URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Submission: On May 21 via api from US

Summary

This website contacted 64 IPs in 8 countries across 42 domains to perform 238 HTTP transactions. The main IP is 151.101.14.194, located in Frankfurt am Main, Germany and belongs to FASTLY, US. The main domain is www.wired.com.
TLS certificate: Issued by GlobalSign CloudSSL CA - SHA256 - G3 on April 20th 2020. Valid for: a year.
This is the only time www.wired.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
22 151.101.14.194 54113 (FASTLY)
9 2606:2800:233... 15133 (EDGECAST)
21 172.217.22.66 15169 (GOOGLE)
7 72.247.226.64 16625 (AKAMAI-AS)
3 52.222.153.170 16509 (AMAZON-02)
6 72.247.225.98 16625 (AKAMAI-AS)
1 2a00:1450:400... 15169 (GOOGLE)
5 2a00:1450:400... 15169 (GOOGLE)
9 151.101.112.239 54113 (FASTLY)
1 52.222.157.230 16509 (AMAZON-02)
2 2606:4700::68... 13335 (CLOUDFLAR...)
1 52.216.171.171 16509 (AMAZON-02)
1 52.19.1.241 16509 (AMAZON-02)
1 2606:4700:10:... 13335 (CLOUDFLAR...)
3 2606:4700::68... 13335 (CLOUDFLAR...)
2 2a00:1450:400... 15169 (GOOGLE)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 3.11.4.3 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 52.222.153.129 16509 (AMAZON-02)
2 192.229.233.25 15133 (EDGECAST)
2 52.222.149.47 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
2 34.231.184.25 14618 (AMAZON-AES)
1 151.101.12.239 54113 (FASTLY)
1 2a00:1450:400... 15169 (GOOGLE)
6 2a00:1450:400... 15169 (GOOGLE)
1 34.200.125.126 14618 (AMAZON-AES)
2 52.86.193.219 14618 (AMAZON-AES)
33 34.238.88.188 14618 (AMAZON-AES)
1 8 2a00:1450:400... 15169 (GOOGLE)
1 52.222.148.222 16509 (AMAZON-02)
1 151.139.128.11 20446 (HIGHWINDS3)
13 2a00:1450:400... 15169 (GOOGLE)
4 69.173.144.143 26667 (RUBICONPR...)
2 37.252.173.62 29990 (ASN-APPNEX)
4 8 2606:2800:233... 15133 (EDGECAST)
2 6 34.95.120.147 15169 (GOOGLE)
2 72.247.224.27 16625 (AKAMAI-AS)
2 178.250.2.152 44788 (ASN-CRITE...)
3 2a00:1450:400... 15169 (GOOGLE)
4 52.222.157.237 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
1 72.21.195.65 16509 (AMAZON-02)
2 35.201.67.47 15169 (GOOGLE)
2 35.190.91.160 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a03:2880:f01... 32934 (FACEBOOK)
3 52.222.157.216 16509 (AMAZON-02)
1 2 35.190.59.101 15169 (GOOGLE)
2 2a02:2638::3 44788 (ASN-CRITE...)
2 3 2a00:1450:400... 15169 (GOOGLE)
5 52.222.149.174 16509 (AMAZON-02)
2 2 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 35.190.40.172 15169 (GOOGLE)
2 52.49.73.64 16509 (AMAZON-02)
1 35.244.174.68 15169 (GOOGLE)
3 52.0.16.6 14618 (AMAZON-AES)
1 172.217.16.130 15169 (GOOGLE)
2 72.247.225.17 16625 (AKAMAI-AS)
1 104.111.230.142 16625 (AKAMAI-AS)
238 64
Apex Domain
Subdomains
Transfer
42 condenastdigital.com
pixel.condenastdigital.com
infinityid.condenastdigital.com
4d.condenastdigital.com
capture.condenastdigital.com
wren.condenastdigital.com
24 KB
29 wired.com
www.wired.com
media.wired.com
3 MB
24 doubleclick.net
securepubads.g.doubleclick.net
stats.g.doubleclick.net
pubads.g.doubleclick.net
506 KB
16 google.com
apis.google.com
news.google.com
pay.google.com
payments.google.com
clients2.google.com
adservice.google.com
ampcid.google.com
www.google.com
75 KB
13 googlesyndication.com
249a53b1e4be45e3e794333e4c2541ab.safeframe.googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
119 KB
13 cloudfront.net
d1z2jf7jlzjs58.cloudfront.net
d2c8v52ll5s99u.cloudfront.net
dwgyu36up6iuz.cloudfront.net
dp8hsntg6do36.cloudfront.net
1 MB
9 cookielaw.org
cdn.cookielaw.org
143 KB
8 advertising.com
adserver-us.adtech.advertising.com
1 KB
8 google-analytics.com
www.google-analytics.com
20 KB
8 moatads.com
z.moatads.com
mb.moatads.com
px.moatads.com
375 KB
7 googletagservices.com
www.googletagservices.com
194 KB
7 skimresources.com
s.skimresources.com
t.skimresources.com
p.skimresources.com
r.skimresources.com
18 KB
6 openx.net
condenastus-d.openx.net
eu-u.openx.net
1 KB
5 rubiconproject.com
fastlane.rubiconproject.com
eus.rubiconproject.com
8 KB
4 adnxs.com
ib.adnxs.com
acdn.adnxs.com
3 KB
3 google.de
ampcid.google.de
www.google.de
479 B
3 googleapis.com
imasdk.googleapis.com
114 KB
3 casalemedia.com
as-sec.casalemedia.com
2 KB
3 polarcdn-terrax.com
polarcdn-terrax.com
3 KB
3 indexww.com
js-sec.indexww.com
15 KB
3 amazon-adsystem.com
c.amazon-adsystem.com
30 KB
2 adsrvr.org
match.adsrvr.org
1 KB
2 criteo.net
static.criteo.net
41 KB
2 facebook.net
connect.facebook.net
161 KB
2 criteo.com
bidder.criteo.com
286 B
2 media.net
prebid.media.net
568 B
2 associates-amazon.com
z-na.associates-amazon.com
assoc-na.associates-amazon.com
3 KB
2 cnevids.com
player.cnevids.com
24 KB
2 twitter.com
platform.twitter.com
29 KB
2 parsely.com
cdn.parsely.com
srv-2020-05-21-15.pixel.parsely.com
19 KB
2 mediavoice.com
cdn.mediavoice.com
plugin.mediavoice.com
130 KB
1 rlcdn.com
api.rlcdn.com
233 B
1 consensu.org
api.skimlinks.mgr.consensu.org
633 B
1 2mdn.net
s0.2mdn.net
11 KB
1 condenast.io
api.condenast.io
8 KB
1 googletagmanager.com
www.googletagmanager.com
107 KB
1 google.ee
adservice.google.ee
952 B
1 gstatic.com
www.gstatic.com
83 KB
1 onetrust.com
geolocation.onetrust.com
492 B
1 zqtk.net
segment-data.zqtk.net
512 B
1 amazonaws.com
journey-service-assets-prod.s3.amazonaws.com
84 KB
0 rkdms.com Failed
mid.rkdms.com Failed
238 42
Domain Requested by
33 capture.condenastdigital.com www.wired.com
22 www.wired.com www.wired.com
cdn.cookielaw.org
21 securepubads.g.doubleclick.net www.wired.com
securepubads.g.doubleclick.net
9 cdn.cookielaw.org www.wired.com
cdn.cookielaw.org
8 adserver-us.adtech.advertising.com 4 redirects www.wired.com
8 www.google-analytics.com 1 redirects www.googletagmanager.com
www.google-analytics.com
www.wired.com
7 www.googletagservices.com securepubads.g.doubleclick.net
7 media.wired.com www.wired.com
securepubads.g.doubleclick.net
6 pagead2.googlesyndication.com securepubads.g.doubleclick.net
6 tpc.googlesyndication.com securepubads.g.doubleclick.net
tpc.googlesyndication.com
5 dp8hsntg6do36.cloudfront.net www.wired.com
d2c8v52ll5s99u.cloudfront.net
5 news.google.com www.wired.com
news.google.com
4 eu-u.openx.net 2 redirects www.wired.com
4 d2c8v52ll5s99u.cloudfront.net player.cnevids.com
imasdk.googleapis.com
d2c8v52ll5s99u.cloudfront.net
4 fastlane.rubiconproject.com www.wired.com
4 z.moatads.com www.wired.com
securepubads.g.doubleclick.net
d2c8v52ll5s99u.cloudfront.net
3 wren.condenastdigital.com www.wired.com
3 www.google.com 2 redirects securepubads.g.doubleclick.net
3 dwgyu36up6iuz.cloudfront.net www.wired.com
d2c8v52ll5s99u.cloudfront.net
z.moatads.com
3 imasdk.googleapis.com player.cnevids.com
imasdk.googleapis.com
3 as-sec.casalemedia.com www.wired.com
js-sec.indexww.com
3 px.moatads.com www.wired.com
3 polarcdn-terrax.com cdn.mediavoice.com
plugin.mediavoice.com
3 js-sec.indexww.com www.wired.com
3 c.amazon-adsystem.com www.wired.com
c.amazon-adsystem.com
2 acdn.adnxs.com www.wired.com
2 match.adsrvr.org js-sec.indexww.com
www.wired.com
2 www.google.de www.wired.com
2 stats.g.doubleclick.net 2 redirects
2 static.criteo.net www.wired.com
static.criteo.net
2 r.skimresources.com 1 redirects www.wired.com
2 connect.facebook.net d2c8v52ll5s99u.cloudfront.net
connect.facebook.net
2 p.skimresources.com www.wired.com
2 t.skimresources.com www.wired.com
s.skimresources.com
2 bidder.criteo.com www.wired.com
2 prebid.media.net www.wired.com
2 condenastus-d.openx.net www.wired.com
2 ib.adnxs.com www.wired.com
2 4d.condenastdigital.com pixel.condenastdigital.com
2 infinityid.condenastdigital.com www.wired.com
d2c8v52ll5s99u.cloudfront.net
2 player.cnevids.com www.wired.com
player.cnevids.com
2 platform.twitter.com www.wired.com
platform.twitter.com
2 adservice.google.com securepubads.g.doubleclick.net
imasdk.googleapis.com
2 pay.google.com news.google.com
2 pixel.condenastdigital.com www.wired.com
1 eus.rubiconproject.com www.wired.com
1 pubads.g.doubleclick.net d2c8v52ll5s99u.cloudfront.net
1 api.rlcdn.com js-sec.indexww.com
1 api.skimlinks.mgr.consensu.org s.skimresources.com
1 s0.2mdn.net imasdk.googleapis.com
1 assoc-na.associates-amazon.com z-na.associates-amazon.com
1 ampcid.google.de www.google-analytics.com
1 ampcid.google.com www.google-analytics.com
1 s.skimresources.com www.wired.com
1 z-na.associates-amazon.com www.wired.com
1 srv-2020-05-21-15.pixel.parsely.com cdn.parsely.com
1 249a53b1e4be45e3e794333e4c2541ab.safeframe.googlesyndication.com securepubads.g.doubleclick.net
1 api.condenast.io www.wired.com
1 www.googletagmanager.com www.wired.com
1 cdn.parsely.com d1z2jf7jlzjs58.cloudfront.net
1 adservice.google.ee securepubads.g.doubleclick.net
1 mb.moatads.com z.moatads.com
1 clients2.google.com news.google.com
1 www.gstatic.com www.wired.com
1 payments.google.com 1 redirects
1 plugin.mediavoice.com cdn.mediavoice.com
1 geolocation.onetrust.com cdn.cookielaw.org
1 segment-data.zqtk.net www.wired.com
1 journey-service-assets-prod.s3.amazonaws.com www.wired.com
1 cdn.mediavoice.com www.wired.com
1 d1z2jf7jlzjs58.cloudfront.net www.wired.com
1 apis.google.com www.wired.com
0 mid.rkdms.com Failed js-sec.indexww.com
238 73
Subject Issuer Validity Valid
condenast.com
GlobalSign CloudSSL CA - SHA256 - G3
2020-04-20 -
2021-04-21
a year crt.sh
sni9451gl.wpc.edgecastcdn.net
DigiCert SHA2 Secure Server CA
2020-05-07 -
2021-05-12
a year crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-04-28 -
2020-07-21
3 months crt.sh
moatads.com
DigiCert SHA2 Secure Server CA
2020-01-17 -
2021-03-17
a year crt.sh
c.amazon-adsystem.com
Amazon
2019-10-07 -
2020-09-29
a year crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2020-03-02 -
2021-04-01
a year crt.sh
*.apis.google.com
GTS CA 1O1
2020-05-05 -
2020-07-28
3 months crt.sh
*.news.google.com
GTS CA 1O1
2020-04-28 -
2020-07-21
3 months crt.sh
*.cloudfront.net
DigiCert Global CA G2
2019-07-17 -
2020-07-05
a year crt.sh
sni.cloudflaressl.com
CloudFlare Inc ECC CA-2
2020-04-07 -
2020-10-09
6 months crt.sh
*.s3.amazonaws.com
DigiCert Baltimore CA-2 G2
2019-11-09 -
2021-03-12
a year crt.sh
*.zqtk.net
COMODO RSA Domain Validation Secure Server CA
2018-08-09 -
2020-08-24
2 years crt.sh
*.onetrust.com
DigiCert SHA2 Secure Server CA
2018-03-12 -
2020-06-14
2 years crt.sh
*.google.com
GTS CA 1O1
2020-05-05 -
2020-07-28
3 months crt.sh
*.gstatic.com
GTS CA 1O1
2020-04-28 -
2020-07-21
3 months crt.sh
*.moatads.com
DigiCert SHA2 Secure Server CA
2019-03-12 -
2021-06-10
2 years crt.sh
*.google.ee
GTS CA 1O1
2020-04-28 -
2020-07-21
3 months crt.sh
*.parsely.com
Amazon
2019-08-30 -
2020-09-30
a year crt.sh
*.twimg.com
DigiCert SHA2 High Assurance Server CA
2019-11-12 -
2020-11-18
a year crt.sh
*.cnevids.com
Amazon
2020-01-22 -
2020-11-16
10 months crt.sh
*.google-analytics.com
GTS CA 1O1
2020-05-05 -
2020-07-28
3 months crt.sh
*.conde.io
Amazon
2019-06-03 -
2020-07-03
a year crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2020-04-28 -
2020-07-21
3 months crt.sh
*.pixel.parsely.com
Let's Encrypt Authority X3
2020-04-01 -
2020-06-30
3 months crt.sh
z-na.associates-amazon.com
Amazon
2019-07-17 -
2020-08-17
a year crt.sh
*.skimresources.com
DigiCert SHA2 Secure Server CA
2018-09-13 -
2020-10-07
2 years crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2019-01-10 -
2021-01-14
2 years crt.sh
*.adnxs.com
DigiCert ECC Secure Server CA
2019-01-23 -
2021-03-08
2 years crt.sh
*.adtech.advertising.com
DigiCert SHA2 Secure Server CA
2020-04-16 -
2022-04-21
2 years crt.sh
*.openx.net
GeoTrust RSA CA 2018
2018-01-04 -
2020-07-09
3 years crt.sh
*.media.net
DigiCert SHA2 Secure Server CA
2020-02-25 -
2021-05-26
a year crt.sh
*.criteo.com
DigiCert ECC Secure Server CA
2020-03-30 -
2020-06-28
3 months crt.sh
upload.video.google.com
GTS CA 1O1
2020-05-05 -
2020-07-28
3 months crt.sh
assoc-na.associates-amazon.com
Amazon
2020-03-27 -
2021-03-13
a year crt.sh
*.doubleclick.net
GTS CA 1O1
2020-04-28 -
2020-07-21
3 months crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2020-05-14 -
2020-08-05
3 months crt.sh
*.criteo.net
DigiCert ECC Secure Server CA
2020-03-30 -
2020-06-28
3 months crt.sh
www.google.com
GTS CA 1O1
2020-05-05 -
2020-07-28
3 months crt.sh
www.google.de
GTS CA 1O1
2020-05-05 -
2020-07-28
3 months crt.sh
api.skimlinks.mgr.consensu.org
DigiCert SHA2 Secure Server CA
2019-10-04 -
2021-10-07
2 years crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2019-03-07 -
2021-04-19
2 years crt.sh
*.rlcdn.com
Sectigo RSA Domain Validation Secure Server CA
2020-04-14 -
2021-04-23
a year crt.sh
cdn.adnxs.com
GeoTrust RSA CA 2018
2020-01-02 -
2021-04-02
a year crt.sh

