=1317278/C=603283/P=22/L=21/V=23/ST=1638969311/S=SzkmXuC3/ad.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.16.107.33 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-16-107-33.deploy.static.akamaitechnologies.com
Software
Apache/2.2.34 /
Resource Hash
e571945dec453fbc4c8177ad3af3f176dc562cf51fe40a10529b69e0b2b1e577

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/

Response headers

expires
Thu, 13 Jan 2022 13:55:46 GMT
last-modified
Tue, 04 May 2021 03:22:49 GMT
etag
"5d-5c17897b4d440"
cache-control
max-age=2592000
server
Apache/2.2.34
content-type
text/html; charset=UTF-8
accept-ranges
bytes
content-encoding
gzip
content-length
86
date
Fri, 17 Dec 2021 11:08:55 GMT
vary
Accept-Encoding
view
securepubads.g.doubleclick.net/pcs/ Frame 8C94
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvybQTwthyCKUjCvQU2VebBs-wsVEaoKyZeIJga0TnNou8reDXuf1xdX_iGJu5M21PFsuXQgpUTNGE8IsGXEPJ6ifSxi2JCnM_FzTVdM3n82sAo9NPPkBNVJN7bFX6Ap-UcAxw4_lbkznNN04SA-5W9LJp2M5AdfLtSr1LbL-cRZzaqPoMOK8n2v_X9MMIWPuhQISXYFhdO-yPFkCiILFeCcRQxw0BftzGy3UfMgE3I0qHeC19S3hLgEMvCXbRLC-EntZfxEoEXxhu0Bar_FAve0x-7esmZHDrJRYAGH9NaTgkK3Kyyz6V952HouUg5Fy3B6Z5J4_e-7YWFwoV-&sai=AMfl-YQyTKvJ5gSZjDGUJ-4VTk4dyG8Q38Ecs29hUrPgoUQq-6aGC-ghIUaSZUmdpsoHy12r_2iTHWupDOf1yMq_AdU5MPAHWy_fyZJ5_FMOLBxEk9PArBbsER243BQeKT0&sig=Cg0ArKJSzDhegm5SgLCjEAE&uach_m=[UACH]&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:08:55 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
dcmads.js
www.googletagservices.com/dcm/ Frame 8C94
9 KB
4 KB
Script
General
Full URL
https://www.googletagservices.com/dcm/dcmads.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c45a7b49c14477cd160a83d4ee1fb8c311e12314e042d0647c68bec62f16fe29
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 10:38:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1813
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/ads-dcm-tag
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
4486
x-xss-protection
0
last-modified
Mon, 29 Nov 2021 19:29:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="ads-dcm-tag"
vary
Accept-Encoding
report-to
{"group":"ads-dcm-tag","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-dcm-tag"}]}
content-type
text/javascript
cache-control
public, max-age=3600
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:38:42 GMT
rx_lidar.js
www.googletagservices.com/activeview/js/current/ Frame 8C94
119 KB
36 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
87f7f86b17eacf56e623a69be05e5f5487470d6b30347efe12742aefa3f5af48
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
37305
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="active-view-scs-read-write-acl"
etag
"1638461285297402"
vary
Accept-Encoding
report-to
{"group":"active-view-scs-read-write-acl","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:08:55 GMT
moatad.js
z.moatads.com/redventuresgamdisplay60805146916/ Frame 8C94
335 KB
112 KB
Script
General
Full URL
https://z.moatads.com/redventuresgamdisplay60805146916/moatad.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
ec3300dff5a35315ea608c5dc57e965957897133eb6a543533566d6e2c35ed07

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
content-encoding
gzip
last-modified
Thu, 09 Dec 2021 16:36:30 GMT
server
AmazonS3
x-amz-request-id
SXBZ8ADYT77KW7MP
etag
"9c75e5b0c5bc0a53e0cdef53eae89c77"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=15150
accept-ranges
bytes
content-length
114446
x-amz-id-2
Js3u1th+lEwEMVGKInxoBehDmEsPJoYn2GSrvSApeaA9h/kdmOzjLJkUhJKG3pI/I9LMlptFND8=
truncated
/ Frame 98CF
299 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
95698b6af45a720fa13415398e77c20504c6ae8bf75e3a462e5aa1f67bc42b11

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/svg+xml
view
securepubads.g.doubleclick.net/pcs/ Frame E29D
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstAZn8r3uvYZn1BuEHp94idwLRRkkPJjtDuHxSB_5bY6xFfihoipJFAYI7LK9Ce0qgjAhl8M6E9dp2rfO48f3DxMTqK63vYN8VGbnYCFHGNMkO4Q4q3rKLrjUOx6WR2LSUzAzJ5SGdQQFu83vpbFpXMZzMn7-4d5sIrk2M-1GtYZJzGLRNGpdSzsPitlxEc3Gke3xzK814VinPgL5e_7JL2rdnvJ4GK57TlcnA-aJG3EQZbY8KhcLqvUHLypL3E_9VL_xw68twuEeAfJ2L-bwJDZfFBs2LOlhOIEDFzEeMx_xqfbVsIWpl711WM4vmAsxy8qn8bTPzXEcT6dJs8x1glDa4&sai=AMfl-YRo68WbrlDRA8DDgdt0vAIcLVYiC0ywpzPTFmXiLGGR5bZO8MKvJSR3QUdvbvgrDXCu4dMSDP3RV65FKc2CMbtXR9bnH088ALVABbJZhNZyCzpY3mvPj_GtFEmhyEHa&sig=Cg0ArKJSzGkJL2LGg7lGEAE&uach_m=[UACH]&urlfix=1&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0%3D&adurl=
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:08:55 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
expires
Fri, 17 Dec 2021 11:08:55 GMT
main.gr.19.8.273.js
static.adsafeprotected.com/ Frame E29D
187 KB
60 KB
Script
General
Full URL
https://static.adsafeprotected.com/main.gr.19.8.273.js
Requested by
Host: pixel.adsafeprotected.com
URL: https://pixel.adsafeprotected.com/rjss/st/903347/59128494/skeleton.js?ias_dspID=64
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:223f:e800:8:48e:53c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
00b3b0b438a1a3e7f01112f487ffb01e64db47935eb0e1e2927bdb4811ee935f

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 10 Dec 2021 17:46:22 GMT
content-encoding
gzip
age
580954
x-amz-server-side-encryption
AES256
x-cache
Hit from cloudfront
x-amz-replication-status
COMPLETED
last-modified
Fri, 10 Dec 2021 17:31:00 GMT
server
AmazonS3
etag
W/"dbbed9b42f871ade260381ef78b0cd71"
vary
Accept-Encoding
x-amz-version-id
RbTKyuj_rScIKJ79M7NB4z2hCQfzt2bN
via
1.1 cf2071a2896a4f71dbfdbc521d554363.cloudfront.net (CloudFront)
cache-control
max-age=315360000
x-amz-cf-pop
FRA56-P5
content-type
application/javascript
x-amz-cf-id
udaU8SLs7i8DXDq_FiElvMIT9qmu-5fTzNiMVmpj-FTe5v_ka3f6jw==
video.high.mp4
clipcentric-a.akamaihd.net/video/F=1317287/V=ad_800x450_w1220_ch0/T=1638966209/S=ZR41Wf5d/ Frame E29D
1 MB
1 MB
Media
General
Full URL
https://clipcentric-a.akamaihd.net/video/F=1317287/V=ad_800x450_w1220_ch0/T=1638966209/S=ZR41Wf5d/video.high.mp4
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.16.107.33 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-16-107-33.deploy.static.akamaitechnologies.com
Software
Apache/2.2.34 /
Resource Hash
2ea6cb8d44b18ddc26d8d83cbb898b780beeebe9d7529fceb1ac1824a397cff4
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Encoding
identity;q=1, *;q=0
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Range
bytes=0-

Response headers

date
Fri, 17 Dec 2021 11:08:55 GMT
last-modified
Wed, 08 Dec 2021 12:33:46 GMT
server
Apache/2.2.34
access-control-allow-origin
*
x-frame-options
SAMEORIGIN
content-type
video/mp4
Content-Range
bytes 0-1199289/1199290
cache-control
max-age=2592000
Content-Length
1199290
video.high.mp4
tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=210/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vimpressi... Frame E29D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=210/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vimpression:video%20auto/!https://clipcentric-a.akamaihd.net/video/F=1317287/V=ad_800x450_w1220_ch0/T=1638966209/S=ZR41Wf5d/video.high.mp4
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:56 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
E=vi
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=210/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame E29D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=210/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vi
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:56 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
store.phtml
ad.clipcentric.com/user-9/resources/ Frame 442F
3 KB
3 KB
Document
General
Full URL
https://ad.clipcentric.com/user-9/resources/store.phtml?v200530
Requested by
Host: clipcentric-a.akamaihd.net
URL: https://clipcentric-a.akamaihd.net/ad/B=608/F=1317278/C=603283/P=22/L=21/V=23/ST=1638969311/S=SzkmXuC3/ad.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
13.32.121.115 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-32-121-115.fra60.r.cloudfront.net
Software
Apache/2.2.34 /
Resource Hash
81bcd7a6372e5ca7f7d12382fe1787bd4635eede42b3a79da6937c6d2354ed8b

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/

Response headers

content-type
text/html; charset=UTF-8
content-length
2965
date
Mon, 26 Jul 2021 00:31:36 GMT
server
Apache/2.2.34
access-control-allow-origin
*
cache-control
max-age=31536000
x-cache
Hit from cloudfront
via
1.1 5743d3ff81b625f69ad8b8e32fc9c412.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA60-P1
x-amz-cf-id
O1S0S5R-pmRAyvrHNekf3i4dYjA2DXWx1Pyk6pyvAnebZ1e7dh3kqA==
age
12479839
truncated
/ Frame 98CF
500 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7b4f05cfd0cd8e216e445b5aec5e9f06573c18cb7adbc0cd785f3a4af3df7cf2

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/ Frame 98CF
807 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ccd7a7e0ecd791d87287f7ebb4f4c3e6fcb0ca72996ee874fc2755b15fb187ef

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/svg+xml
si
googleads.g.doubleclick.net/pagead/drt/ Frame 6F54
Redirect Chain
  • https://www.google.com/pagead/drt/ui
  • https://googleads.g.doubleclick.net/pagead/drt/si?st=NO_DATA
0
0
Image
General
Full URL
https://googleads.g.doubleclick.net/pagead/drt/si?st=NO_DATA
Protocol
H2
Server
2a00:1450:4001:827::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Redirect headers

date
Fri, 17 Dec 2021 11:08:56 GMT
x-content-type-options
nosniff
server
cafe
content-type
text/html; charset=UTF-8
location
https://googleads.g.doubleclick.net/pagead/drt/si?st=NO_DATA
cache-control
private
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
impl_v81.js
www.googletagservices.com/dcm/ Frame 8C94
41 KB
17 KB
Script
General
Full URL
https://www.googletagservices.com/dcm/impl_v81.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/dcm/dcmads.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f3be6ad457ba5d4425f4d105688e9cf5a32595ff156bd290c8ccbe0e6ca3a68a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 10:38:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1813
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/ads-dcm-tag
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
17189
x-xss-protection
0
last-modified
Mon, 29 Nov 2021 19:28:15 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="ads-dcm-tag"
vary
Accept-Encoding
report-to
{"group":"ads-dcm-tag","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-dcm-tag"}]}
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
expires
Sat, 17 Dec 2022 10:38:42 GMT
856114496422413000
tpc.googlesyndication.com/simgad/ Frame 6F54
33 KB
33 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/856114496422413000?sqp=4sqPyQQ7QjkqNxABHQAAtEIgASgBMAk4A0DwkwlYAWBfcAKAAQGIAQGdAQAAgD-oAQGwAYCt4gS4AV_FAS2ynT4&rs=AOga4qk_HHOql6urIoO0v4511fkWvJLnbw
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012111011823000/amp4ads-v0.mjs
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
245fa809aa43b27d3fe006d71779fe9ddbb79e0d1a566345f3bc480cb59cbe50
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Wed, 15 Dec 2021 05:51:10 GMT
x-content-type-options
nosniff
age
191865
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
33806
x-xss-protection
0
last-modified
Thu, 03 Dec 2020 00:29:04 GMT
server
sffe
report-to
{"group":"content-ads-owners","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/content-ads-owners"}]}
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="content-ads-owners"
expires
Thu, 15 Dec 2022 05:51:10 GMT
en.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 6F54
2 KB
2 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/en.png
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012111011823000/amp4ads-v0.mjs
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
36133ca07927c88a7cc578fddbaed3c668ab75087834d0ca13dca5de4ec856c1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 16 Dec 2021 20:15:16 GMT
x-content-type-options
nosniff
server
cafe
age
53619
etag
14819457070020093239
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
public, max-age=86400
cross-origin-resource-policy
cross-origin
content-type
image/png
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2502
x-xss-protection
0
expires
Fri, 17 Dec 2021 20:15:16 GMT
icon.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 6F54
295 B
319 B
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/icon.png
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012111011823000/amp4ads-v0.mjs
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7fd59024b6ca83f11f7a3448ec148309a13b705725716df134f699e60a96eb1b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 05:43:34 GMT
x-content-type-options
nosniff
server
cafe
age
19521
etag
426692510519060060
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
public, max-age=86400
cross-origin-resource-policy
cross-origin
content-type
image/png
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
295
x-xss-protection
0
expires
Sat, 18 Dec 2021 05:43:34 GMT
NRBR-a22c617a7b2aab2da1c
bam-cell.nr-data.net/events/1/
24 B
501 B
XHR
General
Full URL
https://bam-cell.nr-data.net/events/1/NRBR-a22c617a7b2aab2da1c?a=695782443&v=1212.e95d35c&to=NgYBNkBYWEEEAURQWg9MIgFGUFlcSgNCTVwCDwY9QVBYVQkH&rst=1880&ck=1&ref=https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
162.247.243.146 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0c9cf152a0ad00d4f102c93c613c104914be5517ac8f8e0831727f8bfbe8b300

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
content-type
text/plain

Response headers

Date
Fri, 17 Dec 2021 11:08:56 GMT
CF-Cache-Status
DYNAMIC
Server
cloudflare
Expect-CT
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
Vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, HEAD, OPTIONS
Content-Type
image/gif
Access-Control-Allow-Origin
https://www.zdnet.com
access-control-allow-credentials
true
Connection
keep-alive
CF-Ray
6befb241db2c4a6e-FRA
Content-Length
24
sodar
pagead2.googlesyndication.com/pagead/ Frame DDE5
0
0
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/sodar?id=sodar2&v=225&li=gpt_2021120601&jk=1713214506163158&rc=
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.google.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

B26699368.318191894;dc_ver=81.236;sz=300x250;u_sd=1;nel=1;dc_adk=3183303654;ord=hpuw4j;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsthndiWDsQQ70fHj8PCzCheqTw57bovDGSFEa...
ad.doubleclick.net/ddm/adj/N1153793.3518201CBSINTERACTIVEUK/ Frame 8C94
45 KB
22 KB
Script
General
Full URL
https://ad.doubleclick.net/ddm/adj/N1153793.3518201CBSINTERACTIVEUK/B26699368.318191894;dc_ver=81.236;sz=300x250;u_sd=1;nel=1;dc_adk=3183303654;ord=hpuw4j;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsthndiWDsQQ70fHj8PCzCheqTw57bovDGSFEasbc8Ahoj_CCZL7kumx0LxcxdGNoa_Z0azrzxw9D17cw1uYfEy_hCuRqmJXGbPYrEKGejuPvDgrigTjCh94kdONbtfDPjR0tds5joPrYJN-kl7FmeGu_nx6isKJHURord1n_RzYRXLpCkhan5JCN4xNkylx6L1d3p58fZUPGDh3RnKyh-qIdAVlShw9JaDLc6u-V8D-X86RTGtc7cKDp3ySpAoKF6hQjoTW4_8iNciWBQDUx8thvkw_iCjlArwZfrorKxBnQCLCNECLIXc6Vb-FHQnxe8uD_u3OYvGIlz8e%26sai%3DAMfl-YRhyndNj9aiv5qLhZJg8aJia1NLb2td5MHFtwTKffdRl7JiX8OspwjMF2YAIEOVf9_tjLO-SkosSHW6hOdqA8CgqkCYrjWltJKcO2Ti8phjksk9-ZvUDs1U9pzICWQ%26sig%3DCg0ArKJSzGFRSFgnS9JMEAE%26fbs_aeid%3D%5Bgw_fbsaeid%5D%26urlfix%3D1%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68$0;xdt=0;crlt=Oyr4oXn8i);sttr=59;prcl=s
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/dcm/impl_v81.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.184.230 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s12-in-f6.1e100.net
Software
cafe /
Resource Hash
82490fce0cb34fbe536a23f9c4b2e217a5b00279d139cbf2c6aa48e748cbe368
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:56 GMT
content-encoding
br
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
22090
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
EnZy1JEvhtfL3qsMHM2VNqoz8zWnsWCdOjk5wdd4Ig4.js
pagead2.googlesyndication.com/bg/ Frame 9A67
35 KB
13 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/bg/EnZy1JEvhtfL3qsMHM2VNqoz8zWnsWCdOjk5wdd4Ig4.js
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
127672d4912f86d7cbdeab0c1ccd9536aa33f335a7b1609d3a3939c1d778220e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://tpc.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Thu, 16 Dec 2021 15:05:28 GMT
content-encoding
br
x-content-type-options
nosniff
age
72208
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/botguard-scs
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
13555
x-xss-protection
0
last-modified
Mon, 06 Dec 2021 19:18:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="botguard-scs"
vary
Accept-Encoding
report-to
{"group":"botguard-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/botguard-scs"}]}
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
expires
Fri, 16 Dec 2022 15:05:28 GMT
E=fq
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=0/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/Q=f.1_c.1_p.1_l.1_v.1_f... Frame 442F
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=0/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/Q=f.1_c.1_p.1_l.1_v.1_fc.1_fp.1_fl.1_cp.1_cl.1_pl.1_pv.1_lv.1/G=17dc814a56a21ddb14199e/E=fq
Requested by
Host: ad.clipcentric.com
URL: https://ad.clipcentric.com/user-9/resources/store.phtml?v200530
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://ad.clipcentric.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:56 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
skeleton.js
static.adsafeprotected.com/ Frame E29D
Redirect Chain
  • https://pixel.adsafeprotected.com/rfw/st/903347/59128494/skeleton.js?ias_dspID=64&adsafe_url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23...
  • https://static.adsafeprotected.com/skeleton.js
17 B
466 B
Script
General
Full URL
https://static.adsafeprotected.com/skeleton.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Server
2600:9000:223f:e800:8:48e:53c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
bdeed1e1c0751610c8f3dc2a5c78c93f841c366b36a7f7a54f5e6752c2656c05

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Wed, 07 Jul 2021 08:35:57 GMT
via
1.1 cf2071a2896a4f71dbfdbc521d554363.cloudfront.net (CloudFront)
age
14092380
x-amz-server-side-encryption
AES256
x-cache
Hit from cloudfront
x-amz-replication-status
COMPLETED
content-length
17
last-modified
Mon, 17 Aug 2020 23:54:35 GMT
server
AmazonS3
etag
"53fab767ecbd3bf07990b10246befbd4"
x-amz-version-id
nylqTweorRThFHMBJSrf_fHcWx3KVKN3
cache-control
max-age=315360000
x-amz-cf-pop
FRA56-P5
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
2SLQ0GRFzANr1RWcu94OxjZTWZ6T1PRPo7x0qh-j-gZW2fwTw1pzxg==

Redirect headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:56 GMT
x-server-name
app19.ie.303net.net
p3p
CP="COM NAV INT STA NID OUR IND NOI"
location
https://static.adsafeprotected.com/skeleton.js
cache-control
no-cache
content-length
0
server
nginx
sca.17.5.12.js
static.adsafeprotected.com/ Frame 8E56
80 KB
21 KB
Script
General
Full URL
https://static.adsafeprotected.com/sca.17.5.12.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:223f:e800:8:48e:53c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
233bc983d773cb9a38ca251753bd43f9a2288279fab44598b49c433b32f6d285

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Thu, 19 Aug 2021 18:55:08 GMT
content-encoding
gzip
age
10340029
x-amz-server-side-encryption
AES256
x-cache
Hit from cloudfront
x-amz-replication-status
COMPLETED
last-modified
Thu, 19 Aug 2021 16:31:24 GMT
server
AmazonS3
etag
W/"9304f57298c3834ff107ea7ccb547996"
vary
Accept-Encoding
x-amz-version-id
9YodSBhG3Q8HTUbQ_WDUpcPK09tSZ5ja
via
1.1 cf2071a2896a4f71dbfdbc521d554363.cloudfront.net (CloudFront)
cache-control
max-age=315360000
x-amz-cf-pop
FRA56-P5
content-type
application/javascript
x-amz-cf-id
pWD80LxNh0_wlq_r4ykkabUVwGfqAoRX9AOZR6qiowfxGZlK4XXtUA==
pixel.gif
redventuresgamheader644747280705.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamheader644747280705.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=11&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5024496911&L2id=2870786075&L3id=5718138840&L4id=138352803033&S1id=aw-zdnet&S2id=security&ord=1639739335132&r=799972505069&t=meas&os=0&fi2=0&div1=0&ait=0&gpt_target_pos=middle&gpt_target_vguid=1f8fc507-22e1-4084-b232-490f1c9ac87e&gpt_target_ptype=article&gpt_target_sl=mpu-middle%3FLL%7CT-1000&fullAdUnitPath=%2F22309610186%2Faw-zdnet%2Ftechnology%2Fsecurity&bedc=1&q=1&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:56 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:56 GMT
pixel.gif
redventuresgamheader644747280705.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamheader644747280705.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=11&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5024496911&L2id=2870786075&L3id=5718138840&L4id=138352803033&S1id=aw-zdnet&S2id=security&ord=1639739335132&r=799972505069&t=nht&os=0&fi2=0&div1=0&ait=0&gpt_target_pos=middle&gpt_target_vguid=1f8fc507-22e1-4084-b232-490f1c9ac87e&gpt_target_ptype=article&gpt_target_sl=mpu-middle%3FLL%7CT-1000&fullAdUnitPath=%2F22309610186%2Faw-zdnet%2Ftechnology%2Fsecurity&bedc=1&q=2&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:56 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:56 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=technology&zMoatAdUnit3=security&wf=1&ra=3&pxm=&sgs=3&vb=6&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F856114496422413000%3Fsqp%3D4sqPyQQ7QjkqNxABHQAAtEIgASgBMAk4A0DwkwlYAWBfcAKAAQGIAQGdAQAAgD-oAQGwAYCt4gS4AV_FAS2ynT4%26rs%3DAOga4qk_HHOql6urIoO0v4511fkWvJLnbw&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-mix2djWwZ10QbMk%2BqjMratT%2F8IKBUGMSV3C%2FvEJM65hND7UVt69nIRrqyNQFcZFf7egP&rs=1-k0RseVcsuGC81Q%3D%3D&sc=1&os=1-8g%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=225203003676&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&bq=11&zMoatpos=middle&zMoatvguid=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatptype=article&zMoatsl=mpu-middle%3FLL%7CT-1000&g=0&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&h=250&w=300&rm=1&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=&t=1639739335132&de=799972505069&cu=1639739335132&m=968&ar=8ab009d7785-clean&iw=04a0275&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2769&le=1&lf=118&lg=1&lh=20&ch=0&vv=1&vw=1%3A0%3A0&vp=0&vx=0%3A-%3A-&pe=1%3A336%3A336%3A1315%3A297&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=11&cd=0&ah=11&am=0&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&jk=2&jm=-1&tc=0&fs=195979&na=988908441&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:56 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:56 GMT
E=ls:on%20scroll%20full%20collapse.1
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=413/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame E29D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=413/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=ls:on%20scroll%20full%20collapse.1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:56 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
truncated
/ Frame 930C
801 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
2b526196d510bc11f40effba13f1b9e1792120b1f40b453695e8d7dcc05cf38d

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/svg+xml
omrhp.js
pagead2.googlesyndication.com/pagead/js/r20211207/r20110914/elements/html/ Frame 8C94
8 KB
3 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20211207/r20110914/elements/html/omrhp.js
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adj/N1153793.3518201CBSINTERACTIVEUK/B26699368.318191894;dc_ver=81.236;sz=300x250;u_sd=1;nel=1;dc_adk=3183303654;ord=hpuw4j;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsthndiWDsQQ70fHj8PCzCheqTw57bovDGSFEasbc8Ahoj_CCZL7kumx0LxcxdGNoa_Z0azrzxw9D17cw1uYfEy_hCuRqmJXGbPYrEKGejuPvDgrigTjCh94kdONbtfDPjR0tds5joPrYJN-kl7FmeGu_nx6isKJHURord1n_RzYRXLpCkhan5JCN4xNkylx6L1d3p58fZUPGDh3RnKyh-qIdAVlShw9JaDLc6u-V8D-X86RTGtc7cKDp3ySpAoKF6hQjoTW4_8iNciWBQDUx8thvkw_iCjlArwZfrorKxBnQCLCNECLIXc6Vb-FHQnxe8uD_u3OYvGIlz8e%26sai%3DAMfl-YRhyndNj9aiv5qLhZJg8aJia1NLb2td5MHFtwTKffdRl7JiX8OspwjMF2YAIEOVf9_tjLO-SkosSHW6hOdqA8CgqkCYrjWltJKcO2Ti8phjksk9-ZvUDs1U9pzICWQ%26sig%3DCg0ArKJSzGFRSFgnS9JMEAE%26fbs_aeid%3D%5Bgw_fbsaeid%5D%26urlfix%3D1%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68$0;xdt=0;crlt=Oyr4oXn8i);sttr=59;prcl=s
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
9db8a678d1681c1c4a3f15e1769c3f54d96f126db4a7b00cea65127c820a7763
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:06:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
130
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
3140
x-xss-protection
0
server
cafe
etag
17163059639670574047
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Fri, 31 Dec 2021 11:06:46 GMT
view
googleads4.g.doubleclick.net/pcs/ Frame 8C94
0
524 B
Ping
General
Full URL
https://googleads4.g.doubleclick.net/pcs/view?xai=AKAOjsviwkHYOT8H6DMYJQhdkHzuJ_ysi8C2N1oD5Eu4VEUKKYta0taPjKh0Go_JUZBkxD8Epn2aw3IB4RJ4iQJg8UpZTkTxxeq-5ZSE8SlxrZulmZcO0eicOaw2e6ETywizHtzwhCFYjS6h50n8WP-SC39h&sig=Cg0ArKJSzJ1rIheAbLYvEAE&uach_m=[UACH]&cry=1&fbs_aeid=[gw_fbsaeid]&urlfix=1&omid=0&rm=1&ctpt=1&cbvp=1&cstd=0&cisv=r20211207.24273&adurl=
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adj/N1153793.3518201CBSINTERACTIVEUK/B26699368.318191894;dc_ver=81.236;sz=300x250;u_sd=1;nel=1;dc_adk=3183303654;ord=hpuw4j;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsthndiWDsQQ70fHj8PCzCheqTw57bovDGSFEasbc8Ahoj_CCZL7kumx0LxcxdGNoa_Z0azrzxw9D17cw1uYfEy_hCuRqmJXGbPYrEKGejuPvDgrigTjCh94kdONbtfDPjR0tds5joPrYJN-kl7FmeGu_nx6isKJHURord1n_RzYRXLpCkhan5JCN4xNkylx6L1d3p58fZUPGDh3RnKyh-qIdAVlShw9JaDLc6u-V8D-X86RTGtc7cKDp3ySpAoKF6hQjoTW4_8iNciWBQDUx8thvkw_iCjlArwZfrorKxBnQCLCNECLIXc6Vb-FHQnxe8uD_u3OYvGIlz8e%26sai%3DAMfl-YRhyndNj9aiv5qLhZJg8aJia1NLb2td5MHFtwTKffdRl7JiX8OspwjMF2YAIEOVf9_tjLO-SkosSHW6hOdqA8CgqkCYrjWltJKcO2Ti8phjksk9-ZvUDs1U9pzICWQ%26sig%3DCg0ArKJSzGFRSFgnS9JMEAE%26fbs_aeid%3D%5Bgw_fbsaeid%5D%26urlfix%3D1%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68$0;xdt=0;crlt=Oyr4oXn8i);sttr=59;prcl=s
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
142.250.185.162 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s51-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:08:56 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
dvtp_src.js
cdn.doubleverify.com/ Frame 8C94
8 KB
4 KB
Script
General
Full URL
https://cdn.doubleverify.com/dvtp_src.js?ctx=3758893&cmp=26699368&sid=5755331&plc=318191894&num=&adid=&advid=9640137&adsrv=1&btreg=510965962&btadsrv=doubleclick&crt=160251283&crtname=&chnl=&unit=&pid=&uid=&tagtype=&dvtagver=6.1.src
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adj/N1153793.3518201CBSINTERACTIVEUK/B26699368.318191894;dc_ver=81.236;sz=300x250;u_sd=1;nel=1;dc_adk=3183303654;ord=hpuw4j;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsthndiWDsQQ70fHj8PCzCheqTw57bovDGSFEasbc8Ahoj_CCZL7kumx0LxcxdGNoa_Z0azrzxw9D17cw1uYfEy_hCuRqmJXGbPYrEKGejuPvDgrigTjCh94kdONbtfDPjR0tds5joPrYJN-kl7FmeGu_nx6isKJHURord1n_RzYRXLpCkhan5JCN4xNkylx6L1d3p58fZUPGDh3RnKyh-qIdAVlShw9JaDLc6u-V8D-X86RTGtc7cKDp3ySpAoKF6hQjoTW4_8iNciWBQDUx8thvkw_iCjlArwZfrorKxBnQCLCNECLIXc6Vb-FHQnxe8uD_u3OYvGIlz8e%26sai%3DAMfl-YRhyndNj9aiv5qLhZJg8aJia1NLb2td5MHFtwTKffdRl7JiX8OspwjMF2YAIEOVf9_tjLO-SkosSHW6hOdqA8CgqkCYrjWltJKcO2Ti8phjksk9-ZvUDs1U9pzICWQ%26sig%3DCg0ArKJSzGFRSFgnS9JMEAE%26fbs_aeid%3D%5Bgw_fbsaeid%5D%26urlfix%3D1%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68$0;xdt=0;crlt=Oyr4oXn8i);sttr=59;prcl=s
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:6c00:2b2::4469 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
Microsoft-IIS/10.0 /
Resource Hash
3ce4399c5078ca5cea592b3eaf5eadeb4e8e0ca168468bb5ceb3122bc83a6bbd