This page contains 22 frames:

Primary Page: https://www.wired.com/story/dns-ddos-amplification-attack/
Frame ID: 6053C7FD3AD3353B33DC06CE75E91755
Requests: 174 HTTP requests in this frame

Frame: https://pay.google.com/gp/p/ui/payframe?origin=https://www.wired.com&mid=%{merchantId}
Frame ID: 837B626B49257206B57D285FE6D68F5C
Requests: 1 HTTP requests in this frame

Frame: https://news.google.com/swg/_/ui/v1/serviceiframe?_=441687
Frame ID: 74855761C5A34AF82A658E8DACC193F6
Requests: 1 HTTP requests in this frame

Frame: https://polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/
Frame ID: 4EA2528B67EAF431714193D0499243AF
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/widget_iframe.2a008290075125adde2d7b849b06a0bb.html?origin=https%3A%2F%2Fwww.wired.com
Frame ID: DC78C45B580E52A31F2C9622C0E4BE89
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstiMcVN4aPuL0phluvCmkdTiMbSfuqAE8rZiMCYFLWlWwBBPXX01TjB38NSWRjngSwN6edK97yucO5eAMC2KBD_z5Znuo456XIt2y7FrN3C_9yaXH3uvgPAHUHU9HVxIt69HyY949XGLz0rUtdMvLfwUTNDO2d7A-qICjuKO3QWlIttXQMljPBIFkhUUe08otKYoYgyQhCloBTaVjwWG6KhgOWt2pSbEV6Reacb63mUXU6kESDgiykcxo6rGoYeHCQFA0PAJ84882S7v-98yOUILk_tIiJEI46ZfE8&sai=AMfl-YROGa9SMssZtO8G9nI2SQHHsEg8M-5RnIpswrCpUIMdxeo_8b9zpN31f7G077YbLB8DxI2VgA1vVnL5XSdM-STDUQYAGm2qHhoCXdkeB-j3P_cTjEJCxO66ZKqaUbdkoA&sig=Cg0ArKJSzClj7Odti1QVEAE&urlfix=1&adurl=
Frame ID: 85628821F638B5F9ED939364AE81BCC8
Requests: 5 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: 61B2AEE30FB1448AA2CA6AB63DAD4535
Requests: 27 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstsInCbTpjLx0tODIxy0haWXaUptKdo_sgXH2ENo-pxuDX1vfbiQKsam41-rYRQtPwM-DwfqTrnlv3ouuGqVrdHjc1UxJO90uNO1Zz2tjfHiIDFpvrbQutFtEIfQS6khjJAIx0r0RCDu9hoCIIxTN9lJObdj4SA9HK6JCWZDxUYEp5EolwuKNncajXkRR8KFEU40LNKMxm5JK7ZtyDL-nFDU5oLiqSVVGJsOtXHrOCBuECJNz7gDW6_PMQ_h7X8Ru-OBy5AmXB0JgH4jFlMKrY2NiRimxfdFjWj0X64vQ&sai=AMfl-YSXD7tWj-C3lqBQR0l6JMyDDO9KCUVI8z2LNoMHPGExstKko7jfVfqCEr9IRDPIfw0C7CXlCOy6yzJIV2pDRHzv_M1uN_8Rl_mzivD5vH5g5l0QAkXGzdivUePuCnBKRQ&sig=Cg0ArKJSzHOSN8od921tEAE&urlfix=1&adurl=
Frame ID: EFBFE214DF41D5693542EB59BFB87870
Requests: 7 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjss2t9oEeLI0MH2O6wC-49qDB6g3bWIrr1KzSDlQHqQff-W3me0RuS4kEEHkeOOudLalrkOLBBOJx5qBOCfy8rXam2M-xQB2mDG-Q8hm6RZcKuhbk7VGJawUyZfluVaVYpiphOMDI8YcJqWuf8ZGpz8sLR8wKlEKGrsSn7VHrHDh3LPdsMFP4Ujt0gk9NsRaxMZvLSOh2Y1Hx9ruw6AL1LCKA0dtAudvmORV39GwA79l3DmkdBbxpievqxOnLUEtvzN23p4M81cKqGt9iMZkTGrffzo0LoBh09sYfHjXCS4i4w&sai=AMfl-YSPWBWvPZuq_ZjbI-YQcgUNUhBReoT5oSG57FYxfdQAnubd7g09UxlGSMSwbNw4K_qxCt4UhZ1DMed9Ik8bL7GmUmzu8aaRUUBfJP3tFWtdJe0P35zLjNLMD-TzL6geYw&sig=Cg0ArKJSzN_T6jKEcTO6EAE&urlfix=1&adurl=
Frame ID: 265B807DDFA946A279464B023813C3A0
Requests: 7 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsv3z4vuWPNfS_DZJY3L27e9S9YfWlAzaS0WtNL6a11Iz1f7gJENkO2xrlkTbRZkBjS_WaSWFJjSuOzLe4wO5LRIPM7rygZw6cpWUksU-PkTS8VJsYfaIUftDk76_CId4Vy8Pk90qfYCLCh_JkAKDc4ZmUedlKQ-nHcHHbjiaFOMHXN9cavB15TtMRP-NSQr0Og5FSqIYPYxZdgQIpj19BWAiwIuTzlhNyGeMZDVKfouV9GXyoUByjNyLAmfOtZtRyLpP_qVIzB5pc8I7-vo50kDXrt_67s6VlfpiSgHtw&sai=AMfl-YT-lDxDCN1fQ8ux8UcsdbZGLNecLF2sPRwMMxJmkj4s66Xgj4zE_usjfDoO1OIiyFS7eQDQq-uOvRzhUT0zIWg3_XNHuO8vcBGTmBRp-Yritvau14HaPylrznZ_i1_ZBw&sig=Cg0ArKJSzCEATXqYjCnZEAE&urlfix=1&adurl=
Frame ID: 9E5580029B53782B5E8E0BA85819C51C
Requests: 6 HTTP requests in this frame

Frame: https://t.skimresources.com/api/v2/robots.txt?__skimjs_preflight__please_ignore__=true&rnd=0.5401691157105082
Frame ID: 52224D57357D637792180CE90204B2BB
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.386.2_en.html
Frame ID: F2A91600B0137648C6071F1187D4C118
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsssTasd1UD0Uq2LOG9gwa9wgdYpAUSwk2IWwRDsxTTwsrurBRLGBv1VZdHcSIcwW2KrVWaJ6s3rjyHriTcBwSGPt35j9-Ii7kpU7vtpXDQaeiLYox4JLYYbqmDNPdhT4SglsLT19D35bk8DPHYh-O7Q4ZYpe-qxWo17B5G0UeRWMp0n6NEGnglXAMeXdBA-TGOgF9075G-jifLd3Dhjg5tWcYeNU2rz3UQkDfgXnC3uAhtf6v7wXuLbYpR5H85MzSptNy6_zgp8nj5reTmE5S4Wzv_kj3k&sai=AMfl-YSJcBtNbZGQBSpEItjT7O1kkTzhFUXQcvR9qRU0UHCp9nfrrZRImKsObtXUEG8T8rlQNkqJsxQqw8Jz_GD68yYy9wFB6r6Z-ftnZW2S6Rq5m-VHo3AdCQGEVFzucozlGNqwrw46-8woqO_nccGD&sig=Cg0ArKJSzGoiUPlXJ1yJEAE&adurl=
Frame ID: A8981458F523566E06D66D540C2E49FD
Requests: 9 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsufTo-FnQ9opysi6UBBtWnvBxhmd_17DRNT0o-SQfEocVVyk5MzwSmtsAqmsC_STTHoMQhwOStNNOuNjLuzPOBjZjGnPjAisQnJTG_EM6r6YT08fujMDezff8wO8NvR_JiUiE79oOuky5kQZe1A7Brw77CFJxNxPMjvhVNYKo3zCYHwgZyboUG4HnyU-x5rZpmu8awE2bpjBWZvWLekfzxElk5F7YtuIuB7EvCeVAaEM36nuOmvqyxSEj-P4SA0ybeqqEooDvmIkuHY3mf0WPs_1MdwU8pNKAY&sai=AMfl-YTc5s6Q0F8ufGrbxPy78mMgP2oZDKozBJI_wSt_xII8P4gXjVgGj7qJZJ1zQcr6veUCNJtT1rkyz4LyHn5ybLJNrl-MbdYrg-lw-y9N_DpILZ_5QGpZm355AcXHCGIOAAVSW1UMYwPw92GLvbPf&sig=Cg0ArKJSzFymKlsmvYi2EAE&urlfix=1&adurl=
Frame ID: 6438657690BF01273298DD54DE23C8B2
Requests: 6 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Frame ID: 0558AD7D272D847FEE5EC4DDCC9E1BD9
Requests: 1 HTTP requests in this frame

Frame: https://eu-u.openx.net/w/1.0/pd?cc=1&plm=6&ph=92a42b2b-081a-4be8-96bc-8a959e4a3060&gdpr=1&us_privacy=1---
Frame ID: BEE8036E778939834A56B942D1D5888A
Requests: 1 HTTP requests in this frame

Frame: https://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
Frame ID: 284F582BEB6EC2D418671F27EBC496D7
Requests: 1 HTTP requests in this frame

Frame: https://js-sec.indexww.com/um/ixmatch.html
Frame ID: AF31BDE34F77E626DB2A0258670EC194
Requests: 1 HTTP requests in this frame

Frame: https://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
Frame ID: E7CAEB0F00FE3CAC46A6E503C3203C96
Requests: 1 HTTP requests in this frame

Frame: https://eu-u.openx.net/w/1.0/pd?cc=1&plm=6&ph=92a42b2b-081a-4be8-96bc-8a959e4a3060&gdpr=1&us_privacy=1---
Frame ID: D9A426AA72342D0726B84DC622648C0B
Requests: 1 HTTP requests in this frame

Frame: https://js-sec.indexww.com/um/ixmatch.html
Frame ID: 9A733563F74E7D6B3AE872BFC2F31C83
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html?us_privacy=1---
Frame ID: 0D57D555B0E13CD913B936BB1F4266A4
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers via /varnish(?: \(Varnish\/([\d.]+)\))?/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Page Statistics