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Date
Fri, 17 Dec 2021 11:08:56 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Dec 2021 19:20:31 GMT
Server
Microsoft-IIS/10.0
ETag
"80a9affdb1f2d71:0"
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=900
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
3291
UFYwWwmt.js
tpc.googlesyndication.com/sodar/ Frame 8C94
41 KB
15 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/UFYwWwmt.js
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adj/N1153793.3518201CBSINTERACTIVEUK/B26699368.318191894;dc_ver=81.236;sz=300x250;u_sd=1;nel=1;dc_adk=3183303654;ord=hpuw4j;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsthndiWDsQQ70fHj8PCzCheqTw57bovDGSFEasbc8Ahoj_CCZL7kumx0LxcxdGNoa_Z0azrzxw9D17cw1uYfEy_hCuRqmJXGbPYrEKGejuPvDgrigTjCh94kdONbtfDPjR0tds5joPrYJN-kl7FmeGu_nx6isKJHURord1n_RzYRXLpCkhan5JCN4xNkylx6L1d3p58fZUPGDh3RnKyh-qIdAVlShw9JaDLc6u-V8D-X86RTGtc7cKDp3ySpAoKF6hQjoTW4_8iNciWBQDUx8thvkw_iCjlArwZfrorKxBnQCLCNECLIXc6Vb-FHQnxe8uD_u3OYvGIlz8e%26sai%3DAMfl-YRhyndNj9aiv5qLhZJg8aJia1NLb2td5MHFtwTKffdRl7JiX8OspwjMF2YAIEOVf9_tjLO-SkosSHW6hOdqA8CgqkCYrjWltJKcO2Ti8phjksk9-ZvUDs1U9pzICWQ%26sig%3DCg0ArKJSzGFRSFgnS9JMEAE%26fbs_aeid%3D%5Bgw_fbsaeid%5D%26urlfix%3D1%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68$0;xdt=0;crlt=Oyr4oXn8i);sttr=59;prcl=s
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5056305b09ad6474ea540f796c79be51d6b8e96043cb3d7bc4ef774e56765f4f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 10:51:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1040
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
15207
x-xss-protection
0
last-modified
Tue, 03 Mar 2020 20:15:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
vary
Accept-Encoding
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 17 Dec 2022 10:51:36 GMT
9383558347792414917
s0.2mdn.net/simgad/ Frame 8C94
39 KB
39 KB
Image
General
Full URL
https://s0.2mdn.net/simgad/9383558347792414917
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:812::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7258294c5ecbbd9c810da4970dbd342984aeef3bfdfefafda82192120aa88f4e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Sat, 11 Dec 2021 14:06:18 GMT
x-content-type-options
nosniff
age
507758
x-dns-prefetch-control
off
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
39811
x-xss-protection
0
last-modified
Fri, 29 Oct 2021 16:29:43 GMT
server
sffe
report-to
{"group":"ads-doubleclick-media","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-doubleclick-media"}]}
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="ads-doubleclick-media"
expires
Sun, 11 Dec 2022 14:06:18 GMT
truncated
/ Frame 8C94
214 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
37fd678267f750eb697a18b5b90bcdfbdc37b38e7796176d1f759d00c2e83550

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/png
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=4&fi=1&apd=8&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5029661432&L2id=2929336068&L3id=5821501893&L4id=138370168508&S1id=22308610192&S2id=22654085702&ord=1639739336131&r=670353926057&t=meas&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=top&zMoatPT=article&zMoatSL=mpu-plus-top%3FLL%7CT-1000&moatClientSlicer3=0&bedc=1&q=1&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:56 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:56 GMT
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=4&fi=1&apd=8&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5029661432&L2id=2929336068&L3id=5821501893&L4id=138370168508&S1id=22308610192&S2id=22654085702&ord=1639739336131&r=670353926057&t=fv&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=top&zMoatPT=article&zMoatSL=mpu-plus-top%3FLL%7CT-1000&moatClientSlicer3=0&bedc=1&q=2&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:56 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:56 GMT
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=4&fi=1&apd=8&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5029661432&L2id=2929336068&L3id=5821501893&L4id=138370168508&S1id=22308610192&S2id=22654085702&ord=1639739336131&r=670353926057&t=nht&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=top&zMoatPT=article&zMoatSL=mpu-plus-top%3FLL%7CT-1000&moatClientSlicer3=0&bedc=1&q=3&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:56 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:56 GMT
dt
dt.adsafeprotected.com/
43 B
216 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?advEntityId=903347&asId=cacd4a8a-3130-cc67-ef57-62bc1f683105&tv=%7Bc:x3emEV,pingTime:-2,time:288,type:a,im:%7Bsf:0,pom:1,prf:%7BbdA:6,bdZ:181,beA:378,beZ:379,mfA:559,cmA:560,inA:560,inZ:563,prA:563,prZ:568,si:574,poA:575,poZ:588,cmZ:588,mfZ:588,loA:594,loZ:595,ltA:665,ltZ:665%7D%7D,sca:%7Bdfp:%7Bdf:0%7D%7D,env:%7Bgca:false,cca:false,gca2:false%7D,clog:%5B%7Bpiv:100,vs:i,r:,w:1600,h:105,t:195%7D%5D,es:0,sc:1,ha:1,fif:0,gmnp:0,for:1,b11:1,cnod:1,gm:0,slTimes:%7Bi:288,o:0,n:0,pp:0,pm:0%7D,slEvents:%5B%7Bsl:i,t:195,wc:0.0.1600.1200,ac:0.0.1600.105,am:i,cc:0.0.1600.105,piv:100,obst:0,th:0,reas:,bkn:%7Bpiv:%5B105~100%5D,as:%5B105~1600.105%5D%7D%7D%5D,slEventCount:1,em:true,fr:true,e:,tt:rjss,dtt:0,fm:sRQD997+11%7C12%7C13%7C14%7C15*.903347-59128494%7C151%7C152%7C153%7C154%7C155%7C156%7C16%7C17%7C18%7C19,idMap:15*,rmeas:1,rend:1,renddet:IMG.qs,slid:%5Bgoogle_ads_iframe_/22309610186/aw-zdnet/technology/security_0,google_ads_iframe_/22309610186/aw-zdnet/technology/security_0__container__,nav-ad-plus-leader%5D,sinceFw:90,readyFired:true%7D&br=u
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
107.21.138.34 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-107-21-138-34.compute-1.amazonaws.com
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:56 GMT
x-server-name
dt04.va.303net.net
p3p
CP="COM NAV INT STA NID OUR IND NOI"
cache-control
no-cache
content-type
image/gif
content-length
43
server
nginx
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=77&fi=1&apd=154&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5029899480&L2id=2942419878&L3id=5840893800&L4id=138375198164&S1id=22308610192&S2id=22654085702&ord=1639739335608&r=809372111222&t=meas&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=nav&zMoatPT=article&zMoatSL=nav-ad-plus-leader%3FT-1000&moatClientSlicer3=0&bedc=1&q=1&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:56 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:56 GMT
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=77&fi=1&apd=154&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5029899480&L2id=2942419878&L3id=5840893800&L4id=138375198164&S1id=22308610192&S2id=22654085702&ord=1639739335608&r=809372111222&t=fv&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=nav&zMoatPT=article&zMoatSL=nav-ad-plus-leader%3FT-1000&moatClientSlicer3=0&bedc=1&q=2&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:56 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:56 GMT
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=77&fi=1&apd=154&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5029899480&L2id=2942419878&L3id=5840893800&L4id=138375198164&S1id=22308610192&S2id=22654085702&ord=1639739335608&r=809372111222&t=nht&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=nav&zMoatPT=article&zMoatSL=nav-ad-plus-leader%3FT-1000&moatClientSlicer3=0&bedc=1&q=3&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:56 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:56 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=REDVENTURES_GAM_DISPLAY1&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=300x250&zMoatPS=top&zMoatSZPS=300x250%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1639739336131&de=670353926057&m=0&ar=cc97a930ec1-clean&iw=101177c&q=15&cb=0&ym=0&cu=1639739336131&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=5029661432%3A2929336068%3A5821501893%3A138370168508&zMoatW=300&zMoatH=250&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatSN=d&zMoatSL=mpu-plus-top%3FLL%7CT-1000&zMoatMMV_MAX=na&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&id=1&ii=4&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&gw=redventuresgamdisplay60805146916&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A336%3A336%3A1315%3A297&iq=na&tt=na&tu=&tp=&jk=-1&jm=-1&fs=195926&na=1582524340&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:56 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:56 GMT
view
googleads4.g.doubleclick.net/pcs/ Frame 8C94
0
23 B
Ping
General
Full URL
https://googleads4.g.doubleclick.net/pcs/view?xai=AKAOjsviwkHYOT8H6DMYJQhdkHzuJ_ysi8C2N1oD5Eu4VEUKKYta0taPjKh0Go_JUZBkxD8Epn2aw3IB4RJ4iQJg8UpZTkTxxeq-5ZSE8SlxrZulmZcO0eicOaw2e6ETywizHtzwhCFYjS6h50n8WP-SC39h&sig=Cg0ArKJSzJ1rIheAbLYvEAE&uach_m=[UACH]&cry=1&fbs_aeid=[gw_fbsaeid]&urlfix=1&omid=0&rm=1&ctpt=136&vt=11&dtpt=135&dett=2&cstd=0&cisv=r20211207.24273&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0.&adurl=
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adj/N1153793.3518201CBSINTERACTIVEUK/B26699368.318191894;dc_ver=81.236;sz=300x250;u_sd=1;nel=1;dc_adk=3183303654;ord=hpuw4j;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsthndiWDsQQ70fHj8PCzCheqTw57bovDGSFEasbc8Ahoj_CCZL7kumx0LxcxdGNoa_Z0azrzxw9D17cw1uYfEy_hCuRqmJXGbPYrEKGejuPvDgrigTjCh94kdONbtfDPjR0tds5joPrYJN-kl7FmeGu_nx6isKJHURord1n_RzYRXLpCkhan5JCN4xNkylx6L1d3p58fZUPGDh3RnKyh-qIdAVlShw9JaDLc6u-V8D-X86RTGtc7cKDp3ySpAoKF6hQjoTW4_8iNciWBQDUx8thvkw_iCjlArwZfrorKxBnQCLCNECLIXc6Vb-FHQnxe8uD_u3OYvGIlz8e%26sai%3DAMfl-YRhyndNj9aiv5qLhZJg8aJia1NLb2td5MHFtwTKffdRl7JiX8OspwjMF2YAIEOVf9_tjLO-SkosSHW6hOdqA8CgqkCYrjWltJKcO2Ti8phjksk9-ZvUDs1U9pzICWQ%26sig%3DCg0ArKJSzGFRSFgnS9JMEAE%26fbs_aeid%3D%5Bgw_fbsaeid%5D%26urlfix%3D1%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68$0;xdt=0;crlt=Oyr4oXn8i);sttr=59;prcl=s
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.162 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s51-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:08:56 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
view
securepubads.g.doubleclick.net/pcs/ Frame 8C94
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstmlc-Vd9qelHpXOF4oP7Ei7w7eNs3UeIC2bKV0yllKfxDQVTf-jV89YGVqsoo4unH1SEywi-lwEQnLVgf-sSDebjUZ7lRnuGLe0h7JaBmWReq_Z2B5nyJQkYMadtEPbQ1IhvYLQYMSAdCMJswZZRGNI6g0gvEjepFlrbl9IX_8pJOodG9HSYzIDVLwnG3OuXFKIElxpZK-BMTgh9UEW7Goi73GUlgoCDPfa53xYedrNigvuQ2i06OK5oD_UJgITW-K-ECAAdSRHTp2KYJ4_8HEv6whQmkh0T6IXJCykd6PV54NQdNB1Lv5F2rwppuZbp_bFmuf00Y8Fu6lhonCF9U&sai=AMfl-YTg6TlBh1rdH58-VG1zvKnX92nt4Zd1l3FYbqMAm-wlSGXwumUIAYlxI3cnAoWYecspIE0sh0vEBTHyrjiGdZd8CBzpjjJLXHeo6AzBAQI5gDmgdn8PhKxsxA14xTk&sig=Cg0ArKJSzHA0TBE8rN7FEAE&uach_m=[UACH]&urlfix=1&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0%3D&adurl=
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:08:56 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
expires
Fri, 17 Dec 2021 11:08:56 GMT
E=fq
tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=560/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/Q=f.1_c.1_p... Frame 442F
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=560/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/Q=f.1_c.1_p.1_l.1_v.1_fc.1_fp.1_fl.1_fr.1_cp.1_cl.1_pl.1_pv.1_lv.1/G=17dc814a56a21ddb14199e/E=fq
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://ad.clipcentric.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:56 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=132&fi=1&apd=209&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5029899480&L2id=2942419878&L3id=5840893800&L4id=138375198164&S1id=22308610192&S2id=22654085702&ord=1639739335608&r=809372111222&t=hdn&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=nav&zMoatPT=article&zMoatSL=nav-ad-plus-leader%3FT-1000&moatClientSlicer3=0&bedc=1&q=4&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:56 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:56 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=300x250&zMoatPS=top&zMoatSZPS=300x250%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=0&ak=https%3A%2F%2Fs0.2mdn.net%2Fsimgad%2F9383558347792414917&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-mix2djWwZ10QbMk%2BqjMratT%2F8IKBUGMSV3C%2FvEJM65hND7UVt69nIRrqyNQFcZFf7egP&rs=1-k0RseVcsuGC81Q%3D%3D&sc=1&os=1-8g%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=225203003676&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=&t=1639739336131&de=670353926057&cu=1639739336131&m=23&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2769&le=1&lf=0&lg=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A336%3A336%3A1315%3A297&as=0&ag=4&an=0&gf=4&gg=0&ix=4&ic=4&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=4&bx=0&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=8&cd=0&ah=8&am=0&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5029661432%3A2929336068%3A5821501893%3A138370168508&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=300&zMoatH=250&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatSN=d&zMoatSL=mpu-plus-top%3FLL%7CT-1000&zMoatMMV_MAX=na&zMoatSlotId=mpu-plus-top&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=mpu-plus-top&hv=DOMSEARCH&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=3&jm=-1&tz=mpu-plus-top&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=1437641809&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:56 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:56 GMT
dv-measurements1950.js
cdn.doubleverify.com/ Frame 4D65
490 KB
89 KB
Script
General
Full URL
https://cdn.doubleverify.com/dv-measurements1950.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:6c00:2b2::4469 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
Microsoft-IIS/10.0 /
Resource Hash
88343b81dd1c646160dcf8856b77f8d7e12334fa17a9ae39c1a6958b134a1b25

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Date
Fri, 17 Dec 2021 11:08:56 GMT
Content-Encoding
gzip
Last-Modified
Wed, 15 Dec 2021 11:38:54 GMT
Server
Microsoft-IIS/10.0
ETag
"01b9356a8f1d71:0"
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=946080900
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
91099
Enqz_20U.html
tpc.googlesyndication.com/sodar/ Frame 9694
22 KB
8 KB
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/Enqz_20U.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/UFYwWwmt.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
127ab3ff6d14112ae6aa40b68d9d3144748eda08efbc60a48a5be0555cf8622b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/

Response headers

accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
cross-origin-resource-policy
cross-origin
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
timing-allow-origin
*
content-length
8395
date
Fri, 17 Dec 2021 10:51:37 GMT
expires
Sat, 17 Dec 2022 10:51:37 GMT
last-modified
Tue, 03 Mar 2020 20:15:00 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
1039
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
pixel.gif
redventuresgamheader644747280705.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamheader644747280705.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=232&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5024496911&L2id=2870786075&L3id=5718138840&L4id=138352803033&S1id=aw-zdnet&S2id=security&ord=1639739335132&r=799972505069&t=hdn&os=0&fi2=0&div1=0&ait=0&gpt_target_pos=middle&gpt_target_vguid=1f8fc507-22e1-4084-b232-490f1c9ac87e&gpt_target_ptype=article&gpt_target_sl=mpu-middle%3FLL%7CT-1000&fullAdUnitPath=%2F22309610186%2Faw-zdnet%2Ftechnology%2Fsecurity&bedc=1&q=3&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:56 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:56 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=5x5&zMoatPS=nav&zMoatSZPS=5x5%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=https%3A%2F%2Fwww.zdnet.com%2F%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-mix2djWwZ10QbMk%2BqjMratT%2F8IKBUGMSV3C%2FvEJM65hND7UVt69nIRrqyNQFcZFf7egP&rs=1-k0RseVcsuGC81Q%3D%3D&sc=1&os=1-8g%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=225203003676&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=105&w=1600&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=&t=1639739335608&de=809372111222&cu=1639739335608&m=601&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2769&le=1&lf=0&lg=1&lh=11&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A336%3A336%3A1315%3A297&as=0&ag=77&an=0&gf=77&gg=0&ix=77&ic=77&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=77&bx=0&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=154&cd=0&ah=154&am=0&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5029899480%3A2942419878%3A5840893800%3A138375198164&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=5&zMoatH=5&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatSN=d&zMoatSL=nav-ad-plus-leader%3FT-1000&zMoatMMV_MAX=na&zMoatSlotId=nav-ad-plus-leader&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=nav-ad-plus-leader&hv=clipcentric&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=3&jm=-1&tz=nav-ad-plus-leader&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=1709967664&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:56 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:56 GMT
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=205&fi=1&apd=209&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5029661432&L2id=2929336068&L3id=5821501893&L4id=138370168508&S1id=22308610192&S2id=22654085702&ord=1639739336131&r=670353926057&t=hdn&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=top&zMoatPT=article&zMoatSL=mpu-plus-top%3FLL%7CT-1000&moatClientSlicer3=0&bedc=1&q=4&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:56 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:56 GMT
visit.js
tps.doubleverify.com/ Frame 4D65
2 KB
2 KB
Script
General
Full URL
https://tps.doubleverify.com/visit.js?gdpr=&gdpr_consent=&ttmms=85&ttfrms=53&bridua=3&tstype=2&eparams=DC4FC%3Dl9EEADTbpTauTauHHH%5DK5%3F6E%5D4%40%3ETau2CE%3A4%3D6TauDFDA64E65%5C%3AC2%3F%3A2%3F%5C924%3C6CD%5CE2C86E%5C2%3AC%3D%3A%3F6%5CH%3AE9%5C%3F6H%5C324%3C5%40%40CTauTab7E28Tbs%23%24%2432773egU2%3F4r92%3A%3Fl9EEADTbpTauTauHHH%5DK5%3F6E%5D4%40%3ETar9EEADTbpTauTauHHH%5DK5%3F6E%5D4%40%3E&srcurlD=0&aUrlD=0&ssl=https:&dfs=308&ddur=76&uid=1639739336415919&jsCallback=dvCallback_1639739336415870&dvtagver=6.1.src&navUa=Mozilla%2F5.0%20(Windows%20NT%2010.0%3B%20Win64%3B%20x64)%20AppleWebKit%2F537.36%20(KHTML%2C%20like%20Gecko)%20Chrome%2F96.0.4664.93%20Safari%2F537.36&htmlmsging=1&chro=0&hist=2&winh=1200&winw=1600&wouh=1200&wouw=1600&scah=1200&scaw=1600&dvp_isOnHead=1&jsver=1950&tgjsver=1950&lvvn=28&m1=13&refD=1&referrer=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F&fwc=0&fcl=1757&flt=1&fec=766&fcifrms=9&brh=2&sdf=2&dvp_epl=285&noc=4&ctx=3758893&cmp=26699368&sid=5755331&plc=318191894&crt=160251283&btreg=510965962&btadsrv=doubleclick&adsrv=1&advid=9640137&errorURL=https://tps.doubleverify.com/visit.jpg&mib=0&dvp_rcp=2&dvp_htec=2&dvp_seem=2&dvp_tuk=1&dvp_sukv=880796184580.6278&dvp_tukv=12127855292.788645&dvp_uuid=70152719.15930618&dvp_tuid=1460962417020
Requested by
Host: cdn.doubleverify.com
URL: https://cdn.doubleverify.com/dv-measurements1950.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
34.117.228.201 Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
201.228.117.34.bc.googleusercontent.com
Software
/
Resource Hash
d3a852d66b3cdf44897bc05f6df700f752810cc9b9321a9fdd11d0bdd2d570d2