238
Requests

98 %
HTTPS

40 %
IPv6

42
Domains

73
Subdomains

64
IPs

8
Countries

7069 kB
Transfer

13623 kB
Size

14
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 42
  • https://payments.google.com/payments/v4/js/integrator.js?ss=md HTTP 301
  • https://www.gstatic.com/_/billing/_/js/k=billing.ims.en_US.B_Fs6dOxPaQ.O/am=lQAS/d=1/ct=zgms/rs=AChpKPCZYwK4VKk4x6qY4meEqGZaY6qsfw/m=b2,aist,ist,qst
Request Chain 107
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091231/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=22bdc7d038c6a95;misc=1590075868417;us_privacy=1---; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091231/0/0/ADTECH;cfp=1;rndc=1590075867;v=2;cmd=bid;cors=yes;alias=22bdc7d038c6a95;misc=1590075868417;us_privacy=1---
Request Chain 108
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091229/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=2315f89142273f8;misc=1590075868417;us_privacy=1---; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091229/0/0/ADTECH;cfp=1;rndc=1590075868;v=2;cmd=bid;cors=yes;alias=2315f89142273f8;misc=1590075868417;us_privacy=1---
Request Chain 116
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091246/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=455bbe9ebf9f3b7;misc=1590075868436;us_privacy=1---; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091246/0/0/ADTECH;cfp=1;rndc=1590075867;v=2;cmd=bid;cors=yes;alias=455bbe9ebf9f3b7;misc=1590075868436;us_privacy=1---
Request Chain 117
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091240/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=4611116488bc24;misc=1590075868436;us_privacy=1---; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091240/0/0/ADTECH;cfp=1;rndc=1590075867;v=2;cmd=bid;cors=yes;alias=4611116488bc24;misc=1590075868436;us_privacy=1---
Request Chain 177
  • https://r.skimresources.com/api/ HTTP 307
  • https://r.skimresources.com/api/?xguid=01E8VYGJPW8C297NJZJZ6M2T3K&persistence=1&checksum=28ace76b637aa07bffeeedc67986ff7b0af2dfe2c9fc6256540c536263666079
Request Chain 194
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j82&tid=UA-8293713-27&cid=425008880.1590075868&jid=497812181&gjid=174545141&_gid=1040492620.1590075869&_u=aChAgUAjAAQC~&z=1384597386 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-8293713-27&cid=425008880.1590075868&jid=497812181&_v=j82&z=1384597386 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-8293713-27&cid=425008880.1590075868&jid=497812181&_v=j82&z=1384597386&slf_rd=1&random=430050017
Request Chain 195
  • https://www.google-analytics.com/r/collect?v=1&_v=j82&a=68812284&t=event&ni=1&_s=1&dl=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&dr=%2F&dp=%2Fstory%2Fdns-ddos-amplification-attack%2F&ul=en-us&de=UTF-8&dt=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique%20%7C%20WIRED&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&ec=paywall&ea=loaded&el=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&_u=aChACUAjBAQC~&jid=1696105618&gjid=1670174960&cid=425008880.1590075868&tid=UA-8293713-27&_gid=1889547380.1590075870&_r=1&gtm=2wg5e15HBJC2K&cg1=article&cg3=security&cg4=cyberattacks%20and%20hacks&cd1=GTM-5HBJC2K&cd2=402&cd4=&cd5=&cd6=Thu%20May%2021%202020%2017%3A44%3A28%20GMT%2B0200%20(Central%20European%20Summer%20Time)&cd7=1590075868256.latsns3&cd8=-2&cd9=Mozilla%2F5.0%20(Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5)%20AppleWebKit%2F537.36%20(KHTML%2C%20like%20Gecko)%20Chrome%2F74.0.3729.169%20Safari%2F537.36&cd10=English&cd11=desktop&cd12=0&cd13=GA%20-%20Event%20-%20Paywall%20Loaded&cd18=&cd19=&cd20=not%20active&cd21=74c407ba-cc71-4c85-94c2-5a307e44f09c&cd24=1&cd25=Andy%20Greenberg&cd26=5ec1e85cd58e99fafced8096&cd27=2&cd28=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cd29=web&cd30=1&cd31=1&cd32=2020-05-19T10%3A00%3A00.000Z&cd34=2020-05-19T21%3A41%3A22.015Z&cd35=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cd36=web&cd38=all&cd39=paywalled&cd43=Wired&cd45=Adblock%20Enabled%20-%20false&cd63=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&cd64=clip_top&cd65=&cd72=multi-tenant&cd74=sample&cd92=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&cd93=security&cd94=cyberattacks%20and%20hacks&cd98=article&cd103=&cd111=1568&cd113=paywall-loaded&cd114=false&cd115=&cd116=60&cd121=&cd123=mt_article_two_column&cd3=425008880.1590075868&z=2005332925 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-8293713-27&cid=425008880.1590075868&jid=1696105618&_gid=1889547380.1590075870&gjid=1670174960&_v=j82&z=2005332925 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-8293713-27&cid=425008880.1590075868&jid=1696105618&_v=j82&z=2005332925 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-8293713-27&cid=425008880.1590075868&jid=1696105618&_v=j82&z=2005332925&slf_rd=1&random=3425403500
Request Chain 245
  • https://eu-u.openx.net/w/1.0/pd?plm=6&ph=92a42b2b-081a-4be8-96bc-8a959e4a3060&gdpr=1&us_privacy=1--- HTTP 302
  • https://eu-u.openx.net/w/1.0/pd?cc=1&plm=6&ph=92a42b2b-081a-4be8-96bc-8a959e4a3060&gdpr=1&us_privacy=1---
Request Chain 249
  • https://eu-u.openx.net/w/1.0/pd?plm=6&ph=92a42b2b-081a-4be8-96bc-8a959e4a3060&gdpr=1&us_privacy=1--- HTTP 302
  • https://eu-u.openx.net/w/1.0/pd?cc=1&plm=6&ph=92a42b2b-081a-4be8-96bc-8a959e4a3060&gdpr=1&us_privacy=1---

238 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.wired.com/story/dns-ddos-amplification-attack/
292 KB
118 KB
Document
General
Full URL
https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.194 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
b402a994e911c7abcfa2bedfebecbdd5fc4bbc7bf1eb29b247c1c3afea0a4f79
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
Strict-Transport-Security max-age=31536000; preload

Request headers

:method
GET
:authority
www.wired.com
:scheme
https
:path
/story/dns-ddos-amplification-attack/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
content-type
text/html; charset=utf-8
payment
sample
x-esi
on
verso
true
date
Thu, 21 May 2020 15:44:25 GMT
via
1.1 varnish
age
122
cache-control
no-cache
set-cookie
pay_ent_smp=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCIsInZlciI6MX0.eyJ1cmxzIjpbIi9zdG9yeS9kbnMtZGRvcy1hbXBsaWZpY2F0aW9uLWF0dGFjayJdLCJjbnQiOjEsIm1heCI6NCwiZXhwIjoyMDIwMDV9.m59RqXsv5xqEHAlME8j76aMZSlL0vu0S2cvr5VWS9Bs; Path=/; Expires=Fri, 21 May 2021 21:44:25 GMT; Domain=wired.com; Secure; CN_xid=74c407ba-cc71-4c85-94c2-5a307e44f09c; Expires=Tue, 17 Nov 2020 15:44:25 GMT; path=/; xid1=1; Expires=Thu, 21 May 2020 15:44:40 GMT; path=/; CN_segments=co.w2021; Expires=Tue, 17 Nov 2020 15:44:25 GMT; path=/; verso_bucket=684; Expires=Fri, 21 May 2021 15:44:25 GMT; path=/;
apple-news-services-host
verso-prod.conde.io
apple-news-services-request-url
/story/dns-ddos-amplification-attack/
apple-news-services-parsed-url
/story/dns-ddos-amplification-attack/
apple-news-services-handled
false
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
strict-transport-security
max-age=31536000; preload
x-served-by
cache-fra19180-FRA
x-cache
HIT
x-cache-hits
1
x-timer
S1590075866.936840,VS0,VE2
x-ua-device
desktop
vary
accept-encoding, Accept-Encoding, accept-payment, X-UA-Device, Verso
content-encoding
br
accept-ranges
none
otSDKStub.js
cdn.cookielaw.org/scripttemplates/
11 KB
4 KB
Script
General
Full URL
https://cdn.cookielaw.org/scripttemplates/otSDKStub.js
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:1cb7:261b:1f9c:2074:3c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (frc/8FE8) /
Resource Hash
3964d65266975abb7c3bacd4b4f1c55655ce97900a52d07ebaae9e502de19cd7

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Thu, 21 May 2020 15:44:26 GMT
content-encoding
gzip
content-md5
fYXzI9midUK36U6D+i3Smw==
age
12371
x-cache
HIT
status
200
content-length
3720
x-ms-lease-status
unlocked
last-modified
Thu, 21 May 2020 11:03:26 GMT
server
ECAcc (frc/8FE8)
etag
0x8D7FD76960A7855
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
x-ms-request-id
026d580c-201e-0068-1d69-2f86b7000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Thu, 21 May 2020 19:44:26 GMT
otCCPAiab.js
cdn.cookielaw.org/opt-out/
22 KB
6 KB
Script
General
Full URL
https://cdn.cookielaw.org/opt-out/otCCPAiab.js
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:1cb7:261b:1f9c:2074:3c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (frc/8F2C) /
Resource Hash
6f25e54ff758a69c92c7260b3647788acb86b4fc6266141893e1a4316b5a0862

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Thu, 21 May 2020 15:44:26 GMT
content-encoding
gzip
content-md5
mHlk9fiiqYjvq2V+HtACPg==
age
14205
x-cache
HIT
status
200
content-length
5609
x-ms-lease-status
unlocked
last-modified
Thu, 16 Apr 2020 21:14:53 GMT
server
ECAcc (frc/8F2C)
etag
0x8D7E24B34C5F89B
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
x-ms-request-id
17477120-901e-00f2-4b65-2f0a72000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
expires
Thu, 21 May 2020 19:44:26 GMT
styles.min.49931209c89a0ba91548fe5430ca117638b86c6d.css
www.wired.com/verso/static/wired/
625 KB
92 KB
Stylesheet
General
Full URL
https://www.wired.com/verso/static/wired/styles.min.49931209c89a0ba91548fe5430ca117638b86c6d.css
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.194 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
c443162514a3e9b0897c1eb272d56495b9899085270d3efb7cb16c8b1156c87b
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
Strict-Transport-Security max-age=31536000; preload

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
content-encoding
gzip
age
34589
x-cache
HIT
status
200
x-ua-device
desktop
apple-news-services-parsed-url
/verso/static/wired/styles.min.49931209c89a0ba91548fe5430ca117638b86c6d.css
last-modified
Thu, 21 May 2020 04:39:56 GMT
verso
true
content-length
94022
x-amz-id-2
7ZunwW2frJJv4SSNgnfptX1MFP8gHpjU3eX7Ohux+MoLgwHNbuL9JwvF6mUp4GvFVa8SLAPJbkk=
x-served-by
cache-fra19180-FRA
apple-news-services-handled
false
x-timer
S1590075866.121741,VS0,VE0
apple-news-services-request-url
/verso/static/wired/styles.min.49931209c89a0ba91548fe5430ca117638b86c6d.css
etag
W/"ef117252751024aa0e2ddc9aefde0954"
vary
accept-encoding, Verso
strict-transport-security
max-age=31536000; preload
x-amz-request-id
95F10D991AE08337
via
1.1 varnish
expires
Fri, 21 May 2021 06:07:57 GMT
cache-control
max-age=86400
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
accept-ranges
bytes
content-type
text/css
apple-news-services-host
verso-prod.conde.io
x-cache-hits
11
gpt.js
securepubads.g.doubleclick.net/tag/js/
42 KB
14 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/tag/js/gpt.js
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
sffe /
Resource Hash
b1790e7b5b2b5e1efbe72b8e024548834074627729922efc3fbfc04f62fd8868
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"521 / 810 of 1000 / last-modified: 1589979405"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
14313
x-xss-protection
0
expires
Thu, 21 May 2020 15:44:26 GMT
moatheader.js
z.moatads.com/condenastprebidheader987326845656/
195 KB
69 KB
Script
General
Full URL
https://z.moatads.com/condenastprebidheader987326845656/moatheader.js
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
72.247.226.64 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-226-64.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
159870d28d6a141f4c7da2dcf3970caf103a391dea9149500a8407276a69b070

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
content-encoding
gzip
last-modified
Mon, 27 Apr 2020 21:09:45 GMT
server
AmazonS3
x-amz-request-id
815693E4762E3D8F
etag
"6de83688cc282085483a4cc5b2af5420"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=17444
accept-ranges
bytes
content-length
70131
x-amz-id-2
qp+pQ6ugI2V8R+hrzxwPYMaZ96wMRymt2wyKtIVagfttNnMDVT1WQE7tUjZAdeG3bIB8GtmR3hM=
apstag.js
c.amazon-adsystem.com/aax2/
101 KB
26 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.153.170 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-153-170.fra53.r.cloudfront.net
Software
Server /
Resource Hash
b388addf9c8ba4bc2852132727bd9df68c99db7ca97d22fdb18ad2a426d02a5b

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:43:42 GMT
content-encoding
gzip
server
Server
age
44
etag
06fa05e9082ab6150f8e415571b3ff6a
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=900
x-amz-cf-pop
FRA53
accept-ranges
bytes
timing-allow-origin
*
x-amz-cf-id
nVC4AAJYW0J5K33O1dk_tMIHSATCIBi0wQUaQgfjqtP32dzZLv1ZUQ==
via
1.1 4ba0e9deb9465045a3261b8712935964.cloudfront.net (CloudFront)
prebid.min.js
www.wired.com/hotzones/esi/wired/
242 KB
76 KB
Script
General
Full URL
https://www.wired.com/hotzones/esi/wired/prebid.min.js
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.194 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
eab1b05e484ac8335bb32fee6b81bcfde882c5f7163e0c4768e3b3e89f86ab04
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
Strict-Transport-Security max-age=31536000; preload