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 Dec 2021 11:08:56 GMT
Cache-Control
max-age=0
Connection
keep-alive
Content-Type
text/javascript
Transfer-Encoding
chunked
Expires
12/16/2021 11:08:56
A3sS0H_86Eu8poIaUPJJxUQpsgwPL9Z0aaC7WTcRMFE.js
pagead2.googlesyndication.com/bg/ Frame 9694
35 KB
13 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/bg/A3sS0H_86Eu8poIaUPJJxUQpsgwPL9Z0aaC7WTcRMFE.js
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/Enqz_20U.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
037b12d07ffce84bbca6821a50f249c54429b20c0f2fd67469a0bb5937113051
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://tpc.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 10:54:44 GMT
content-encoding
br
x-content-type-options
nosniff
age
852
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/botguard-scs
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
13610
x-xss-protection
0
last-modified
Mon, 06 Dec 2021 19:18:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="botguard-scs"
vary
Accept-Encoding
report-to
{"group":"botguard-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/botguard-scs"}]}
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
expires
Sat, 17 Dec 2022 10:54:44 GMT
/
02179917.akstat.io/
0
354 B
Ping
General
Full URL
https://02179917.akstat.io/
Requested by
Host: c.go-mpulse.net
URL: https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2a02:26f0:6c00:2b9::11a6 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Fri, 17 Dec 2021 11:08:56 GMT
Content-Type
image/gif
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
X-XSS-Protection
0
Expires
Fri, 17 Dec 2021 11:08:56 GMT
dt
dt.adsafeprotected.com/
43 B
215 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?advEntityId=903347&asId=cacd4a8a-3130-cc67-ef57-62bc1f683105&tv=%7Bc:x3emKU,time:659,type:e,im:%7Bimprf:%7Bttecl:763,ecd:9,tsecr:75%7D%7D,es:0,sc:1,ha:1,fif:0,gmnp:0,for:1,b11:1,cnod:1,gm:0,slTimes:%7Bi:659,o:0,n:0,pp:0,pm:0%7D,slEvents:%5B%7Bsl:i,t:195,wc:0.0.1600.1200,ac:0.0.1600.105,am:i,cc:0.0.1600.105,piv:100,obst:0,th:0,reas:,bkn:%7Bpiv:%5B476~100%5D,as:%5B476~1600.105%5D%7D%7D%5D,slEventCount:1,em:true,fr:true,e:,tt:rjss,dtt:318,fm:sRQD997+11%7C12%7C13%7C14%7C15*.903347-59128494%7C151%7C152%7C153%7C154%7C155%7C156%7C16%7C17%7C18%7C19,idMap:15*,rmeas:1,rend:1,renddet:IMG.qs%7D&br=u
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
107.21.138.34 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-107-21-138-34.compute-1.amazonaws.com
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:56 GMT
x-server-name
dt14.va.303net.net
p3p
CP="COM NAV INT STA NID OUR IND NOI"
cache-control
no-cache
content-type
image/gif
content-length
43
server
nginx
dt
dt.adsafeprotected.com/
43 B
215 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?advEntityId=903347&asId=cacd4a8a-3130-cc67-ef57-62bc1f683105&tv=%7Bc:x3emLf,pingTime:-10,time:680,type:s,mvn:ZnNjPTEyLHNkPTMsbm89OCxhc3A9MQ--,sd:MTcuNS4xMnYxMjAwfHwxNjAwfHwxfHwxfHwyNHx8MTIwMHx8MHx8MHx8MXx8bGFuZHNjYXBlLXByaW1hcnl8fDI0fHw0LzN8fDQvM3x8MHx8MTYwMA--,no:MTcuNS4xMnZNb3ppbGxhfHxOZXRzY2FwZXx8bnx8bnx8MHx8bnx8TGludXggeDg2XzY0fHxHZWNrb3x8MjAwMzAxMDd8fDB8fE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IFdpbjY0OyB4NjQpIEFwcGxlV2ViS2l0LzUzNy4zNiAoS0hUTUwsIGxpa2UgR2Vja28pIENocm9tZS85Ni4wLjQ2NjQuOTMgU2FmYXJpLzUzNy4zNnx8MXx8MXx8R29vZ2xlIEluYy58fG4-,ch:n,fsc:17.5.12v220002022000220000022002220000022220200000222200022220002022022022222202002220222022222022222000220200000022220222220222222222222202222222222222222222222222222222222222200000022022020020000002022202022022022222222000000000020222202022022222000000020000000000000000000020220202220000022200222202220022200200222022202220022202220020222202000220000222202222202222000002002002222222202220022202200022002220222202,asp:1639739336552%7C%7C33aa43adba6bf52f877f2b4ad2d33c7c%7C%7Ca2fdad25d911a8a4b39828759d282361%7C%7C3ff8ada8fd5bbd2f8c17a6471cbf2a4f%7C%7C2a7cf8c31ee5c8e19d8bf91fe35c42a4%7C%7Cf17e685fc50438ef4bacf557929b8629%7C%7C5bd79d384ca444d8c7ff2bc95e23a78b%7C%7Cab766d43250f99eabce99e37ee11e9f0%7C%7C1629390669%7D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
107.21.138.34 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-107-21-138-34.compute-1.amazonaws.com
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:56 GMT
x-server-name
dt09.va.303net.net
p3p
CP="COM NAV INT STA NID OUR IND NOI"
cache-control
no-cache
content-type
image/gif
content-length
43
server
nginx
gen_204
pagead2.googlesyndication.com/pagead/
0
20 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=225&t=2&li=gpt_2021120601&jk=1713214506163158&bg=!ODulO3_NAAZKWFskSlg7ACkAdvg8WgF_TVEWpWbEdKI254r-P5FCTF2fDajy2vfCR8BhPuK3dKcWHQIAAAE1UgAAADJoAQeZAs2LUths1gyY5mJdKhJ5sseg3snswogWem27G-14t-Y8wh3LtKcO_bBgR4ZGK4L4yyZaTh6DqN98RD03Lh4tuYULi5bNc9C68HRnNkORTtzHwwzieHLX4jzAw1W4sAYi0evsdGnPr88ijpHNF8djy-jysNdWsyxANsBnkNy0SmXTXncY5ipmm5ccdLglU31GBi7Z0crrNgjrzG4IFfsPjH2FJ7XiLyVCyYiGLHsyZ8regsP8t3NzTO5B2_2q694josOhYxoGWBaudWEoUdsaqTHISffRNjsNX4KyMapCvtL01fqBHwsiz5SSu3kRlm8J8B3IAn1fBH_jbNqW0M9SAyPlQ_GRfRTFvXCs1i4buI2yHff1-jCUfBnOOF1YrFAyoRHgFHdJgWDxgrQvT43SzaQ9Pq04QnuWxfR0DglAX8zj9ZuLsmCCZzaTyqAVIGIcYeOSgqN6M1W4wb1SDC1daJUM2bWih4sh3uGm0m4YzNnyc8q6LgwZtV6-6zU9Rg_VZUEEbjPyDIh6i_UuJDseBjrr6vlvUmssWgpTnZlfScv1N4CAiCm-SqIlemqK_fzpH6IQ-YbE2j-QVnvGXBwOeQV9VnHkM5rrOwi4574qugmOdbpAZPHZbrGRNnfyfBwbsMf0MHDisLe33alk0cK5wr8oWwY7VYvfRyUCQIMQ3Ha__XArqv-R-ORnDiPE24hFAJ_fkztnlKnLwRFI_2v5E6poQsaCLyqOFZAnriC4PtMsMj36YyZiaoP0tf9YmgEDTGnV3Tkd0v4ZRRCTEPJIaJ945ROjvciaiOLMTcXZcUiRoEx8B_ktIEdVYTTVH8dkx5ITTI7Jsw4-zynUOT4SLQuwrq6zwWpNL-mTqbkKPCy8LuTHQk4WyFWIl48Y0vcK5U6AauiLlOC4xfUBNzdT3T8zg_ASdzRm-SKbqWEi-v5U2g4dX2ZWQ8URpbQyFe8
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:56 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
E=wi
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=1021/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame E29D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=1021/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=wi
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:56 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
gen_204
pagead2.googlesyndication.com/pagead/ Frame 9694
0
20 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar&v=30&t=2&bgai=BEi8DyG-8Ya2GAd-a9u8Po6qgqAoAAAAAOAHgBAI&bg=!QUKlQgbNAAZKWFskSlg7ACkAdvg8WlSz6u4IAhAtfuHCu7EjuQcvBTawh3_WUkGZqIBBkO0CU3nonAIAAADiUgAAAAxoAQeZAuYBVQ6A40HYBQfokb7wOpqtq8u3ORhi2CA3IzTukwNapfz7iArIZGDYLHMxDtogs3GsrOdNqxF9QWl-DStlLuLGLi_u7G7x2pBwVqFNxObJSquLzTX1qYiitjE2CqHEnag7x8zzbugwHtzV9K2xCyjY9oo3KycWEAKwx96WdLAIU-VAoI23tqNpgwrMFKeq21agfXcPY2mYWLN5hNS9JeZ_TIXR35cTry6mnkdEhXNWu99w-kQlk0JMVJzl61_FmlZUEoQt7qgool6IARd4AZZ_MQcNghUjNVU7tB75MgSPveh9nk6pNBKwjYzb3tcupZ5FmuPh3vjAsbQviM1ZpLmm7gM-dCPsr2yxnGpVF2eqvrFN1sOzftiHl2RYW2k9rKWLkVRAi8mjAHLa8IOVnq58vVnbAQdsWmhs5kNloCs53FHgqaEjCfri_zYwgBUAjdAVJ9xU89GtF0I3GzknWdCfBmwVkI6VWquAqV68UtMfOAnkAPN4hA-WXpGMidRlo_pw7Pkms_ii91lldMAirqplOAgc2X8tSanarnzIOdtfxJdgUxphtWKwVPaE88GiI3qXz0czcCshobqLtlhv_oYvOdkP27Z3Xe7jL5WynDg2F0n4FwSJtBtQGvH0Tg9jqPYSl1Hht6FAxWS32bTCpcNwiQ1yS9SssRzEeKCGlEPlgWDCQuRDKRFxUz0mRDDqfpIKWEmwuzaT8nqOdz2SvmgaPY3bi_UjWzOmTd6uifhtyAzxN2X7j3fv6pg9-ykDRkw2HCOGNISfFCvAilsIhQmwgkpFVqId31XluaMG1nvC6OZaFfZNJ9mOQgblEsg9gEhT6Y9DvbftnixnK6AlNXgSOwa0pnS_fy8t2whoM8xQTpp73qfRHveH3i62f-TYqjP43kUxOIEtAi_ZQcLaJ0_8qhLOlYjoX87WzbpzbvHVoG_vH75LAgGfrP1GiZMmLSkHTJ4TOzOyCWlVJz6yRr4GZtAyzLSw
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://tpc.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:56 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame E29D
42 B
64 B
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsuhjEIyV3XoiUfiEa-mt9DLimsidUB6e_-LtRHvotixAvG26EfEGOVnbDgAFdrIqPmomvANWy0xdeJrMZW_n_hZf8XqSCrHuLL5w21bH2a5Rf5AS6Hr&sig=Cg0ArKJSzK2mxsjiAD5vEAE&id=lidar2&mcvt=1000&p=0,0,105,1600&mtos=1000,1000,1000,1000,1000&tos=1000,0,0,0,0&v=20211202&bin=7&avms=nio&bs=1600,1200&mc=1&app=0&itpl=19&adk=3529097836&rs=4&la=0&cr=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0%3D&vs=4&r=v&rst=1639739335495&rpt=346&isd=0&lsd=0&met=mue&wmsd=0
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:56 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
dt
dt.adsafeprotected.com/
43 B
215 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?advEntityId=903347&asId=cacd4a8a-3130-cc67-ef57-62bc1f683105&tv=%7Bc:x3emTT,pingTime:1,time:1216,type:p,clog:%5B%7Bpiv:100,vs:i,r:,w:1600,h:105,t:195%7D%5D,es:0,sc:1,ha:1,fif:0,gmnp:0,for:1,b11:1,cnod:1,gm:0,slTimes:%7Bi:1216,o:0,n:0,pp:0,pm:0%7D,slEvents:%5B%7Bsl:i,t:195,wc:0.0.1600.1200,ac:0.0.1600.105,am:i,cc:0.0.1600.105,piv:100,obst:0,th:0,reas:,bkn:%7Bpiv:%5B1033~100%5D,as:%5B1033~1600.105%5D%7D%7D%5D,slEventCount:1,em:true,fr:true,e:,tt:rjss,dtt:116,fm:sRQD997+11%7C12%7C13%7C14%7C15*.903347-59128494%7C151%7C152%7C153%7C154%7C155%7C156%7C16%7C17%7C18%7C19,idMap:15*,rmeas:1,rend:1,renddet:IMG.qs%7D&br=u
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
107.21.138.34 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-107-21-138-34.compute-1.amazonaws.com
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:57 GMT
x-server-name
dt12.va.303net.net
p3p
CP="COM NAV INT STA NID OUR IND NOI"
cache-control
no-cache
content-type
image/gif
content-length
43
server
nginx
dt
dt.adsafeprotected.com/
43 B
215 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?advEntityId=903347&asId=cacd4a8a-3130-cc67-ef57-62bc1f683105&tv=%7Bc:x3emTU,pingTime:1,time:1217,type:pf,clog:%5B%7Bpiv:100,vs:i,r:,w:1600,h:105,t:195%7D%5D,es:0,sc:1,ha:1,fif:0,gmnp:0,for:1,b11:1,cnod:1,gm:0,slTimes:%7Bi:1217,o:0,n:0,pp:0,pm:0%7D,slEvents:%5B%7Bsl:i,t:195,wc:0.0.1600.1200,ac:0.0.1600.105,am:i,cc:0.0.1600.105,piv:100,obst:0,th:0,reas:,bkn:%7Bpiv:%5B1034~100%5D,as:%5B1034~1600.105%5D%7D%7D%5D,slEventCount:1,em:true,fr:true,e:,tt:rjss,dtt:116,fm:sRQD997+11%7C12%7C13%7C14%7C15*.903347-59128494%7C151%7C152%7C153%7C154%7C155%7C156%7C16%7C17%7C18%7C19,idMap:15*,rmeas:1,rend:1,renddet:IMG.qs%7D&br=u
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
107.21.138.34 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-107-21-138-34.compute-1.amazonaws.com
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:57 GMT
x-server-name
dt13.va.303net.net
p3p
CP="COM NAV INT STA NID OUR IND NOI"
cache-control
no-cache
content-type
image/gif
content-length
43
server
nginx
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=300x250&zMoatPS=top&zMoatSZPS=300x250%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-mix2djWwZ10QbMk%2BqjMratT%2F8IKBUGMSV3C%2FvEJM65hND7UVt69nIRrqyNQFcZFf7egP&rs=1-k0RseVcsuGC81Q%3D%3D&sc=1&os=1-8g%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=225203003676&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=&t=1639739336131&de=670353926057&cu=1639739336131&m=1054&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2667&le=1&lf=0&lg=1&lh=73&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A336%3A336%3A1315%3A297&as=1&ag=1042&an=4&gi=1&gf=1042&gg=4&ix=1042&ic=1042&ez=1&ck=1042&kw=845&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1042&bx=4&ci=1042&jz=845&dj=1&aa=0&ad=938&cn=0&gk=938&gl=0&ik=938&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=845&cd=8&ah=845&am=8&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5029661432%3A2929336068%3A5821501893%3A138370168508&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=300&zMoatH=250&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatSN=d&zMoatSL=mpu-plus-top%3FLL%7CT-1000&zMoatMMV_MAX=na&zMoatSlotId=mpu-plus-top&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=mpu-plus-top&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=4&jm=-1&tz=mpu-plus-top&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=1171405737&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:57 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:57 GMT
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=845&tet=1042&fi=1&apd=1046&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5029661432&L2id=2929336068&L3id=5821501893&L4id=138370168508&S1id=22308610192&S2id=22654085702&ord=1639739336131&r=670353926057&t=iv&os=1&fi2=0&div1=1&ait=0&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=top&zMoatPT=article&zMoatSL=mpu-plus-top%3FLL%7CT-1000&moatClientSlicer3=0&bedc=1&q=5&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:57 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:57 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=300x250&zMoatPS=top&zMoatSZPS=300x250%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-mix2djWwZ10QbMk%2BqjMratT%2F8IKBUGMSV3C%2FvEJM65hND7UVt69nIRrqyNQFcZFf7egP&rs=1-k0RseVcsuGC81Q%3D%3D&sc=1&os=1-8g%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=225203003676&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=&t=1639739336131&de=670353926057&cu=1639739336131&m=1057&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2667&le=1&lf=0&lg=1&lh=73&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A336%3A336%3A1315%3A297&as=1&ag=1042&an=1042&gi=1&gf=1042&gg=1042&ix=1042&ic=1042&ez=1&ck=1042&kw=845&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1042&bx=1042&ci=1042&jz=845&dj=1&aa=0&ad=938&cn=938&gk=938&gl=938&ik=938&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=845&cd=845&ah=845&am=845&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5029661432%3A2929336068%3A5821501893%3A138370168508&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=300&zMoatH=250&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatSN=d&zMoatSL=mpu-plus-top%3FLL%7CT-1000&zMoatMMV_MAX=na&zMoatSlotId=mpu-plus-top&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=mpu-plus-top&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=4&jm=-1&tz=mpu-plus-top&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=1233320421&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:57 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:57 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=300x250&zMoatPS=top&zMoatSZPS=300x250%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-mix2djWwZ10QbMk%2BqjMratT%2F8IKBUGMSV3C%2FvEJM65hND7UVt69nIRrqyNQFcZFf7egP&rs=1-k0RseVcsuGC81Q%3D%3D&sc=1&os=1-8g%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=225203003676&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=&t=1639739336131&de=670353926057&cu=1639739336131&m=1057&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2667&le=1&lf=0&lg=1&lh=73&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A336%3A336%3A1315%3A297&as=1&ag=1042&an=1042&gi=1&gf=1042&gg=1042&ix=1042&ic=1042&ez=1&ck=1042&kw=845&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1042&bx=1042&ci=1042&jz=845&dj=1&aa=0&ad=938&cn=938&gk=938&gl=938&ik=938&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=845&cd=845&ah=845&am=845&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5029661432%3A2929336068%3A5821501893%3A138370168508&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=300&zMoatH=250&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatSN=d&zMoatSL=mpu-plus-top%3FLL%7CT-1000&zMoatMMV_MAX=na&zMoatSlotId=mpu-plus-top&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=mpu-plus-top&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=4&jm=-1&tz=mpu-plus-top&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=1497666682&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:57 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:57 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 8C94
42 B
64 B
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjstKvZsKnbaRJbQjRb8Nt7Aozz0EF2PVJUgSx_Up3TKo4k0_U2fKfK9WSBV6ybtIy7XudsX_vMxZdlySawQg7GEaQhaWjZs6SiwXv9s6hA6OKDM8Vq__&sig=Cg0ArKJSzLNCBlvt_kD7EAE&id=lidar2&mcvt=1000&p=456,1050,706,1350&mtos=1000,1000,1000,1000,1000&tos=1000,0,0,0,0&v=20211202&bin=7&avms=nio&bs=1600,1200&mc=1&app=0&itpl=19&adk=1139850431&rs=4&la=0&cr=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0%3D&vs=4&r=v&rst=1639739335803&rpt=443&isd=0&lsd=0&met=ie&wmsd=0
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:57 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 8C94
42 B
64 B
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsvxCoDrOsg6YmDMCFqxq5NirB_YrUdg7yC-iCXEfO4Z9w1NbIJMmNTqPZFlzPoVhfJlZXuBsKUI38LumIPXe-IdZeAEUsLvw0g&sig=Cg0ArKJSzGztvyWZbNqREAE&id=lidar2&mcvt=1001&p=0,0,250,300&mtos=1001,1001,1001,1001,1001&tos=1001,0,0,0,0&v=20211202&bin=7&avms=nio&bs=1600,1200&mc=1&app=0&itpl=32&adk=3183303654&rs=6&la=0&cr=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0%3D&vs=4&r=v&rst=1639739335803&rpt=445&wmsd=0
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:57 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=5x5&zMoatPS=nav&zMoatSZPS=5x5%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-mix2djWwZ10QbMk%2BqjMratT%2F8IKBUGMSV3C%2FvEJM65hND7UVt69nIRrqyNQFcZFf7egP&rs=1-k0RseVcsuGC81Q%3D%3D&sc=1&os=1-8g%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=225203003676&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=105&w=1600&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=&t=1639739335608&de=809372111222&cu=1639739335608&m=1675&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2667&le=1&lf=0&lg=1&lh=11&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A336%3A336%3A1315%3A297&as=1&ag=1153&an=77&gi=1&gf=1153&gg=77&ix=1153&ic=1153&ez=1&ck=1153&kw=1029&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1153&bx=77&ci=1153&jz=1029&dj=1&aa=1&ad=1049&cn=0&gn=1&gk=1049&gl=0&ik=1049&co=1049&cp=1029&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1029&cd=154&ah=1029&am=154&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5029899480%3A2942419878%3A5840893800%3A138375198164&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=5&zMoatH=5&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatSN=d&zMoatSL=nav-ad-plus-leader%3FT-1000&zMoatMMV_MAX=na&zMoatSlotId=nav-ad-plus-leader&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=nav-ad-plus-leader&hv=clipcentric&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=4&jm=-1&tz=nav-ad-plus-leader&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=845531724&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:57 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:57 GMT