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
content-encoding
gzip
vary
accept-encoding, accept-payment, Verso
age
78067
x-cache
HIT
status
200
hz-zone
1
content-length
77587
x-served-by
cache-fra19180-FRA
strict-transport-security
max-age=31536000; preload
content-type
application/javascript; charset=utf-8
via
1.1 varnish
cache-control
no-cache
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
accept-ranges
bytes
apple-news-services-host
hotzones.condenastdigital.com
x-cache-hits
2
183973-93942139695505.js
js-sec.indexww.com/ht/p/
45 KB
15 KB
Script
General
Full URL
https://js-sec.indexww.com/ht/p/183973-93942139695505.js
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.98 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-225-98.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
712266353a870c6af05f6a3eea280d8374b0db5492fc541024ae15b608b61cde

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 15:44:27 GMT
Content-Encoding
gzip
Last-Modified
Thu, 21 May 2020 15:41:17 GMT
Server
Apache
ETag
"90545b-b4b4-5a62a57f2039d"
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=3599
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
text/javascript
Content-Length
15131
Expires
Thu, 21 May 2020 16:44:26 GMT
platform.js
apis.google.com/js/
48 KB
19 KB
Script
General
Full URL
https://apis.google.com/js/platform.js
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
f0769d55303995110a66092b99bb1ae1ddd3595b33acdd8ec6dda98d9c97ffae
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-NiXdploEz9slnoyr+1Ts/w' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri /_/cspreport
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
CP="This is not a P3P policy! See g.co/p3phelp for more info."
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
x-ua-compatible
IE=edge, chrome=1
server
ESF
x-frame-options
SAMEORIGIN
etag
"18def37599fc35e822c1c136f7a0c3ef"
strict-transport-security
max-age=31536000
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=1800, stale-while-revalidate=1800
content-security-policy
script-src 'report-sample' 'nonce-NiXdploEz9slnoyr+1Ts/w' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri /_/cspreport
timing-allow-origin
*
expires
Thu, 21 May 2020 15:44:26 GMT
swg.js
news.google.com/swg/js/v1/
128 KB
38 KB
Script
General
Full URL
https://news.google.com/swg/js/v1/swg.js
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
435f21b923705d4854260d383bda52b3158f8e44dfc52d789d3b28f68b6e7ff1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 14:54:31 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 14 May 2020 20:04:27 GMT
server
sffe
age
2995
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3000
accept-ranges
bytes
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
38696
x-xss-protection
0
expires
Thu, 21 May 2020 15:44:31 GMT
logo-header.a7598835a549cb7d5ce024ef0710935927a034f9.svg
www.wired.com/verso/static/wired/assets/
1 KB
1 KB
Image
General
Full URL
https://www.wired.com/verso/static/wired/assets/logo-header.a7598835a549cb7d5ce024ef0710935927a034f9.svg
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.194 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
1d097e69ff47df9414a0ec07dfc70401084f4599617045a3a3edc7661ff76f3f
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
Strict-Transport-Security max-age=31536000; preload

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
content-encoding
gzip
age
260236
x-cache
HIT
status
200
x-ua-device
desktop
apple-news-services-parsed-url
/verso/static/wired/assets/logo-header.a7598835a549cb7d5ce024ef0710935927a034f9.svg
last-modified
Mon, 18 May 2020 15:24:19 GMT
verso
true
content-length
600
x-amz-id-2
ZlWNC7J2O+ejTFDNUlvqqOlVDHyxS2ExkFy00hkg0M8VjecWRaRJ91nnXYma6tdDsbq5idcxUq4=
x-served-by
cache-fra19180-FRA
apple-news-services-handled
false
x-timer
S1590075866.383817,VS0,VE0
apple-news-services-request-url
/verso/static/wired/assets/logo-header.a7598835a549cb7d5ce024ef0710935927a034f9.svg
etag
W/"ce65105f89c50c0f92e35be389684c24"
vary
accept-encoding, Verso
strict-transport-security
max-age=31536000; preload
x-amz-request-id
C45EEEDFD1056565
via
1.1 varnish
expires
Tue, 18 May 2021 15:27:10 GMT
cache-control
max-age=31536000, immutable
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
accept-ranges
bytes
content-type
image/svg+xml
apple-news-services-host
verso-prod.conde.io
x-cache-hits
11
andy_greenberg.jpg
media.wired.com/photos/590a54de9f8d2e342d8e7760/1:1/w_270%2Cc_limit/
8 KB
8 KB
Image
General
Full URL
https://media.wired.com/photos/590a54de9f8d2e342d8e7760/1:1/w_270%2Cc_limit/andy_greenberg.jpg
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.239 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
044315f1d5480ef2f8758bd0929b442252459ef77ec8b7b5e1ec8703066d509e

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 15:44:26 GMT
Connection
keep-alive
Age
1197210
X-Cache
HIT, HIT
Fastly-Io-Info
ifsz=170970 idim=468x468 ifmt=jpeg ofsz=8078 odim=270x270 ofmt=webp
Fastly-Stats
io=1
Fastly-Restarts
1
X-Served-By
cache-bwi5141-BWI, cache-hhn4062-HHN
experience
katra
Accept-Ranges
bytes
X-Timer
S1590075867.520703,VS0,VE1
Etag
"gVbvofbfIFs5Mi0/2x46l+a2C+SpqerAEI54sJEJ/HM"
Vary
Accept
Content-Type
image/webp
cache-control
max-age=31536, must-revalidate, public
Content-Length
8078
X-Cache-Hits
1, 2
logo-reverse.548f3a7478ee71f618044082aa222dd05f31249c.svg
www.wired.com/verso/static/wired/assets/
1 KB
1 KB
Image
General
Full URL
https://www.wired.com/verso/static/wired/assets/logo-reverse.548f3a7478ee71f618044082aa222dd05f31249c.svg
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.194 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
af29cacfb5125f85da0f1557bb56456abcc1556dbd3094bb56e569890348c984
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
Strict-Transport-Security max-age=31536000; preload

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
content-encoding
gzip
age
2460608
x-cache
HIT
status
200
x-ua-device
desktop
apple-news-services-parsed-url
/verso/static/wired/assets/logo-reverse.548f3a7478ee71f618044082aa222dd05f31249c.svg
last-modified
Thu, 23 Apr 2020 00:19:23 GMT
verso
true
content-length
610
x-amz-id-2
chnIttN5AjIB66Znhi/yIkJqM5QgIsp3KXRkTsxYeSuKz44t+2R9C/pKO4j8FYIGk9nQUzBI89U=
x-served-by
cache-fra19180-FRA
apple-news-services-handled
false
x-timer
S1590075866.383773,VS0,VE0
apple-news-services-request-url
/verso/static/wired/assets/logo-reverse.548f3a7478ee71f618044082aa222dd05f31249c.svg
etag
W/"2cba2fa9380ed2b50927ed9d520aaa3c"
vary
accept-encoding, Verso
strict-transport-security
max-age=31536000; preload
x-amz-request-id
C11D532E4B7270BD
via
1.1 varnish
expires
Fri, 23 Apr 2021 04:14:18 GMT
cache-control
max-age=31536000, immutable
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
accept-ranges
bytes
content-type
image/svg+xml
apple-news-services-host
verso-prod.conde.io
x-cache-hits
11
polyfill.02113c764bc2b1b229850f32d0a5d271b5457775.js
www.wired.com/verso/static/
89 KB
27 KB
Script
General
Full URL
https://www.wired.com/verso/static/polyfill.02113c764bc2b1b229850f32d0a5d271b5457775.js
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.194 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
8a29810b81e5a0d97ab498d6a78e6be887688838f545718892c9fdbb3ce5f545
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
Strict-Transport-Security max-age=31536000; preload

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
content-encoding
gzip
age
56228
x-cache
HIT
status
200
x-ua-device
desktop
apple-news-services-parsed-url
/verso/static/polyfill.02113c764bc2b1b229850f32d0a5d271b5457775.js
last-modified
Wed, 20 May 2020 22:22:41 GMT
verso
true
content-length
26909
x-amz-id-2
3Ore1BZw1SffWFBEsuMVDBSt+sZ7VsX79lj0eaXCwXoTMQNft0s27iOreJZmsroudi3KLFG1PEY=
x-served-by
cache-fra19180-FRA
apple-news-services-handled
false
x-timer
S1590075866.383730,VS0,VE0
apple-news-services-request-url
/verso/static/polyfill.02113c764bc2b1b229850f32d0a5d271b5457775.js
etag
W/"943257d8f719d2bf1815e3c19747dcaf"
vary
accept-encoding, Verso
strict-transport-security
max-age=31536000; preload
x-amz-request-id
F23F88ED6B5618CE
via
1.1 varnish
expires
Fri, 21 May 2021 00:07:17 GMT
cache-control
max-age=86400
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
accept-ranges
bytes
content-type
application/javascript
apple-news-services-host
verso-prod.conde.io
x-cache-hits
2
presenter-articles.a47ebf95dbdbab8d1622fbabaeed5c753cb66b90.js
www.wired.com/verso/static/
877 KB
293 KB
Script
General
Full URL
https://www.wired.com/verso/static/presenter-articles.a47ebf95dbdbab8d1622fbabaeed5c753cb66b90.js
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.194 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
a1a3e00b24b082881a7c4942293e7119785de76670999e3677c60018800a415a
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
Strict-Transport-Security max-age=31536000; preload

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
content-encoding
gzip
age
80421
x-cache
HIT
status
200
x-ua-device
desktop
apple-news-services-parsed-url
/verso/static/presenter-articles.a47ebf95dbdbab8d1622fbabaeed5c753cb66b90.js
last-modified
Wed, 20 May 2020 17:13:49 GMT
verso
true
content-length
299698
x-amz-id-2
Csz1a9u4rJDUDf7WlVxK3cxJk+A3ww18Fo+TTCUA3gfjVBV2sN+9L/hgGqOBu0Pu/v/yeDSEUwE=
x-served-by
cache-fra19180-FRA
apple-news-services-handled
false
x-timer
S1590075866.384362,VS0,VE0
apple-news-services-request-url
/verso/static/presenter-articles.a47ebf95dbdbab8d1622fbabaeed5c753cb66b90.js
etag
W/"418863218385fc11b258188de2cc5396"
vary
accept-encoding, Verso
strict-transport-security
max-age=31536000; preload
x-amz-request-id
E45CCA61953739B1
via
1.1 varnish
expires
Thu, 20 May 2021 17:24:05 GMT
cache-control
max-age=86400
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
accept-ranges
bytes
content-type
application/javascript
apple-news-services-host
verso-prod.conde.io
x-cache-hits
2
p.js
d1z2jf7jlzjs58.cloudfront.net/
930 B
1 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/p.js
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.157.230 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-157-230.fra53.r.cloudfront.net
Software
nginx /
Resource Hash
62f586be8571b23584eb4a60a45a3157ff7c8388b1b1e3b4e8890e243b3e47de

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 14:10:57 GMT
Via
1.1 e9cb084a7980d1028202eee7e07a5589.cloudfront.net (CloudFront)
Age
48603
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
930
Pragma
public
Last-Modified
Wed, 06 May 2020 20:19:48 GMT
Server
nginx
ETag
"5eb31be4-3a2"
Content-Type
application/x-javascript
Cache-Control
max-age=86400, public
X-Amz-Cf-Pop
FRA53
Accept-Ranges
bytes
X-Amz-Cf-Id
yhEKOdvGQv494CfXW2Rc2cG7h1I8bButb-YNUT_fP48iLKhd1tToBw==
Expires
Fri, 22 May 2020 02:14:17 GMT
pixelpropagate.js
www.wired.com/hotzones/src/
3 KB
2 KB
Script
General
Full URL
https://www.wired.com/hotzones/src/pixelpropagate.js?cb=10147
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.194 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
4219ec36338b5bca5a8c8d749ad11a8fa5fec825f47f3376a7b802b7fc7129fa
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
Strict-Transport-Security max-age=31536000; preload

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
content-encoding
gzip
vary
accept-encoding, accept-payment, Verso
age
74082
x-cache
HIT
status
200
hz-zone
1
content-length
1290
x-served-by
cache-fra19180-FRA
strict-transport-security
max-age=31536000; preload
content-type
application/javascript; charset=utf-8
via
1.1 varnish
cache-control
no-cache
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
accept-ranges
bytes
apple-news-services-host
hotzones.condenastdigital.com
x-cache-hits
183
conde-asa-polar-master.js
cdn.mediavoice.com/nativeads/script/condenastcorporate/
5 KB
2 KB
Script
General
Full URL
https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:d983 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
030e91b7512dbb40e9b9057f20bcf54c296a7f28c04bbcde0f2d2706dd2a3a06

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
content-encoding
gzip
cf-cache-status
HIT
age
19898
cf-ray
596f6b34e8b7176a-FRA
status
200
cf-ipcountry
DE
x-country
DE
content-length
2018
cf-request-id
02d981550e0000176a6b1ea200000001
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-varnish
2135348940 2134958804
via
1.1 varnish
cache-control
max-age=21600
accept-ranges
bytes
content-type
text/javascript
compiler-3c4cda484cce7332a0a83c8ce78c6065.js
journey-service-assets-prod.s3.amazonaws.com/wired/
84 KB
84 KB
Script
General
Full URL
https://journey-service-assets-prod.s3.amazonaws.com/wired/compiler-3c4cda484cce7332a0a83c8ce78c6065.js
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.216.171.171 Ashburn, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
s3-1-w.amazonaws.com
Software
AmazonS3 /
Resource Hash
628a11ad88031678aa11f713f36b3105a81d5d8dffee565e44938f817c0efa6a