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=1029&tet=1153&fi=1&apd=1230&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5029899480&L2id=2942419878&L3id=5840893800&L4id=138375198164&S1id=22308610192&S2id=22654085702&ord=1639739335608&r=809372111222&t=iv&os=1&fi2=0&div1=1&ait=0&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=nav&zMoatPT=article&zMoatSL=nav-ad-plus-leader%3FT-1000&moatClientSlicer3=0&bedc=1&q=5&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:57 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:57 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=5x5&zMoatPS=nav&zMoatSZPS=5x5%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-mix2djWwZ10QbMk%2BqjMratT%2F8IKBUGMSV3C%2FvEJM65hND7UVt69nIRrqyNQFcZFf7egP&rs=1-k0RseVcsuGC81Q%3D%3D&sc=1&os=1-8g%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=225203003676&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=105&w=1600&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=&t=1639739335608&de=809372111222&cu=1639739335608&m=1678&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2667&le=1&lf=0&lg=1&lh=11&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A336%3A336%3A1315%3A297&as=1&ag=1153&an=1153&gi=1&gf=1153&gg=1153&ix=1153&ic=1153&ez=1&ck=1153&kw=1029&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1153&bx=1153&ci=1153&jz=1029&dj=1&aa=1&ad=1049&cn=1049&gn=1&gk=1049&gl=1049&ik=1049&co=1049&cp=1029&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1029&cd=1029&ah=1029&am=1029&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5029899480%3A2942419878%3A5840893800%3A138375198164&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=5&zMoatH=5&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatSN=d&zMoatSL=nav-ad-plus-leader%3FT-1000&zMoatMMV_MAX=na&zMoatSlotId=nav-ad-plus-leader&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=nav-ad-plus-leader&hv=clipcentric&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=4&jm=-1&tz=nav-ad-plus-leader&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=375777363&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:57 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:57 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=5x5&zMoatPS=nav&zMoatSZPS=5x5%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-mix2djWwZ10QbMk%2BqjMratT%2F8IKBUGMSV3C%2FvEJM65hND7UVt69nIRrqyNQFcZFf7egP&rs=1-k0RseVcsuGC81Q%3D%3D&sc=1&os=1-8g%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=225203003676&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=105&w=1600&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=&t=1639739335608&de=809372111222&cu=1639739335608&m=1679&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2667&le=1&lf=0&lg=1&lh=11&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A336%3A336%3A1315%3A297&as=1&ag=1153&an=1153&gi=1&gf=1153&gg=1153&ix=1153&ic=1153&ez=1&ck=1153&kw=1029&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1153&bx=1153&ci=1153&jz=1029&dj=1&aa=1&ad=1049&cn=1049&gn=1&gk=1049&gl=1049&ik=1049&co=1049&cp=1029&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1029&cd=1029&ah=1029&am=1029&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5029899480%3A2942419878%3A5840893800%3A138375198164&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=5&zMoatH=5&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatSN=d&zMoatSL=nav-ad-plus-leader%3FT-1000&zMoatMMV_MAX=na&zMoatSlotId=nav-ad-plus-leader&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=nav-ad-plus-leader&hv=clipcentric&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=4&jm=-1&tz=nav-ad-plus-leader&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=1415534795&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:57 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:57 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=1&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=300x250&zMoatPS=top&zMoatSZPS=300x250%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-mix2djWwZ10QbMk%2BqjMratT%2F8IKBUGMSV3C%2FvEJM65hND7UVt69nIRrqyNQFcZFf7egP&rs=1-k0RseVcsuGC81Q%3D%3D&sc=1&os=1-8g%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=225203003676&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=&t=1639739336131&de=670353926057&cu=1639739336131&m=1260&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2667&le=1&lf=0&lg=1&lh=73&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A336%3A336%3A1315%3A297&as=1&ag=1248&an=1042&gi=1&gf=1248&gg=1042&ix=1248&ic=1248&ez=1&ck=1042&kw=845&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1248&bx=1042&ci=1042&jz=845&dj=1&aa=1&ad=1144&cn=938&gn=1&gk=1144&gl=938&ik=1144&co=1144&cp=1046&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1046&cd=845&ah=1046&am=845&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5029661432%3A2929336068%3A5821501893%3A138370168508&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=300&zMoatH=250&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatSN=d&zMoatSL=mpu-plus-top%3FLL%7CT-1000&zMoatMMV_MAX=na&zMoatSlotId=mpu-plus-top&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=mpu-plus-top&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=5&jm=-1&tz=mpu-plus-top&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=870725401&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:08:57 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:08:57 GMT
video.high.mp4
tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=1910/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogres... Frame E29D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=1910/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogress_1:video%20auto/!https://clipcentric-a.akamaihd.net/video/F=1317287/V=ad_800x450_w1220_ch0/T=1638966209/S=ZR41Wf5d/video.high.mp4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:57 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
event.png
tpsc-ue1.doubleverify.com/ Frame 4D65
0
254 B
Ping
General
Full URL
https://tpsc-ue1.doubleverify.com/event.png?impid=a060e808dc59476baa2e64b592d9e175&gdpr=&gdpr_consent=&vdur=187&eoid=8&msrjs=1950&nav_pltfrm=Linux%20x86_64&sdf=2&vit=2&isvelg=1&tltms=76&tetms=12&msltms=27&vltms=187&sei=290&vetms=33&engms=1&engisel=1&ttfurm=2272&mpt=1639739338642281
Requested by
Host: cdn.doubleverify.com
URL: https://cdn.doubleverify.com/dv-measurements1950.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
34.117.228.201 Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
201.228.117.34.bc.googleusercontent.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Access-Control-Allow-Origin
https://www.zdnet.com
Pragma
no-cache
Date
Fri, 17 Dec 2021 11:08:58 GMT
Cache-Control
max-age=0
Access-Control-Allow-Credentials
true
Connection
keep-alive
Expires
12/16/2021 11:08:58
video.high.mp4
tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=3409/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogres... Frame E29D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=3409/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogress_2:video%20auto/!https://clipcentric-a.akamaihd.net/video/F=1317287/V=ad_800x450_w1220_ch0/T=1638966209/S=ZR41Wf5d/video.high.mp4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:59 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
event.png
tpsc-ue1.doubleverify.com/ Frame 4D65
0
254 B
Ping
General
Full URL
https://tpsc-ue1.doubleverify.com/event.png?impid=a060e808dc59476baa2e64b592d9e175&gdpr=&gdpr_consent=&msrcanlm=394&msrcannum=4&eoid=10&ismms=68&isumms=67&isvelg=1&nvr=6&elmtp=3&isbxdms=2367&b11=2441&adhgt=250&adwdth=300&norwdth=300&norhgt=250&engisel=1&vsos=4&dvp_vsosnmr=16&dvp_mvpw=device-width&dvp_mvpiss=0&lftb=2441&sftb=2441&msrdp=5&naral=2&vct=1&vphgt=1200&vpwdth=1600&chgt=250&cwdth=300&invcs=false&scrhgt=1200&scrwdth=1600&strp=100&advisonl=true&isiabvms=967&isuiabvms=967&ispmxpms=967&iscvmvms=1967&engalms=67&dvp_hdnAd=0&dvp_dpr=1&mpt=1639739339641906
Requested by
Host: cdn.doubleverify.com
URL: https://cdn.doubleverify.com/dv-measurements1950.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
34.117.228.201 Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
201.228.117.34.bc.googleusercontent.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Access-Control-Allow-Origin
https://www.zdnet.com
Pragma
no-cache
Date
Fri, 17 Dec 2021 11:08:59 GMT
Cache-Control
max-age=0
Access-Control-Allow-Credentials
true
Connection
keep-alive
Expires
12/16/2021 11:08:59
video.high.mp4
tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=4110/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogres... Frame E29D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=4110/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogress_2p5:video%20auto/!https://clipcentric-a.akamaihd.net/video/F=1317287/V=ad_800x450_w1220_ch0/T=1638966209/S=ZR41Wf5d/video.high.mp4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:59 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
video.high.mp4
tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=4909/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogres... Frame E29D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.361663.1639739335689/U=www.zdnet.com/T=4909/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogress_3:video%20auto/!https://clipcentric-a.akamaihd.net/video/F=1317287/V=ad_800x450_w1220_ch0/T=1638966209/S=ZR41Wf5d/video.high.mp4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:09:00 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
dt
dt.adsafeprotected.com/
43 B
215 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?advEntityId=903347&asId=cacd4a8a-3130-cc67-ef57-62bc1f683105&tv=%7Bc:x3enWp,pingTime:5,time:5216,type:p,clog:%5B%7Bpiv:100,vs:i,r:,w:1600,h:105,t:195%7D%5D,es:0,sc:1,ha:1,fif:0,gmnp:0,for:1,b11:1,cnod:1,gm:0,slTimes:%7Bi:5216,o:0,n:0,pp:0,pm:0%7D,slEvents:%5B%7Bsl:i,t:195,wc:0.0.1600.1200,ac:0.0.1600.105,am:i,cc:0.0.1600.105,piv:100,obst:0,th:0,reas:,bkn:%7Bpiv:%5B5033~100%5D,as:%5B5033~1600.105%5D%7D%7D%5D,slEventCount:1,em:true,fr:true,e:,tt:rjss,dtt:103,fm:sRQD997+11%7C12%7C13%7C14%7C15*.903347-59128494%7C151%7C152%7C153%7C154%7C155%7C156%7C16%7C17%7C18%7C19,idMap:15*,rmeas:1,rend:1,renddet:IMG.qs%7D&br=u
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
107.21.138.34 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-107-21-138-34.compute-1.amazonaws.com
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:09:01 GMT
x-server-name
dt10.va.303net.net
p3p
CP="COM NAV INT STA NID OUR IND NOI"
cache-control
no-cache
content-type
image/gif
content-length
43
server
nginx
dt
dt.adsafeprotected.com/
43 B
215 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?advEntityId=903347&asId=cacd4a8a-3130-cc67-ef57-62bc1f683105&tv=%7Bc:x3enWp,pingTime:5,time:5216,type:pf,clog:%5B%7Bpiv:100,vs:i,r:,w:1600,h:105,t:195%7D%5D,es:0,sc:1,ha:1,fif:0,gmnp:0,for:1,b11:1,cnod:1,gm:0,slTimes:%7Bi:5216,o:0,n:0,pp:0,pm:0%7D,slEvents:%5B%7Bsl:i,t:195,wc:0.0.1600.1200,ac:0.0.1600.105,am:i,cc:0.0.1600.105,piv:100,obst:0,th:0,reas:,bkn:%7Bpiv:%5B5034~100%5D,as:%5B5034~1600.105%5D%7D%7D%5D,slEventCount:1,em:true,fr:true,e:,tt:rjss,dtt:103,fm:sRQD997+11%7C12%7C13%7C14%7C15*.903347-59128494%7C151%7C152%7C153%7C154%7C155%7C156%7C16%7C17%7C18%7C19,idMap:15*,rmeas:1,rend:1,renddet:IMG.qs%7D&br=u
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
107.21.138.34 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-107-21-138-34.compute-1.amazonaws.com
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:09:01 GMT
x-server-name
dt12.va.303net.net
p3p
CP="COM NAV INT STA NID OUR IND NOI"
cache-control
no-cache
content-type
image/gif
content-length
43
server
nginx
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=300x250&zMoatPS=top&zMoatSZPS=300x250%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-mix2djWwZ10QbMk%2BqjMratT%2F8IKBUGMSV3C%2FvEJM65hND7UVt69nIRrqyNQFcZFf7egP&rs=1-k0RseVcsuGC81Q%3D%3D&sc=1&os=1-8g%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=225203003676&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=&t=1639739336131&de=670353926057&cu=1639739336131&m=5087&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2667&le=1&lf=0&lg=1&lh=73&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A336%3A336%3A1315%3A297&as=1&ag=5075&an=1248&gi=1&gf=5075&gg=1248&ix=5075&ic=5075&ez=1&ck=1042&kw=845&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5075&bx=1248&ci=1042&jz=845&dj=1&aa=1&ad=4971&cn=1144&gn=1&gk=4971&gl=1144&ik=4971&co=1144&cp=1046&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4878&cd=1046&ah=4878&am=1046&xd=00&rf=0&re=0&wb=2&cl=0&at=0&d=5029661432%3A2929336068%3A5821501893%3A138370168508&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=300&zMoatH=250&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatSN=d&zMoatSL=mpu-plus-top%3FLL%7CT-1000&zMoatMMV_MAX=na&zMoatSlotId=mpu-plus-top&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=mpu-plus-top&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=5&jm=-1&tz=mpu-plus-top&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=1998617726&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:09:01 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:09:01 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=5x5&zMoatPS=nav&zMoatSZPS=5x5%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-mix2djWwZ10QbMk%2BqjMratT%2F8IKBUGMSV3C%2FvEJM65hND7UVt69nIRrqyNQFcZFf7egP&rs=1-k0RseVcsuGC81Q%3D%3D&sc=1&os=1-8g%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=225203003676&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=105&w=1600&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=&t=1639739335608&de=809372111222&cu=1639739335608&m=5705&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2667&le=1&lf=0&lg=1&lh=11&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A336%3A336%3A1315%3A297&as=1&ag=5183&an=1153&gi=1&gf=5183&gg=1153&ix=5183&ic=5183&ez=1&ck=1153&kw=1029&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5183&bx=1153&ci=1153&jz=1029&dj=1&aa=1&ad=5079&cn=1049&gn=1&gk=5079&gl=1049&ik=5079&co=1049&cp=1029&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5058&cd=1029&ah=5058&am=1029&xd=00&rf=0&re=0&wb=2&cl=0&at=0&d=5029899480%3A2942419878%3A5840893800%3A138375198164&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=5&zMoatH=5&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatSN=d&zMoatSL=nav-ad-plus-leader%3FT-1000&zMoatMMV_MAX=na&zMoatSlotId=nav-ad-plus-leader&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=nav-ad-plus-leader&hv=clipcentric&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=5&jm=-1&tz=nav-ad-plus-leader&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=703354510&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:09:01 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:09:01 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=technology&zMoatAdUnit3=security&wf=1&ra=3&pxm=&sgs=3&vb=6&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-mix2djWwZ10QbMk%2BqjMratT%2F8IKBUGMSV3C%2FvEJM65hND7UVt69nIRrqyNQFcZFf7egP&rs=1-k0RseVcsuGC81Q%3D%3D&sc=1&os=1-8g%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=225203003676&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=11&zMoatpos=middle&zMoatvguid=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatptype=article&zMoatsl=mpu-middle%3FLL%7CT-1000&g=1&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&h=250&w=300&rm=1&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=&t=1639739335132&de=799972505069&cu=1639739335132&m=6250&ar=8ab009d7785-clean&iw=04a0275&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2667&le=1&lf=118&lg=1&lh=20&ch=0&vv=1&vw=1%3A0%3A0&vp=0&vx=0%3A-%3A-&pe=1%3A336%3A336%3A1315%3A297&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&aj=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&dj=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5098&cd=11&ah=5098&am=11&xd=00&rf=0&re=1&wb=1&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&jk=3&jm=-1&tc=0&fs=195979&na=395936540&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:09:01 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:09:01 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=5x5&zMoatPS=nav&zMoatSZPS=5x5%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-mix2djWwZ10QbMk%2BqjMratT%2F8IKBUGMSV3C%2FvEJM65hND7UVt69nIRrqyNQFcZFf7egP&rs=1-k0RseVcsuGC81Q%3D%3D&sc=1&os=1-8g%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=225203003676&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=105&w=1600&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=&t=1639739335608&de=809372111222&cu=1639739335608&m=5914&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2667&le=1&lf=0&lg=1&lh=11&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A336%3A336%3A1315%3A297&as=1&ag=5392&an=5183&gi=1&gf=5392&gg=5183&ix=5392&ic=5392&ez=1&ck=1153&kw=1029&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5392&bx=5183&ci=1153&jz=1029&dj=1&aa=1&ad=5288&cn=5079&gn=1&gk=5288&gl=5079&ik=5288&co=1049&cp=1029&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5260&cd=5058&ah=5260&am=5058&xd=00&rf=0&re=0&wb=2&cl=0&at=0&d=5029899480%3A2942419878%3A5840893800%3A138375198164&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=5&zMoatH=5&zMoatVGUID=1f8fc507-22e1-4084-b232-490f1c9ac87e&zMoatSN=d&zMoatSL=nav-ad-plus-leader%3FT-1000&zMoatMMV_MAX=na&zMoatSlotId=nav-ad-plus-leader&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=nav-ad-plus-leader&hv=clipcentric&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=5&jm=-1&tz=nav-ad-plus-leader&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=1948125641&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:09:01 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:09:01 GMT