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 15:44:27 GMT
Last-Modified
Wed, 20 May 2020 18:18:38 GMT
Server
AmazonS3
x-amz-request-id
9FE8B9E78DB005D3
ETag
"3c4cda484cce7332a0a83c8ce78c6065"
Content-Type
text/javascript
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
Content-Length
85831
x-amz-id-2
uG3xpZe6TpQq8BKjPxgHfU49Dzx1ImZTYeBxL/VebICralNmZdRexRNeSGCmEAR1wEIdqgKruDA=
93ddfe0c-4b21-4ad5-8191-612d2a67aad3.json
cdn.cookielaw.org/consent/93ddfe0c-4b21-4ad5-8191-612d2a67aad3/
3 KB
2 KB
XHR
General
Full URL
https://cdn.cookielaw.org/consent/93ddfe0c-4b21-4ad5-8191-612d2a67aad3/93ddfe0c-4b21-4ad5-8191-612d2a67aad3.json
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/otSDKStub.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:1cb7:261b:1f9c:2074:3c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (frc/8F99) /
Resource Hash
ba5e25c94f1b1efc320ba31fc7c24316f399e163589d9dc9a30223fa076b8377

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Thu, 21 May 2020 15:44:26 GMT
content-encoding
gzip
content-md5
KDsDKJFl6upmM3leC7/M8g==
age
14078
x-cache
HIT
status
200
content-length
1179
x-ms-lease-status
unlocked
last-modified
Thu, 07 May 2020 17:02:03 GMT
server
ECAcc (frc/8F99)
etag
0x8D7F2A85DB54FA5
vary
Accept-Encoding
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
1554ecec-601e-00a3-2465-2f1487000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Thu, 21 May 2020 19:44:26 GMT
BreveText-Book.62feed0763a8ec2bb2c0a2f9d02cf1b771d70a8b.woff2
www.wired.com/verso/static/wired/assets/fonts/
30 KB
31 KB
Font
General
Full URL
https://www.wired.com/verso/static/wired/assets/fonts/BreveText-Book.62feed0763a8ec2bb2c0a2f9d02cf1b771d70a8b.woff2
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.194 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx/1.15.8 /
Resource Hash
10340f39d66718f64e28a9cbcceb4a93cbe2190e9f720bc0ab2ea7c138042c29
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
Strict-Transport-Security max-age=31536000; preload

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/verso/static/wired/styles.min.49931209c89a0ba91548fe5430ca117638b86c6d.css
Origin
https://www.wired.com

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
via
1.1 varnish
age
1700
x-cache
HIT
status
200
x-ua-device
desktop
apple-news-services-parsed-url
/verso/static/wired/assets/fonts/BreveText-Book.62feed0763a8ec2bb2c0a2f9d02cf1b771d70a8b.woff2
last-modified
Thu, 21 May 2020 15:14:49 GMT
strict-transport-security
max-age=31536000; preload
content-length
30748
x-amz-id-2
UvPdZYGJqmNk2ecFy2+fbOwW3RGz2g6n9YYd6zK34VOIHuN9B3Z+lgitRD/wVtfsGEFHKheCRag=
x-served-by
cache-fra19180-FRA
apple-news-services-handled
false
server
nginx/1.15.8
x-timer
S1590075866.398130,VS0,VE0
apple-news-services-request-url
/verso/static/wired/assets/fonts/BreveText-Book.62feed0763a8ec2bb2c0a2f9d02cf1b771d70a8b.woff2
etag
"d8195648963952e74c66351d0f717420"
vary
accept-encoding
x-amz-request-id
3B54FEC637AC90CE
access-control-allow-origin
https://www.wired.com
expires
Fri, 21 May 2021 15:16:06 GMT
cache-control
max-age=31536000, immutable
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
accept-ranges
bytes
content-type
binary/octet-stream
apple-news-services-host
verso-prod.conde.io
x-cache-hits
3
WiredMono-Bold.f38381a632f7cc55805bc2364ff67a6e133a7775.woff2
www.wired.com/verso/static/wired/assets/fonts/
19 KB
20 KB
Font
General
Full URL
https://www.wired.com/verso/static/wired/assets/fonts/WiredMono-Bold.f38381a632f7cc55805bc2364ff67a6e133a7775.woff2
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.194 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx/1.15.8 /
Resource Hash
536b8a929f01af82ee8f415a6c0c7c5cda248751a9ac3dbcf6db5dd680d053b2
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
Strict-Transport-Security max-age=31536000; preload

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/verso/static/wired/styles.min.49931209c89a0ba91548fe5430ca117638b86c6d.css
Origin
https://www.wired.com

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
via
1.1 varnish
age
478
x-cache
HIT
status
200
x-ua-device
desktop
apple-news-services-parsed-url
/verso/static/wired/assets/fonts/WiredMono-Bold.f38381a632f7cc55805bc2364ff67a6e133a7775.woff2
last-modified
Thu, 21 May 2020 15:31:32 GMT
strict-transport-security
max-age=31536000; preload
content-length
19584
x-amz-id-2
sVnSoSpzJ7meun/ZMBNZM14xXzH55a+J5+E5Kb61j/nENQea6V26iwCaqcpEP38NBTIeGHjwyac=
x-served-by
cache-fra19180-FRA
apple-news-services-handled
false
server
nginx/1.15.8
x-timer
S1590075866.398569,VS0,VE0
apple-news-services-request-url
/verso/static/wired/assets/fonts/WiredMono-Bold.f38381a632f7cc55805bc2364ff67a6e133a7775.woff2
etag
"09567cf6b650e11a7d15f821bb47155f"
vary
accept-encoding,Origin
x-amz-request-id
E3A7CFC5464CD69E
access-control-allow-origin
https://www.wired.com
expires
Fri, 21 May 2021 15:36:27 GMT
cache-control
max-age=31536000, immutable
access-control-allow-credentials
true
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
accept-ranges
bytes
content-type
binary/octet-stream
apple-news-services-host
verso-prod.conde.io
x-cache-hits
2
ProximaNova-Regular.92f7a924e05bd7cde39cb429a7057bb0c291946f.woff2
www.wired.com/verso/static/wired/assets/fonts/
21 KB
22 KB
Font
General
Full URL
https://www.wired.com/verso/static/wired/assets/fonts/ProximaNova-Regular.92f7a924e05bd7cde39cb429a7057bb0c291946f.woff2
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.194 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx/1.15.8 /
Resource Hash
501ed6d7c49a3526af1f804fff30cc8b7b8608525b100f4140b7504cc5afd4bd
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
Strict-Transport-Security max-age=31536000; preload

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/verso/static/wired/styles.min.49931209c89a0ba91548fe5430ca117638b86c6d.css
Origin
https://www.wired.com

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
via
1.1 varnish
age
2986
x-cache
HIT
status
200
x-ua-device
desktop
apple-news-services-parsed-url
/verso/static/wired/assets/fonts/ProximaNova-Regular.92f7a924e05bd7cde39cb429a7057bb0c291946f.woff2
last-modified
Thu, 21 May 2020 14:42:50 GMT
strict-transport-security
max-age=31536000; preload
content-length
21824
x-amz-id-2
6B6sPgV0kJ6yH9fKpjahxYm55sd4sznfHEnu1EK3S6MoQdHHRmAc2xWXixh3UdiE5V6/HlLkkYU=
x-served-by
cache-fra19180-FRA
apple-news-services-handled
false
server
nginx/1.15.8
x-timer
S1590075866.398734,VS0,VE0
apple-news-services-request-url
/verso/static/wired/assets/fonts/ProximaNova-Regular.92f7a924e05bd7cde39cb429a7057bb0c291946f.woff2
etag
"ed723eff0e7a48ca38888d304625969e"
vary
accept-encoding,Origin
x-amz-request-id
E6CE568BF6504C5D
access-control-allow-origin
https://www.wired.com
expires
Fri, 21 May 2021 14:54:39 GMT
cache-control
max-age=31536000, immutable
access-control-allow-credentials
true
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
accept-ranges
bytes
content-type
binary/octet-stream
apple-news-services-host
verso-prod.conde.io
x-cache-hits
5
ProximaNova-Bold.78d5300fdc9cd0695dc3113b524c0d02c1ef37f7.woff2
www.wired.com/verso/static/wired/assets/fonts/
22 KB
23 KB
Font
General
Full URL
https://www.wired.com/verso/static/wired/assets/fonts/ProximaNova-Bold.78d5300fdc9cd0695dc3113b524c0d02c1ef37f7.woff2
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.194 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx/1.15.8 /
Resource Hash
6a4dac260dffc284594d633859fb508b2fcfade38b61c8af9cd55eb23adf9e89
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
Strict-Transport-Security max-age=31536000; preload

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/verso/static/wired/styles.min.49931209c89a0ba91548fe5430ca117638b86c6d.css
Origin
https://www.wired.com

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
via
1.1 varnish
age
478
x-cache
HIT
status
200
x-ua-device
desktop
apple-news-services-parsed-url
/verso/static/wired/assets/fonts/ProximaNova-Bold.78d5300fdc9cd0695dc3113b524c0d02c1ef37f7.woff2
last-modified
Thu, 21 May 2020 15:31:31 GMT
strict-transport-security
max-age=31536000; preload
content-length
22500
x-amz-id-2
aOZZhv5dheswu1JoPkr3ZLnJo6CdD6REZYqf4c/mN9kqwN5k1gnioFAOzbC4vhvKIeRRdblFD8Y=
x-served-by
cache-fra19180-FRA
apple-news-services-handled
false
server
nginx/1.15.8
x-timer
S1590075866.398719,VS0,VE0
apple-news-services-request-url
/verso/static/wired/assets/fonts/ProximaNova-Bold.78d5300fdc9cd0695dc3113b524c0d02c1ef37f7.woff2
etag
"2ee806e52a1e28138bd67a5113c99949"
vary
accept-encoding,Origin
x-amz-request-id
78A4876BD79D4FB2
access-control-allow-origin
https://www.wired.com
expires
Fri, 21 May 2021 15:36:27 GMT
cache-control
max-age=31536000, immutable
access-control-allow-credentials
true
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
accept-ranges
bytes
content-type
binary/octet-stream
apple-news-services-host
verso-prod.conde.io
x-cache-hits
2
LabGrotesque-Black.3de4f27f8565a5a9b142c677b73a60aaf2e7fda7.woff2
www.wired.com/verso/static/wired/assets/fonts/
47 KB
48 KB
Font
General
Full URL
https://www.wired.com/verso/static/wired/assets/fonts/LabGrotesque-Black.3de4f27f8565a5a9b142c677b73a60aaf2e7fda7.woff2
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.194 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx/1.15.8 /
Resource Hash
c41dc37fea212372d1f53109304ebae695e644f9ce083dcab08d5978c8c3020f
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
Strict-Transport-Security max-age=31536000; preload

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/verso/static/wired/styles.min.49931209c89a0ba91548fe5430ca117638b86c6d.css
Origin
https://www.wired.com

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
via
1.1 varnish
age
1700
x-cache
HIT
status
200
x-ua-device
desktop
apple-news-services-parsed-url
/verso/static/wired/assets/fonts/LabGrotesque-Black.3de4f27f8565a5a9b142c677b73a60aaf2e7fda7.woff2
last-modified
Thu, 21 May 2020 15:14:49 GMT
strict-transport-security
max-age=31536000; preload
content-length
47924
x-amz-id-2
wRehybnDCC8d8uQqKBzU90qf2jsaBAA+nbmdNQDJvwy97wZo1+QMv70fG9ZTjG26UGVMy6aXhqs=
x-served-by
cache-fra19180-FRA
apple-news-services-handled
false
server
nginx/1.15.8
x-timer
S1590075866.413899,VS0,VE0
apple-news-services-request-url
/verso/static/wired/assets/fonts/LabGrotesque-Black.3de4f27f8565a5a9b142c677b73a60aaf2e7fda7.woff2
etag
"44b6bf0cd9f1d027a6ca723b2024925c"
vary
accept-encoding
x-amz-request-id
3F6630252460FEE7
access-control-allow-origin
https://www.wired.com
expires
Fri, 21 May 2021 15:16:06 GMT
cache-control
max-age=31536000, immutable
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
accept-ranges
bytes
content-type
binary/octet-stream
apple-news-services-host
verso-prod.conde.io
x-cache-hits
3
WiredMono-Regular.1365fda86242df545e36b36b03dbfea6d25429db.woff2
www.wired.com/verso/static/wired/assets/fonts/
18 KB
19 KB
Font
General
Full URL
https://www.wired.com/verso/static/wired/assets/fonts/WiredMono-Regular.1365fda86242df545e36b36b03dbfea6d25429db.woff2
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.194 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx/1.15.8 /
Resource Hash
c8c9128b649afff93f89f77eb2aa5a4bbbb1443bebc5156d0f697780c8beaa26
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
Strict-Transport-Security max-age=31536000; preload

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/verso/static/wired/styles.min.49931209c89a0ba91548fe5430ca117638b86c6d.css
Origin
https://www.wired.com

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
via
1.1 varnish
age
0
x-cache
MISS
status
200
x-ua-device
desktop
apple-news-services-parsed-url
/verso/static/wired/assets/fonts/WiredMono-Regular.1365fda86242df545e36b36b03dbfea6d25429db.woff2
last-modified
Thu, 21 May 2020 15:37:41 GMT
strict-transport-security
max-age=31536000; preload
content-length
18912
x-amz-id-2
v4pUGrF1qGtrRkK0Alvj9569ARdYe/zaRfZx9yiL0h0sskZUYt+3X8bacbhFyBFfL3l5K899x9w=
x-served-by
cache-fra19180-FRA
apple-news-services-handled
false
server
nginx/1.15.8
x-timer
S1590075866.413872,VS0,VE142
apple-news-services-request-url
/verso/static/wired/assets/fonts/WiredMono-Regular.1365fda86242df545e36b36b03dbfea6d25429db.woff2
etag
"e755d282ae1120887b3b1d207bb930ce"
vary
accept-encoding
x-amz-request-id
2F1FC82CCE285EEF
access-control-allow-origin
https://www.wired.com
expires
Fri, 21 May 2021 15:44:26 GMT
cache-control
max-age=31536000, immutable
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
accept-ranges
bytes
content-type
binary/octet-stream
apple-news-services-host
verso-prod.conde.io
x-cache-hits
0
LabGrotesque-Bold.991e4961f449b515868e41cac05384e61bcd5783.woff2
www.wired.com/verso/static/wired/assets/fonts/
47 KB
48 KB
Font
General
Full URL
https://www.wired.com/verso/static/wired/assets/fonts/LabGrotesque-Bold.991e4961f449b515868e41cac05384e61bcd5783.woff2
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.194 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx/1.15.8 /
Resource Hash
2c667cdbe90922576bac69bbd0fa8f61d0c410748bf29b5bccea09b21123f1a0
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
Strict-Transport-Security max-age=31536000; preload

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/verso/static/wired/styles.min.49931209c89a0ba91548fe5430ca117638b86c6d.css
Origin
https://www.wired.com

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
via
1.1 varnish
age
2322
x-cache
HIT
status
200
x-ua-device
desktop
apple-news-services-parsed-url
/verso/static/wired/assets/fonts/LabGrotesque-Bold.991e4961f449b515868e41cac05384e61bcd5783.woff2
last-modified
Thu, 21 May 2020 14:42:49 GMT
strict-transport-security
max-age=31536000; preload
content-length
47856
x-amz-id-2
Qg8J2CuNtkZtTMvPtdzeR6q2/wRyCXLvLLn2gRB3zu9EinSgbsVlRdEsIzvsajYHXU9yw0zEsGk=
x-served-by
cache-fra19180-FRA
apple-news-services-handled
false
server
nginx/1.15.8
x-timer
S1590075866.413872,VS0,VE0
apple-news-services-request-url
/verso/static/wired/assets/fonts/LabGrotesque-Bold.991e4961f449b515868e41cac05384e61bcd5783.woff2
etag
"181b7a06e7a0586c230d9b6282d73532"
vary
accept-encoding,Origin
x-amz-request-id
569D7489472DF700
access-control-allow-origin
https://www.wired.com
expires
Fri, 21 May 2021 15:05:43 GMT
cache-control
max-age=31536000, immutable
access-control-allow-credentials
true
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
accept-ranges
bytes
content-type
binary/octet-stream
apple-news-services-host
verso-prod.conde.io
x-cache-hits
4
BreveText-BookItalic.a008dafcc13e2b73acf3b4ed6c93dce03af56085.woff2
www.wired.com/verso/static/wired/assets/fonts/
31 KB
31 KB
Font
General
Full URL
https://www.wired.com/verso/static/wired/assets/fonts/BreveText-BookItalic.a008dafcc13e2b73acf3b4ed6c93dce03af56085.woff2
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.194 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx/1.15.8 /
Resource Hash
6c8843cab7bd93ffbd4f3e8222770c83a7c705df738927c704b78dd5399312c5
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
Strict-Transport-Security max-age=31536000; preload

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/verso/static/wired/styles.min.49931209c89a0ba91548fe5430ca117638b86c6d.css
Origin
https://www.wired.com

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
via
1.1 varnish
age
746
x-cache
HIT
status
200
x-ua-device
desktop
apple-news-services-parsed-url
/verso/static/wired/assets/fonts/BreveText-BookItalic.a008dafcc13e2b73acf3b4ed6c93dce03af56085.woff2
last-modified
Thu, 21 May 2020 15:31:31 GMT
strict-transport-security
max-age=31536000; preload
content-length
31320
x-amz-id-2
XciAY7mMFFBqLd6y0NKsf60oeUd2i1a2A/n0y1TgWy+duAXBxouH2YBbH41e37qoePCXRYK6A1U=
x-served-by
cache-fra19180-FRA
apple-news-services-handled
false
server
nginx/1.15.8
x-timer
S1590075866.413856,VS0,VE0
apple-news-services-request-url
/verso/static/wired/assets/fonts/BreveText-BookItalic.a008dafcc13e2b73acf3b4ed6c93dce03af56085.woff2
etag
"f3252f32fa3c25e40fbe0e90b4d70ed8"
vary
accept-encoding,Origin
x-amz-request-id
81ED648631B4EFDB
access-control-allow-origin
https://www.wired.com
expires
Fri, 21 May 2021 15:31:59 GMT
cache-control
max-age=31536000, immutable
access-control-allow-credentials
true
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
accept-ranges
bytes
content-type
binary/octet-stream
apple-news-services-host
verso-prod.conde.io
x-cache-hits
2
WiredMono-Light.675517fa07266d51e6f547846e8cc547b214f415.woff2
www.wired.com/verso/static/wired/assets/fonts/
19 KB
20 KB
Font
General
Full URL
https://www.wired.com/verso/static/wired/assets/fonts/WiredMono-Light.675517fa07266d51e6f547846e8cc547b214f415.woff2
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.194 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx/1.15.8 /
Resource Hash
4ebda303d2d279d0a564e94e0ef19948f0efaf372d06186eeafca2fdd2ea96ec
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
Strict-Transport-Security max-age=31536000; preload

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/verso/static/wired/styles.min.49931209c89a0ba91548fe5430ca117638b86c6d.css
Origin
https://www.wired.com

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
via
1.1 varnish
age
479
x-cache
HIT
status
200
x-ua-device
desktop
apple-news-services-parsed-url
/verso/static/wired/assets/fonts/WiredMono-Light.675517fa07266d51e6f547846e8cc547b214f415.woff2
last-modified
Thu, 21 May 2020 15:31:32 GMT
strict-transport-security
max-age=31536000; preload
content-length
19708
x-amz-id-2
B1WpNol9JNV/P6mHum7dUzn01btI9d/R7/AX9iORV6tK07dZQNGdAVITdxJeMTNpHgTsf1xmlrc=
x-served-by
cache-fra19180-FRA
apple-news-services-handled
false
server
nginx/1.15.8
x-timer
S1590075866.413836,VS0,VE0
apple-news-services-request-url
/verso/static/wired/assets/fonts/WiredMono-Light.675517fa07266d51e6f547846e8cc547b214f415.woff2
etag
"d5d143b5b564318b0c89c305761e80e0"
vary
accept-encoding,Origin
x-amz-request-id
FD03F72E0B88D3FC
access-control-allow-origin
https://www.wired.com
expires
Fri, 21 May 2021 15:36:27 GMT
cache-control
max-age=31536000, immutable
access-control-allow-credentials
true
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
accept-ranges
bytes
content-type
binary/octet-stream
apple-news-services-host
verso-prod.conde.io
x-cache-hits
2
ProximaNova-RegularItalic.04f468504023155b47fe183827425cf4be938aeb.woff2
www.wired.com/verso/static/wired/assets/fonts/
21 KB
22 KB
Font
General
Full URL
https://www.wired.com/verso/static/wired/assets/fonts/ProximaNova-RegularItalic.04f468504023155b47fe183827425cf4be938aeb.woff2
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.194 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx/1.15.8 /
Resource Hash
cbbd82b565752ab2672917046b1bbefab73e497ca45e1f1e7e77c9a8656e566a
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
Strict-Transport-Security max-age=31536000; preload

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/verso/static/wired/styles.min.49931209c89a0ba91548fe5430ca117638b86c6d.css
Origin
https://www.wired.com

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
via
1.1 varnish
age
2322
x-cache
HIT
status
200
x-ua-device
desktop
apple-news-services-parsed-url
/verso/static/wired/assets/fonts/ProximaNova-RegularItalic.04f468504023155b47fe183827425cf4be938aeb.woff2
last-modified
Thu, 21 May 2020 14:42:50 GMT
strict-transport-security
max-age=31536000; preload
content-length
21848
x-amz-id-2
9X49hlEQi7oukXm3h2EQUg7ErNVabgrZbi1LrzMfPASTB1XFfNUXY9zfVpDBNuJucFfx1ITP/sg=
x-served-by
cache-fra19180-FRA
apple-news-services-handled
false
server
nginx/1.15.8
x-timer
S1590075866.413817,VS0,VE0
apple-news-services-request-url
/verso/static/wired/assets/fonts/ProximaNova-RegularItalic.04f468504023155b47fe183827425cf4be938aeb.woff2
etag
"12174273c076d40c0bc2801bdd166c76"
vary
accept-encoding,Origin
x-amz-request-id
0F2CADC62D68AB99
access-control-allow-origin
https://www.wired.com
expires
Fri, 21 May 2021 15:05:43 GMT
cache-control
max-age=31536000, immutable
access-control-allow-credentials
true
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
accept-ranges
bytes
content-type
binary/octet-stream
apple-news-services-host
verso-prod.conde.io
x-cache-hits
4
condenast-amp
segment-data.zqtk.net/
312 B
512 B
XHR
General
Full URL
https://segment-data.zqtk.net/condenast-amp?url=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.19.1.241 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-19-1-241.eu-west-1.compute.amazonaws.com
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
9a3fdde70b9ad404bcdddaaa860bf64199b4127b36bb4bc92a29de4554c80edf

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 15:44:26 GMT
Content-Encoding
gzip
Server
nginx/1.10.3 (Ubuntu)
Content-Type
application/javascript; charset=UTF-8
Access-Control-Allow-Origin
https://www.wired.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
171
Expires
Sat, 23 May 2020 14:15:21 GMT
ads.js
www.wired.com/hotzones/src/
0
140 B
XHR
General
Full URL
https://www.wired.com/hotzones/src/ads.js
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.194 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
Strict-Transport-Security max-age=31536000; preload

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
via
1.1 varnish
vary
accept-payment, accept-encoding, Verso
age
80737
x-cache
HIT
status
200
hz-zone
1
content-length
0
x-served-by
cache-fra19180-FRA
strict-transport-security
max-age=31536000; preload
content-type
application/javascript; charset=utf-8
cache-control
no-cache
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
accept-ranges
bytes
apple-news-services-host
hotzones.condenastdigital.com
x-cache-hits
250
user-context
www.wired.com/
746 B
1 KB
Script
General
Full URL
https://www.wired.com/user-context?referrer=&verso=true&paymentForm=sample&location=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.194 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx/1.15.8 /
Resource Hash
5e925a3862f051cf07a1765993c637a45904c2a01c7b03cf1f5bf291bcf551e6
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
Strict-Transport-Security max-age=31536000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
via
1.1 varnish
x-content-type-options
nosniff
x-cache
MISS
status
200
content-encoding
br
vary
origin, Accept-Encoding
x-xss-protection
1; mode=block
x-served-by
cache-fra19180-FRA
expires
0
server
nginx/1.15.8
x-frame-options
DENY
x-download-options
noopen
strict-transport-security
max-age=31536000; preload
content-type
application/javascript; charset=utf-8
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
accept-ranges
bytes, none
apple-news-services-host
user-context.condenastdigital.com
x-cache-hits
0
wired.config.js
pixel.condenastdigital.com/config/v2/production/
8 KB
2 KB
Script
General
Full URL
https://pixel.condenastdigital.com/config/v2/production/wired.config.js
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.239 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
5bcf0c63c2f150085ff274e305eaa787bb317877a59260f7cecdcda417a555e5

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 15:44:26 GMT
Content-Encoding
gzip
Age
81187
X-Cache
HIT, HIT
Connection
keep-alive
Content-Length
1212
x-amz-id-2
m+0dQNExndV/xgK5ru6fyOlMfO+0O4DrJYAo+kCJwTTKn12XwL2kQ9P/RewZ7Q9j6QXyuv/dX2A=
X-Served-By
cache-bwi5134-BWI, cache-hhn4038-HHN
Access-Control-Allow-Origin
*
Last-Modified
Wed, 08 Apr 2020 17:17:38 GMT
Server
AmazonS3
X-Timer
S1590075867.793694,VS0,VE0
ETag
"6a722c4e4dc9b63ab303975109b9e569"
Vary
Accept-Encoding
x-amz-request-id
7FF5463DFB74A253
Via
1.1 varnish, 1.1 varnish
Expires
Wed, 08 Apr 2020 23:17:37 GMT
Cache-Control
no-cache, public, max-age=604800
Accept-Ranges
bytes
Content-Type
application/javascript
X-Cache-Hits
1, 244
location
geolocation.onetrust.com/cookieconsentpub/v1/geo/
115 B
492 B
Script
General
Full URL
https://geolocation.onetrust.com/cookieconsentpub/v1/geo/location
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/otSDKStub.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:b944 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
6109d5731632d64df9eb483fcde4fb912fbe0e95eab63b7db6739f7a3f6ee757
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
content-encoding
gzip
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
status
200
strict-transport-security
max-age=31536000; includeSubDomains; preload
cf-ray
596f6b36cb31975a-FRA
cf-request-id
02d981563a0000975afcb51200000001
plugin.js
plugin.mediavoice.com/
345 KB
128 KB
Script
General
Full URL
https://plugin.mediavoice.com/plugin.js
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:d983 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c1f439082455a6528a746987a156e264aa3e6b46f22dec148b98584e2778b048