Verdicts & Comments Add Verdict or Comment

137 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| 1 object| 2 object| 3 object| 4 object| 5 object| 6 object| 7 object| NREUM object| newrelic function| __nr_require object| cbsoptanon object| soastaTracking object| ZdnetPageVars string| chsn_post_id string| chsn_pageType object| ZdnetFunctions number| BOOMR_lstart object| _sf_async_config number| _sf_startpt object| _cbq object| knownServiceWorkers object| BidBarrel function| uuidv4 object| webVitals string| _cbsotstate function| UUIDv4 string| __tealium_data_guid object| utag_data string| key function| loadMyFinance object| OneTrustStub string| OnetrustActiveGroups string| OptanonActiveGroups object| dataLayer function| requirejs function| require function| define object| BOOMR object| BOOMR_mq function| jsonFeed object| regeneratorRuntime object| mf function| iFrameResize string| MYFI_SCRIPT_FOLDER function| initializeMyFinance function| requestMyFinanceAds function| initializeInline function| requestInlineAds boolean| MF_OVERWRITE_CONTAINER object| MF_DEBUG_URL object| mfEmbed boolean| mfInitialized string| _mfuuid_ function| $ function| jQuery object| Modernizr string| chsn_ad_id object| otStubData number| _sf_endpt object| CryptoJS object| mPulseApp object| Optanon object| OneTrust object| core object| pbjs object| _pbjsGlobals object| adFlow object| googletag object| confiant number| BOOMR_configt object| _bmrEvents object| _Cohesion object| _Preamp object| _Fuse object| _Tagular function| cohesion function| preamp function| fuse function| tagular object| adsbygoogle undefined| easyXDM object| AudEng object| URS object| ggeac object| google_js_reporting_queue object| __Cohesion object| _Taggy object| _Monarch function| monarch object| viacbs_at function| blankAdCallback function| CbsMoatListener function| moatYieldReady function| setMoatPrebidData function| Waypoint object| debug object| jQuery1830912862488832189 undefined| google_measure_js_timing object| googleToken object| googleIMState function| processGoogleToken number| google_unique_id object| gaGlobal undefined| ct undefined| et undefined| hourElapsed undefined| msg undefined| pixelDomain undefined| isDomless undefined| documentReferrer undefined| isBeta undefined| viewHash undefined| tagType undefined| pxSrc undefined| moat_px object| Moat#G26 object| MoatSuperV26 object| MoatNadoAllJsonpRequest_72994312 object| Moat#PML#26#1.2 boolean| Moat#EVA object| DOMlessLLDcallback_72994312 object| MoatDataJsonpRequest_72994312 object| moatPrebidApi function| confiantDfpWrap number| BOOMR_onload object| $tealium boolean| searchOpen string| pageType string| waypointContextKey object| GoogleGcLKhOms boolean| isPxlSent object| ampInaboxPositionObserver object| ampInaboxFrameOverlayManager object| goog_ddm_ps string| keyName object| google_image_requests

29 Cookies

Domain/Path Name / Value
www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor Name: pv
Value: 1
www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor Name: zdnet_ad
Value: %7B%22type%22%3A%22gpt%22%2C%22region%22%3A%22aw%22%2C%22subses%22%3A%226%22%2C%22session%22%3A%22d%22%7D
.zdnet.com/ Name: nemo_highlander
Value: seamless:1:b
.zdnet.com/ Name: fly_geo
Value: {"countryCode": "de"}
.zdnet.com/ Name: fly_device
Value: desktop
.zdnet.com/ Name: fly_preferred_edition
Value: eu
.zdnet.com/ Name: fly_default_edition
Value: eu
www.zdnet.com/ Name: _mfuuid_
Value: 05327df2-fab0-4911-ad6f-297c82bcc0f6
.zdnet.com/ Name: OptanonConsent
Value: isIABGlobal=false&datestamp=Fri+Dec+17+2021+11%3A08%3A54+GMT%2B0000+(GMT)&version=6.20.0&hosts=&consentId=44b3b373-ccf4-4e58-a910-bf721d8dd152&interactionCount=0&landingPath=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68&groups=C0001%3A1%2CC0002%3A0%2CC0003%3A0%2CC0004%3A0
.www.zdnet.com/ Name: chsn_cnsnt
Value: tglr_ref%2Ctglr_req%2Ctglr_sess_id%2Ctglr_sess_count%2Ctglr_anon_id%2Ctglr_tenant_id%2Ctglr_virtual_ref%2Ctglr_transit_id%2Cchsn_dcsn_cache%2Cpmpdid%2Cpmpredirected%2Cpmpredir%2Cfuseid%2Ccohsn_xs_id%2Cchsn_auth_id%2ChashID%2CetagID%2CreinforcedID%2ChttpOnlyID%2CfpID%2CflID%2Ctglr_smpl%2Ctglr_reinforce%2Ctglr_gpc_sess_id%2Ctglr_hash_id
.www.zdnet.com/ Name: tglr_tenant_id
Value: src_1kYsAcdpfzbZ8UlNLYht1RPg3m2
.www.zdnet.com/ Name: tglr_transit_id
Value: a68f00af-3d51-48eb-955a-5f24938a2391
.www.zdnet.com/ Name: tglr_sess_id
Value: f301fd30-f2cb-460f-9adf-2060ec1e5d77
.www.zdnet.com/ Name: tglr_sess_count
Value: 1
.www.zdnet.com/ Name: tglr_req
Value: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/#ftag=RSSbaffb68
.www.zdnet.com/ Name: tglr_ref
Value:
.www.zdnet.com/ Name: tglr_anon_id
Value: e2ed60ec-e9ee-459f-a492-476fa16be9d8
.zdnet.com/ Name: arrowImp
Value: true
.zdnet.com/ Name: arrowImpCnt
Value: 1
.zdnet.com/ Name: zdnetSessionStarted
Value: true
.zdnet.com/ Name: zdnetSessionCount
Value: 1
.cohesionapps.com/ Name: cohsn_xs_id
Value: c5a2c465-f120-4084-bd90-dcdd07209483
.www.zdnet.com/ Name: cohsn_xs_id
Value: c5a2c465-f120-4084-bd90-dcdd07209483
.doubleclick.net/ Name: IDE
Value: AHWqTUnp_H2G-RfgAaxLIbEHfRogjRaI6GflsIRWvrSkk8OdJqIjsrg_svBFNo6GrOA
www.zdnet.com/ Name: viewGuid
Value: 1f8fc507-22e1-4084-b232-490f1c9ac87e
.nr-data.net/ Name: JSESSIONID
Value: 3b0b44161e3898f6
.zdnet.com/ Name: RT
Value: "z=1&dm=zdnet.com&si=589b107a-fa9f-4154-8b86-5e6c7bd379c1&ss=kxaagnnt&sl=1&tt=10k&bcn=%2F%2F02179917.akstat.io%2F&ld=1ay"
.zdnet.com/ Name: __gads
Value: ID=7b98c9ef6d366164-22a96c520acd0078:T=1639739335:S=ALNI_MZntSFbOFu3qRvqLH1RfX3dL27wVw
.doubleclick.net/ Name: DSID
Value: NO_DATA

1 Console Messages

Source Level URL
Text
other warning URL: https://cdn.ampproject.org/rtv/012111011823000/v0/amp-ad-exit-0.1.mjs(Line 2)
Message:
Unrecognized feature: 'attribution-reporting'.