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
content-encoding
gzip
cf-cache-status
HIT
age
19666
status
200
content-type
application/javascript
content-length
130502
cf-request-id
02d98156a00000176a6b20d200000001
timing-allow-origin
*
access-control-allow-origin
*
last-modified
Wed, 13 May 2020 22:15:55 GMT
server
cloudflare
etag
W/"5ebc719b-5659d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, OPTIONS
x-varnish
2024542915 2024542912
via
1.1 varnish
cache-control
max-age=43200
access-control-allow-credentials
true
accept-ranges
bytes
cf-ray
596f6b376f93176a-FRA
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
expires
Thu, 21 May 2020 22:16:39 GMT
condenastcorporate
polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/www.wired.com/organization/
205 B
653 B
XHR
General
Full URL
https://polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/www.wired.com/organization/condenastcorporate
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2acdcfaaf92664be6fb7d44360ba5e295e35130b30e4f8b68da09b008903390e

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 21 May 2020 15:44:26 GMT
content-encoding
gzip
server
cloudflare
status
200
etag
W/"172492d3e8527e72196a3dfd62712d59"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-Country, CF-Ray
cache-control
max-age=3600
x-country
DE
cf-ray
596f6b378fddbeb0-FRA
cf-request-id
02d98156b40000beb029a48200000001
payframe
pay.google.com/gp/p/ui/ Frame 837B
0
0
Document
General
Full URL
https://pay.google.com/gp/p/ui/payframe?origin=https://www.wired.com&mid=%{merchantId}
Requested by
Host: news.google.com
URL: https://news.google.com/swg/js/v1/swg.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:400c:c06::5c Brussels, Belgium, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-6LavYtxS5STXiReQ5ntzjg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/InstantbuyFrontendBuyflowPayframeUi/cspreport;worker-src 'self' script-src 'nonce-6LavYtxS5STXiReQ5ntzjg' 'self' 'unsafe-eval' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/InstantbuyFrontendBuyflowPayframeUi/cspreport
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
pay.google.com
:scheme
https
:path
/gp/p/ui/payframe?origin=https://www.wired.com&mid=%{merchantId}
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.wired.com/story/dns-ddos-amplification-attack/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
NID=204=mhW-r5jVHDFkXj6CP_6oFI6_9CQ7ZL5cYIJZRTl2J5GXa0uP-RQWS7vcfFnO_DtAo_yP8hDeq3LS4Rch2TfD1vCuUXeWloNqcp4fFEtCAUQZW3kYOexRv3EapQU0b1GvZwz25p7TecNdEmVb0hc9FwhKNAnuEScSdWQUfijbatQ
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/story/dns-ddos-amplification-attack/

Response headers

status
200
content-type
text/html; charset=utf-8
x-ua-compatible
IE=edge
expires
Thu, 21 May 2020 15:44:26 GMT
date
Thu, 21 May 2020 15:44:26 GMT
cache-control
private, max-age=3600
content-security-policy
script-src 'report-sample' 'nonce-6LavYtxS5STXiReQ5ntzjg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/InstantbuyFrontendBuyflowPayframeUi/cspreport;worker-src 'self' script-src 'nonce-6LavYtxS5STXiReQ5ntzjg' 'self' 'unsafe-eval' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/InstantbuyFrontendBuyflowPayframeUi/cspreport
content-encoding
gzip
server
ESF
x-xss-protection
0
x-content-type-options
nosniff
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
swg-button.css
news.google.com/swg/js/v1/
19 KB
6 KB
Stylesheet
General
Full URL
https://news.google.com/swg/js/v1/swg-button.css
Requested by
Host: news.google.com
URL: https://news.google.com/swg/js/v1/swg.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
92a0a734cfe4f5aee530b12ee966e272f0ce41f44e0f2c89e8ee6d4a156f4789
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:10:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 18 Sep 2019 18:02:27 GMT
server
sffe
age
2062
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=3000
accept-ranges
bytes
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5809
x-xss-protection
0
expires
Thu, 21 May 2020 16:00:04 GMT
serviceiframe
news.google.com/swg/_/ui/v1/ Frame 7485
0
0
Document
General
Full URL
https://news.google.com/swg/_/ui/v1/serviceiframe?_=441687
Requested by
Host: news.google.com
URL: https://news.google.com/swg/js/v1/swg.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-4ZKtQCyC1LBm/dKL1KMvpw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/SubscribewithgoogleClientUi/cspreport;worker-src 'self' script-src 'nonce-4ZKtQCyC1LBm/dKL1KMvpw' 'self' 'unsafe-eval' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com https://sandbox.google.com https://payments.google.com;report-uri /_/SubscribewithgoogleClientUi/cspreport
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
news.google.com
:scheme
https
:path
/swg/_/ui/v1/serviceiframe?_=441687
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.wired.com/story/dns-ddos-amplification-attack/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
NID=204=mhW-r5jVHDFkXj6CP_6oFI6_9CQ7ZL5cYIJZRTl2J5GXa0uP-RQWS7vcfFnO_DtAo_yP8hDeq3LS4Rch2TfD1vCuUXeWloNqcp4fFEtCAUQZW3kYOexRv3EapQU0b1GvZwz25p7TecNdEmVb0hc9FwhKNAnuEScSdWQUfijbatQ
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/story/dns-ddos-amplification-attack/

Response headers

status
200
content-type
text/html; charset=utf-8
x-ua-compatible
IE=edge
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Thu, 21 May 2020 15:44:26 GMT
strict-transport-security
max-age=31536000
content-security-policy
script-src 'report-sample' 'nonce-4ZKtQCyC1LBm/dKL1KMvpw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/SubscribewithgoogleClientUi/cspreport;worker-src 'self' script-src 'nonce-4ZKtQCyC1LBm/dKL1KMvpw' 'self' 'unsafe-eval' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com https://sandbox.google.com https://payments.google.com;report-uri /_/SubscribewithgoogleClientUi/cspreport
content-encoding
gzip
server
ESF
x-xss-protection
0
x-content-type-options
nosniff
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
loader.svg
news.google.com/swg/js/v1/
0
1 KB
Other
General
Full URL
https://news.google.com/swg/js/v1/loader.svg
Requested by
Host: news.google.com
URL: https://news.google.com/swg/js/v1/swg.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:18:19 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 16 Mar 2020 18:14:05 GMT
server
sffe
age
1567
vary
Accept-Encoding
content-type
image/svg+xml
status
200
cache-control
public, max-age=3000
accept-ranges
bytes
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1049
x-xss-protection
0
expires
Thu, 21 May 2020 16:08:19 GMT
pay
pay.google.com/gp/p/ui/
0
0
Other
General
Full URL
https://pay.google.com/gp/p/ui/pay?_=441687
Requested by
Host: news.google.com
URL: https://news.google.com/swg/js/v1/swg.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:400c:c06::5c Brussels, Belgium, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

m=b2,aist,ist,qst
www.gstatic.com/_/billing/_/js/k=billing.ims.en_US.B_Fs6dOxPaQ.O/am=lQAS/d=1/ct=zgms/rs=AChpKPCZYwK4VKk4x6qY4meEqGZaY6qsfw/
Redirect Chain
  • https://payments.google.com/payments/v4/js/integrator.js?ss=md
  • https://www.gstatic.com/_/billing/_/js/k=billing.ims.en_US.B_Fs6dOxPaQ.O/am=lQAS/d=1/ct=zgms/rs=AChpKPCZYwK4VKk4x6qY4meEqGZaY6qsfw/m=b2,aist,ist,qst
0
83 KB
Other
General
Full URL
https://www.gstatic.com/_/billing/_/js/k=billing.ims.en_US.B_Fs6dOxPaQ.O/am=lQAS/d=1/ct=zgms/rs=AChpKPCZYwK4VKk4x6qY4meEqGZaY6qsfw/m=b2,aist,ist,qst
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 20 May 2020 16:52:55 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 20 May 2020 16:25:48 GMT
server
sffe
age
82292
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
84486
x-xss-protection
0
expires
Thu, 20 May 2021 16:52:55 GMT

Redirect headers

date
Thu, 21 May 2020 15:44:27 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
301
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
270
x-xss-protection
1; mode=block
pragma
no-cache
server
GSE
x-frame-options
DENY
strict-transport-security
max-age=31536000; includeSubDomains
content-type
text/html; charset=UTF-8
location
https://www.gstatic.com/_/billing/_/js/k=billing.ims.en_US.B_Fs6dOxPaQ.O/am=lQAS/d=1/ct=zgms/rs=AChpKPCZYwK4VKk4x6qY4meEqGZaY6qsfw/m=b2,aist,ist,qst
cache-control
no-cache, no-store, max-age=0, must-revalidate
content-security-policy
base-uri 'self';object-src clients2.google.com/gr/GrDataFetcher.swf;report-uri /payments/cspreport;script-src 'report-sample' 'nonce-IjROtcEpXlGvHPIHswahvA' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval'
expires
Mon, 01 Jan 1990 00:00:00 GMT
gr_full_2.0.6.js
clients2.google.com/gr/
0
9 KB
Other
General
Full URL
https://clients2.google.com/gr/gr_full_2.0.6.js
Requested by
Host: news.google.com
URL: https://news.google.com/swg/js/v1/swg.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:01:31 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 22 Oct 2019 18:30:00 GMT
server
sffe
age
2575
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
8665
x-xss-protection
0
expires
Thu, 21 May 2020 16:01:31 GMT
entitlements
news.google.com/swg/_/api/v1/publication/wired.com/
2 B
696 B
Fetch
General
Full URL
https://news.google.com/swg/_/api/v1/publication/wired.com/entitlements
Requested by
Host: news.google.com
URL: https://news.google.com/swg/js/v1/swg.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-48BdGcaR48r8L4pgRCVQMw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/SubscribewithgoogleClientHttp/cspreport;worker-src 'self', script-src 'nonce-48BdGcaR48r8L4pgRCVQMw' 'self' 'unsafe-eval' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/SubscribewithgoogleClientHttp/cspreport
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Accept
text/plain, application/json
Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:26 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
content-disposition
attachment; filename="json.txt"; filename*=UTF-8''json.txt
strict-transport-security
max-age=31536000
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
pragma
no-cache
server
ESF
x-frame-options
SAMEORIGIN
access-control-allow-methods
GET, POST
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.wired.com
cache-control
no-cache, no-store, max-age=0, must-revalidate
access-control-allow-credentials
true
content-security-policy
script-src 'report-sample' 'nonce-48BdGcaR48r8L4pgRCVQMw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/SubscribewithgoogleClientHttp/cspreport;worker-src 'self', script-src 'nonce-48BdGcaR48r8L4pgRCVQMw' 'self' 'unsafe-eval' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/SubscribewithgoogleClientHttp/cspreport
expires
Mon, 01 Jan 1990 00:00:00 GMT
yi.js
mb.moatads.com/
2 KB
2 KB
Script
General
Full URL
https://mb.moatads.com/yi.js?ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=3321063859&tf=nMzjG---CSa7H-XSSptC-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJeRzBqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&confidence=2&pcode=condenastprebidheader987326845656&callback=MoatNadoAllJsonpRequest_8068461
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/condenastprebidheader987326845656/moatheader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.11.4.3 London, United Kingdom, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-11-4-3.eu-west-2.compute.amazonaws.com
Software
TornadoServer/4.5.3 /
Resource Hash
619e8626d26a1cc843229a6b1dc779f1559e0db9baa63ddb3e85ce54627c96c5

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:27 GMT
server
TornadoServer/4.5.3
etag
"46be3045e97c6212ff1598a63a1b072fec641f65"
content-type
text/html; charset=UTF-8
status
200
cache-control
max-age=900
timing-allow-origin
*
content-length
1570
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&t=1590075866843&de=316970992440&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=31f9dba90d-clean&iw=96661e7&zMoatRendered=0&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=0&zMoatSafetyTargetingSet=0&zMoatEmptySlot=0&zMoatNadoDataLoadTime=Not%20Loaded&zMoatAllDataLoadTime=Not%20Loaded&bo=wired.com&bd=wired.com%2Fstory%2Fdns-ddos-amplification-attack&ac=1&bq=11&f=0&na=855521132&cs=0
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
72.247.226.64 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-226-64.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:26 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 21 May 2020 15:44:26 GMT
integrator.js
adservice.google.ee/adsid/
109 B
952 B
Script
General
Full URL
https://adservice.google.ee/adsid/integrator.js?domain=www.wired.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 21 May 2020 15:44:27 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
168 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.wired.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 21 May 2020 15:44:26 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
104
x-xss-protection
0
pubads_impl_2020050602.js
securepubads.g.doubleclick.net/gpt/
243 KB
87 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
sffe /
Resource Hash
c4b5c1f949f059e3abb05ddcb7cc9944f8c16811e0eb1db9003bc5f8a4eb0634
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:27 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 06 May 2020 17:23:28 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
89224
x-xss-protection
0
expires
Thu, 21 May 2020 15:44:27 GMT
aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.153.170 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-153-170.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
06b99248a163333e36980a6cfb756f1a7de60fa49517162b87b1a44d5d48f844

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 09:17:15 GMT
content-encoding
gzip
vary
Origin
age
23233
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Thu, 09 Apr 2020 23:46:54 GMT
server
AmazonS3
access-control-max-age
3000
access-control-allow-methods
GET
content-type
application/javascript
via
1.1 c0486ca54d4ad5a3da496bc2b5f49cd2.cloudfront.net (CloudFront)
cache-control
public, max-age=86400
x-amz-cf-pop
FRA53
x-amz-cf-id
aSEtQDRt0F6dYTZIkid49lRPl7g44x5R7oPmeMeD5As8BiCqA1dwNg==
p.js
cdn.parsely.com/keys/wired.com/
49 KB
19 KB
Script
General
Full URL
https://cdn.parsely.com/keys/wired.com/p.js
Requested by
Host: d1z2jf7jlzjs58.cloudfront.net
URL: https://d1z2jf7jlzjs58.cloudfront.net/p.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.153.129 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-153-129.fra53.r.cloudfront.net
Software
nginx /
Resource Hash
21bea58395f0362fbc352ce2c8827aa0376b95919c0f78616d007f222fd3ec1d