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

02179917.akstat.io
4357ee97dce36347f7ec16a6fa3ba201.safeframe.googlesyndication.com
684dd311.akstat.io
a.myfidevs.io
ad.clipcentric.com
ad.doubleclick.net
adservice.google.com
adservice.google.de
at.adtech.redventures.io
bam-cell.nr-data.net
c.go-mpulse.net
cdn.ampproject.org
cdn.cohesionapps.com
cdn.cookielaw.org
cdn.doubleverify.com
clipcentric-a.akamaihd.net
confiant-integrations.global.ssl.fastly.net
dt.adsafeprotected.com
geo.moatads.com
geolocation.onetrust.com
googleads.g.doubleclick.net
googleads4.g.doubleclick.net
ingest.make.rvapps.io
js-agent.newrelic.com
mb.moatads.com
pagead2.googlesyndication.com
pixel.adsafeprotected.com
protected-by.clarium.io
px.moatads.com
redventuresgamdisplay60805146916.s.moatpixel.com
redventuresgamheader644747280705.s.moatpixel.com
s0.2mdn.net
securepubads.g.doubleclick.net
static.adsafeprotected.com
static.myfinance.com
taggy.cohesionapps.com
tpc.googlesyndication.com
tps.doubleverify.com
tpsc-ue1.doubleverify.com
tr.clipcentric.com
urs.zdnet.com
www.google.com
www.googletagservices.com
www.myfinance.com
www.zdnet.com
z.moatads.com
107.21.138.34
13.32.121.115
142.250.184.230
142.250.185.162
142.250.185.66
151.101.129.194
151.101.130.154
151.101.66.137
162.247.243.146
18.159.156.184
18.66.139.25
2.16.107.33
2.18.235.40
2600:9000:223f:e800:8:48e:53c0:93a1
2606:4700:10::6814:b944
2606:4700:3037::6815:2b8a
2606:4700::6810:9540
2a00:1450:4001:808::2001
2a00:1450:4001:809::2002
2a00:1450:4001:80e::2002
2a00:1450:4001:80f::2001
2a00:1450:4001:80f::2002
2a00:1450:4001:812::2006
2a00:1450:4001:827::2002
2a00:1450:4001:829::2002
2a00:1450:4001:82f::2001
2a00:1450:4001:82f::2004
2a02:26f0:6c00:1bb::11a6
2a02:26f0:6c00:287::11a6
2a02:26f0:6c00:2b2::4469
2a02:26f0:6c00:2b9::11a6
2a04:4e42:4c::666
3.11.215.107
34.117.228.201
34.120.203.121
52.202.128.45
52.5.105.31
52.6.9.44
52.73.158.59
54.154.149.33
00b3b0b438a1a3e7f01112f487ffb01e64db47935eb0e1e2927bdb4811ee935f
022185811a029208da14948f296e29ce3ebb9aa90dfaf6a14570245e89a80165
037b12d07ffce84bbca6821a50f249c54429b20c0f2fd67469a0bb5937113051
06c00948dd5d4c3109c9e00bb6c44938e1251feae65e2b7c2591f333ab230d9b
09ebd7f407439990aac227e70da23e1a819e8e30282928e324370805f480bec4
0aee86f10613d80ea0542d89047ea3467747db993379daeb592178ebf943b534
0c2898711aa44688968b5769b7ca3a50be196c4897657ab6ce34f215b07f455d
0c9cf152a0ad00d4f102c93c613c104914be5517ac8f8e0831727f8bfbe8b300
127672d4912f86d7cbdeab0c1ccd9536aa33f335a7b1609d3a3939c1d778220e
127ab3ff6d14112ae6aa40b68d9d3144748eda08efbc60a48a5be0555cf8622b
13631760fe58e5e9c2cf16890b9869a78629cb3769f552fb3b0eaf3fba8e934e
1459c6042d3a4b6d2821ac4ece860f9d59da13560a0d0179c5b46c72a26e97e7
1907478e8fa62801a1db26be87cab0755288131c9c8e80320582e560825df3cc
1a703d617fb31d56238372d5bf78e9861b3a09b7447a0184bd5f1c178461ed12
21c9c7889404394d4e4c780022b56b5fa39e83b19c34eb0508561a115a1dcc6a
233bc983d773cb9a38ca251753bd43f9a2288279fab44598b49c433b32f6d285
245fa809aa43b27d3fe006d71779fe9ddbb79e0d1a566345f3bc480cb59cbe50
295c66c14524b77dd1271317457dec037b5ef0943da346b9b73681e54da826e0
2b526196d510bc11f40effba13f1b9e1792120b1f40b453695e8d7dcc05cf38d
2d5ae5a515a688823dc98d032242c2ed6f490a74c4281bdd599567898f9fa675
2ea6cb8d44b18ddc26d8d83cbb898b780beeebe9d7529fceb1ac1824a397cff4
309c7f77b36ad8f0ecb6278afb0cf7bf91f525b2053ab757246a07e2879fe32d
36133ca07927c88a7cc578fddbaed3c668ab75087834d0ca13dca5de4ec856c1
37fd678267f750eb697a18b5b90bcdfbdc37b38e7796176d1f759d00c2e83550
39ff0a646d7651b781f9d92a1f394fa294cc1d1af938ad005850aedd79b6095b
3ce4399c5078ca5cea592b3eaf5eadeb4e8e0ca168468bb5ceb3122bc83a6bbd
3d76ab4ac854cafef51bbbb5177ea75816df90e3c775294991a016404f2b6bb5
3e279129e0b32c21501807eddb0c582841a0536e6dac62169361c51d5a9baed1
40a3d46590200a193c0556b55b04e888bc2399faa60ffc3aa95e83cda8981601
43fdf898c76171d1b5af752978ebeb6ed248bc677d0b1dfb204b7ae95658cd99
4d2a74d8b25e1ccd4b1294b0b937804bc24aeea7f46edad3f3c1f91604d2708c
5056305b09ad6474ea540f796c79be51d6b8e96043cb3d7bc4ef774e56765f4f
55a119c0394f901a8a297e109c17b5e5402689708b999ab10691c16179f32a4a
5b6e97cf069d0d1a67390ad12ef50237963c77addfd1c8f15399b916993dd143
5eba8784b6c95dd54fc2886b4ff696c22ab9c7bbb0da0ffa1dfcd22cf2ace66a
6044611fe31b4f58f790c0597b05a079cb25af2e2ded652e4c721a89d840c3d3
61c32059a5e94075a7ecff678b33907966fc9cfa384daa01aa057f872da14dbb
63c93c795a3c8799f217f3502e7a808ac3861f8b159efc3ea7fe575c14644892
651a0ae622d8a5e8707d74229c577a5d503ddae683dcb8c94eb84b4c9a5fc4fb
65f6185cfe1cf88fa7981160dd6fa443e111887215b72953718ea70f8e2ba9f2
67629a3544e550eca761d489db333c2960fa02697760be52c1ddf83f38123cf2
69539b5b3777cffda28a66d7f2aa9b17c91ee1ec8fd50c00c442af91753a60f7
6a03abd718f55a7bff3dedfe64a13a126f185dc797dee1d7caf62ac66815ccf4
6c0cd7b80611259d4ccce9165e8b5dd062aad43e3e3e19a404fe967c49795d03
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
6d5246d5f81b078b8d850b3fbe4ac7c44d05c0755ea14786c6fee453e6805fff
719e143500cd32657bcbd6624b29594351cb5488ec7038216fb46ec1c664b347
72562f00bd821b6edc0368065bf009468955ba01f8ead742d8bbc2470c4358c4
7258294c5ecbbd9c810da4970dbd342984aeef3bfdfefafda82192120aa88f4e
726ac30cdf2554e4383bef5c9dc56000841d693f7ba39d43705fde8a98782643
762efb8a7c6a14d8228a51bcaed3410b43bb0848d4ccf4450bdf01d380f7cb14
77ae4fb56d2da594993ef6f0203c0cef103af28f7e4c5e0ac045909137422cf9
7b4f05cfd0cd8e216e445b5aec5e9f06573c18cb7adbc0cd785f3a4af3df7cf2
7e91278e50f67b763fdba4fee2eb51877a8579675b8614de95b103bf970a1e11
7fa1c7b1686f9f116183456c39f7b3ed9cce063cfb428e575fe4a29ae05c4fa6
7fd59024b6ca83f11f7a3448ec148309a13b705725716df134f699e60a96eb1b
80564ff963220266c89e284ae65634312da063d0ea5ee747527fd38e8c398d96
80da370ad41bee2716b42d1583e139eac39f5c7c243c5fe6439b9754013116c6
81bcd7a6372e5ca7f7d12382fe1787bd4635eede42b3a79da6937c6d2354ed8b
82490fce0cb34fbe536a23f9c4b2e217a5b00279d139cbf2c6aa48e748cbe368
82f947d14a0a198dfe3cec2fde7896f6e332eb798cc193dad8da9ed2225277cd
83575e34525331ea577205e94ffcb89cb9bb5cbb6e9f1c852dacaf941276de5b
87f7f86b17eacf56e623a69be05e5f5487470d6b30347efe12742aefa3f5af48
88343b81dd1c646160dcf8856b77f8d7e12334fa17a9ae39c1a6958b134a1b25
8884ad54b3b16ad4e66af3377c4b475899c1c70807bb0bc3eca9227a0b09444b
88b8a3cb9df436d6910440c58428516accee080be4fa556d3cf10ec6905cf1b9
95698b6af45a720fa13415398e77c20504c6ae8bf75e3a462e5aa1f67bc42b11
95783bf43b78701a92daf5ec7268db97c7144599c774821126b8cc5396724bfa
98ba8f881333898d751dabe4f8b4cacc4489a9f5b6b4fd1fc67c571dbfec95cf
9a630b852e94f20cb8140704fd830bf40bfea0a2effaa67d06a0eadafbf3d508
9b7909cb9edd007095b41a13617b66208e4210fff9c5e411a7db116efefc8e71
9db8a678d1681c1c4a3f15e1769c3f54d96f126db4a7b00cea65127c820a7763
9e97fc43ecd2f16948c3a8d2de65e0e5483db4ed5ab174058c178ca1c8665d0b
9f77135f04c4da1b12859455c051cb85c363a0fbef82fe3c6ea8f17b0c77d62f
a0a97a5a7dc2b30e9a76ff211332f36d435293c19ed91ca1ad6a66adc1dc50cd
a2db3edd49291c72d04a8754b195e23a12019a1af6dc9575a2e269b3c0231f01
a441459efd47b55ab98db29f9ea9367cfb09d5b7c7ad648df43d9d347cb73344
a4a1824defec1084ca81d496ee77891684c26196924bdc4fc21dd3482ce15e14
a5012e7c817cdba2b187c0eb16a5a08e6506350566fda24411c3686e564203a3
a65474aec3d05036fdc95a4459d85f1543f464934698df8e4a9d1bca61a0500c
a70d5b9ad136255942779acf94da5cc72316fde5c10c5e7707d6f1888f43dcb8
a73730123a43c3040d889aaee11ec35094277ce5f778076b262c23a293870adb
ad91cf29023e658fd9297ec5dddb4da37187671202ad3b140b5be708b3412372
afac3a301d848688d0748228296ec7ae26369f67c2df29f3f480ef3ab0bc6ef9
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b
ba5c9b5823ef1377da70e73357b85ef2dca7ade9afe70c93d0aa163c61c9bf03
bdeed1e1c0751610c8f3dc2a5c78c93f841c366b36a7f7a54f5e6752c2656c05
c45a7b49c14477cd160a83d4ee1fb8c311e12314e042d0647c68bec62f16fe29
c50d5d10df377bd960648973b53891bfcaf48f457503eed023ad2c29f28e49b2
c83de3876b70820a0a835648010dc49a5600d6c3dd65f1a1e19ff44d33663083
c98713a27c661e04f9aecf37a7794088451f73bab4b9bb615ed29ff5a5fd75e1
c9cd6877788a30a545123c4e0872f87c4d2193b31e5e8d140da067b53209e682
cc666b7ed486227d9ccda81846900b8f84b2c642925955a7d45bda1a22f3dd06
ccd7a7e0ecd791d87287f7ebb4f4c3e6fcb0ca72996ee874fc2755b15fb187ef
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda
d32763388ba6d9bba0619b8912021d30345002aa0d5dcba3ce01a05da23f72db
d3a852d66b3cdf44897bc05f6df700f752810cc9b9321a9fdd11d0bdd2d570d2
dac715f087720dd7ff7067f5d2ec1988851fa93140ae8a9cbfaa15659dd7fd82
ddd1a971a6a2f3499fc3cf22e31d9ccf237356291ddba27cccc397583d081f47
dfd272053c730cd470302af475eb401d9be41c81f0081c20d7910f6c12732c9d
dff8be69b697ed33ee88dedfe5ef0572cada0fc02bba5a061562031afa90d066
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e571945dec453fbc4c8177ad3af3f176dc562cf51fe40a10529b69e0b2b1e577
e9cac3eeba1fc86e06fdc013a4c52742e9b4bd14b7be6517321127d4515095ce
ea7373d7059ab32d4304249b48a91311f91d2dce5e1ebf10450f33f9a8c5f5ec
eaf765d314b24473895a9ece61135d31023528c3b65129051b2c5a471d780604
ebfe453394ff1be6ef75d380ab7c5535aea0b51832d045f0d5d0ef7e6535969c
ec3300dff5a35315ea608c5dc57e965957897133eb6a543533566d6e2c35ed07
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
ef5d99b2bc220f2b2bae0fc4a428a1523101e1832521f32cfe88f17eb279a837
f3be6ad457ba5d4425f4d105688e9cf5a32595ff156bd290c8ccbe0e6ca3a68a
f3e2e0f12c5badfe408d69bf6c0fa9ce6247f9a45c849851a53b8647637cfcd0
f6a1d1301a41d925a220c3cac7f9d927356bff1c809259b16601325663de156d
fb7a86f12d2f0ac2f4111c147415ab30f9c7d84c5e15faba3875fce7ce590127
fb83615340db35569e782b4dffde2a5f730375b00b089fb8f759eea99c5a751c
ff2ae991ac0efdb5ae8b4428ba8555a0aeb0fd94b8014ce290c484242c524097