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
public
date
Thu, 21 May 2020 02:12:18 GMT
content-encoding
gzip
last-modified
Thu, 14 May 2020 21:32:28 GMT
server
nginx
age
48723
etag
"5ebdb8ec-c41a"
x-cache
Hit from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=86400, public
x-amz-cf-pop
FRA53
x-amz-cf-id
jCiu7JRRxS1Alq8QcEYdE9UGxEyKIeMPw7hY9tziud47WYNXGkpiJQ==
via
1.1 ec6662ba477736a13086dd664a1145be.cloudfront.net (CloudFront)
expires
Fri, 22 May 2020 02:12:18 GMT
wired-hosted-content.js
polarcdn-terrax.com/nativeads/script/condenastcorporate/
4 KB
2 KB
Script
General
Full URL
https://polarcdn-terrax.com/nativeads/script/condenastcorporate/wired-hosted-content.js
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
da90591c9ef883242935c4c8584f60f000e5c405138df57ab2cb1e2353a6db89

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:27 GMT
content-encoding
gzip
cf-cache-status
HIT
age
19294
cf-ray
596f6b38cca4d729-FRA
status
200
content-length
1683
cf-request-id
02d98157780000d729543f1200000001
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-varnish
2135362330 2135037216
via
1.1 varnish
cache-control
max-age=21600
accept-ranges
bytes
content-type
text/javascript
otBannerSdk.js
cdn.cookielaw.org/scripttemplates/5.15.0/
304 KB
67 KB
Script
General
Full URL
https://cdn.cookielaw.org/scripttemplates/5.15.0/otBannerSdk.js
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/otSDKStub.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:1cb7:261b:1f9c:2074:3c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (frc/8FB0) /
Resource Hash
0143251fc6233ab3db13575f4e5208ca169f7fc18ac72d5a6f62901d94aa6f22

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Thu, 21 May 2020 15:44:26 GMT
content-encoding
gzip
content-md5
cyq3+Z4DcEJk/dYwcUu3dw==
age
14204
x-cache
HIT
status
200
content-length
68064
x-ms-lease-status
unlocked
last-modified
Mon, 18 May 2020 06:40:25 GMT
server
ECAcc (frc/8FB0)
etag
0x8D7FAF658874614
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
x-ms-request-id
ef871c83-001e-0091-3165-2f4c57000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Thu, 21 May 2020 19:44:26 GMT
widgets.js
platform.twitter.com/
96 KB
29 KB
Script
General
Full URL
https://platform.twitter.com/widgets.js
Requested by
Host: www.wired.com
URL: https://www.wired.com/verso/static/presenter-articles.a47ebf95dbdbab8d1622fbabaeed5c753cb66b90.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
192.229.233.25 Los Angeles, United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (ska/F70E) /
Resource Hash
cb88bf7a67ba917b5ee7b4a1cc593d8bfe94cf2670cb24df338308ec8a573ec3

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 15:44:27 GMT
Content-Encoding
gzip
Last-Modified
Tue, 12 May 2020 17:25:55 GMT
Server
ECS (ska/F70E)
Age
1185
Etag
"580310dcde7e145486d79be6e5257680+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=1800
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
29223
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
590a4a94fd2e610c45000008.js
player.cnevids.com/script/video/
63 KB
21 KB
Script
General
Full URL
https://player.cnevids.com/script/video/590a4a94fd2e610c45000008.js?autoplay=1&muted=1&onReady=onReady15900758672450&isRightRail=false&onIframeReady=onIframeReady15900758672451
Requested by
Host: www.wired.com
URL: https://www.wired.com/verso/static/presenter-articles.a47ebf95dbdbab8d1622fbabaeed5c753cb66b90.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.149.47 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-149-47.fra53.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
62613bb9556edcebb738c00f6d92adf150ddfe4bb87a2f2b9a390e5516064ea6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 15:44:27 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Amz-Cf-Pop
FRA53
Transfer-Encoding
chunked
X-Cache
Miss from cloudfront
Status
200 OK
Connection
keep-alive
X-XSS-Protection
1; mode=block
X-Request-Id
61d21407-e188-491f-87d0-64496945b714
X-Runtime
0.010621
X-Backend-Node
10.110.72.103
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"d25f154ee3136cc8eef941b58398bb4c"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 b74a7a3f7ddfd685212e870d027c332d.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Id
yR1MH2KjnM7IPca31WA3zSR-6wvHylHhAdEGi8XwO6csl_-L-Vq33Q==
gtm.js
www.googletagmanager.com/
441 KB
107 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-5HBJC2K&l=dataLayer
Requested by
Host: www.wired.com
URL: https://www.wired.com/verso/static/presenter-articles.a47ebf95dbdbab8d1622fbabaeed5c753cb66b90.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
3c6bd85185b499d4cde3313647385f8654d843599f231f15ecf6b7af3fb35e69
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:27 GMT
content-encoding
br
server
Google Tag Manager
access-control-allow-headers
Cache-Control
status
200
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
strict-transport-security
max-age=31536000; includeSubDomains
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
109742
x-xss-protection
0
expires
Thu, 21 May 2020 15:44:27 GMT
beacon
infinityid.condenastdigital.com/infinityid/
35 B
911 B
Image
General
Full URL
https://infinityid.condenastdigital.com/infinityid/beacon?id=74c407ba-cc71-4c85-94c2-5a307e44f09c
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.231.184.25 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-231-184-25.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 15:44:28 GMT
Server
nginx/1.15.8
vary
origin
Content-Type
image/gif
cache-control
no-cache, no-store, must-revalidate
Connection
keep-alive
accept-ranges
bytes
Content-Length
35
expires
0
sparrow.min.js
pixel.condenastdigital.com/
38 KB
14 KB
Script
General
Full URL
https://pixel.condenastdigital.com/sparrow.min.js
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.239 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
dbec28c132b47c8b69754cedc1ff5f079ce181a434fbd7e1ae3d0aecf5bb2866

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 15:44:27 GMT
Content-Encoding
gzip
Age
176462
X-Cache
HIT, HIT
Connection
keep-alive
Content-Length
13621
x-amz-id-2
TCRg+YvmtI2WNyYhuEPsKSJ1KRYWcO3p6xe63z1ISFn5ahiP7mcxvvxJibAwUR5u8Xpw53+fiQo=
X-Served-By
cache-bwi5134-BWI, cache-hhn4038-HHN
Access-Control-Allow-Origin
*
Last-Modified
Tue, 28 Apr 2020 14:42:52 GMT
Server
AmazonS3
X-Timer
S1590075867.496712,VS0,VE0
ETag
"c90f5f7d29013601806c52db19154a08"
Vary
Accept-Encoding
x-amz-request-id
55BCE1F7BED8180E
Via
1.1 varnish, 1.1 varnish
Expires
Tue, 28 Apr 2020 20:47:09 GMT
Cache-Control
no-cache, public, max-age=604800
Accept-Ranges
bytes
Content-Type
application/javascript
X-Cache-Hits
1, 3348
dsn_security_edit_2_sorry.mp4
media.wired.com/clips/5ec330f5d58e99fafced80a1/1080p/pass/
2 MB
2 MB
Media
General
Full URL
https://media.wired.com/clips/5ec330f5d58e99fafced80a1/1080p/pass/dsn_security_edit_2_sorry.mp4
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.239 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
2d1fcd899833ec489afd68cf5a626833c5bd960764073afb618adcc997a360c1

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-

Response headers

experience
vulcan
Date
Thu, 21 May 2020 15:44:27 GMT
Age
225460
etag
"2"
X-Served-By
cache-bwi5124-BWI, cache-hhn4062-HHN
X-Cache
HIT, HIT
Content-Type
video/mp4
Content-Range
bytes 0-2294128/2294129
cache-control
max-age=31536, must-revalidate, public
Connection
keep-alive
Accept-Ranges
bytes, bytes
X-Timer
S1590075868.585376,VS0,VE1
Content-Length
2294129
X-Cache-Hits
1, 0
recommendations
api.condenast.io/v1/
24 KB
8 KB
Fetch
General
Full URL
https://api.condenast.io/v1/recommendations?applicationID=wired-right-rail&brand=wired&url=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&exclude%5Bcategory%5D=functional-tags%2Fno-river&filter%5BnumberOfDays%5D=-30&filter%5Bstrategy%5D=POPULAR&page%5Bsize%5D=4&xid=74c407ba-cc71-4c85-94c2-5a307e44f09c&filter%5BcontentType%5D=ARTICLE&filter%5BcontentType%5D=REVIEW&filter%5BcontentType%5D=GALLERY
Requested by
Host: www.wired.com
URL: https://www.wired.com/verso/static/presenter-articles.a47ebf95dbdbab8d1622fbabaeed5c753cb66b90.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.12.239 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx/1.15.8 /
Resource Hash
d253202b59d21e4da6eae7199420838797d0250c04cbd2a38eeabc96cc4320df

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 15:44:27 GMT
content-encoding
gzip
X-Backend
2SrKDXXFWNz87LdtRpzPzK--F_api_eu_central_1_condenast_io
Age
0
X-Cache
MISS
Connection
keep-alive
Content-Length
7382
X-Served-By
cache-fra19170-FRA
access-control-allow-origin
https://www.wired.com
Server
nginx/1.15.8
X-Timer
S1590075868.837130,VS0,VE125
Vary
origin,accept-encoding, Accept-Encoding, Origin
Content-Type
application/json;charset=utf-8
Via
1.1 varnish
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
max-age=600, must-revalidate, public
access-control-allow-credentials
true
Accept-Ranges
bytes
X-Cache-Hits
0
/
polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/ Frame 4EA2
0
0
Document
General
Full URL
https://polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/
Requested by
Host: plugin.mediavoice.com
URL: https://plugin.mediavoice.com/plugin.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

:method
GET
:authority
polarcdn-terrax.com
:scheme
https
:path
/privacy/v1.0.0/html/optout/readwrite/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Thu, 21 May 2020 15:44:27 GMT
content-type
text/html; charset=utf-8
content-length
1291
set-cookie
__cfduid=d73c14902c3d26992166614569ac70db91590075867; expires=Sat, 20-Jun-20 15:44:27 GMT; path=/; domain=.polarcdn-terrax.com; HttpOnly; SameSite=Lax
vary
Accept-Encoding
access-control-allow-headers
Authorization
access-control-expose-headers
CF-IPCountry, X-Country, CF-Ray
cache-control
max-age=900
access-control-allow-origin
*
access-control-allow-methods
GET
timing-allow-origin
*
content-encoding
gzip
x-varnish
2135823907 2135821326
age
398
via
1.1 varnish
cf-cache-status
HIT
accept-ranges
bytes
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
596f6b3cbf30d729-FRA
cf-request-id
02d98159f30000d72954036200000001
en.json
cdn.cookielaw.org/consent/93ddfe0c-4b21-4ad5-8191-612d2a67aad3/ef17d20e-0b37-40e7-a82c-27f698052aea/
115 KB
20 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/consent/93ddfe0c-4b21-4ad5-8191-612d2a67aad3/ef17d20e-0b37-40e7-a82c-27f698052aea/en.json
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.15.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:1cb7:261b:1f9c:2074:3c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (frc/8EA7) /
Resource Hash
0a0651e9783e68744010b497db3ea9bda8f3483a61bb8c5b0902f06946a77acb

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Thu, 21 May 2020 15:44:27 GMT
content-encoding
gzip
content-md5
j/oKIkIRYb3IB8qTDPsK3w==
age
14000
x-cache
HIT
status
200
content-length
20309
x-ms-lease-status
unlocked
last-modified
Thu, 07 May 2020 17:02:09 GMT
server
ECAcc (frc/8EA7)
etag
0x8D7F2A8615B82FB
vary
Accept-Encoding
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
a2fe7b56-a01e-009c-0f66-2fa35b000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Thu, 21 May 2020 19:44:27 GMT
ads
securepubads.g.doubleclick.net/gampad/
400 B
697 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=4403451964970526&correlator=4439504434337096&output=ldjh&impl=fifs&adsid=NT&vrg=2020050602&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200521&iu_parts=3379%2Cconde.wired%2Cinterstitial%2Csecurity%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=1x1&ists=1&ppid=74c407bacc714c8594c25a307e44f09c&prev_scp=pos%3Dinterstitial%26ctx_slot_type%3Dout_of_page%26ctx_slot_rn%3D0%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dout_of_page_0&eri=1&cust_params=m_data%3Dwaiting%26m_safety%3Dwaiting%26m_categories%3Dwaiting%26m_mv%3Dwaiting%26m_gv%3Dwaiting%26amznbid%3D0%26amznp%3D0%26env_device_type%3Ddesktop%26ctx_template%3Dmt_article_two_column%26ctx_page_channel%3Dsecurity%26ctx_page_sub_channel%3Dcyberattacks-and-hacks%26env_server%3Dproduction%26ctx_cns_version%3D6.32.25%26ctx_page_slug%3Ddns-ddos-amplification-attack%26cnt_copilotid%3D5ec1e85cd58e99fafced8096%26cnt_platform%3Dverso%26cnt_tags%3Ddns%252Cddos%252Cinternet%252Ccybersecurity%252Csecurity%252Ccyberattacks-and-hacks%26cnt_cm%3Dcm_pay_ent_sample%252Ccm_pay_scope_none%252Ccm_pay_ent_sample_cnt_1%252Ccm_pay_ent_sample_max_4%26usr_bkt_eva%3D60%26usr_bkt_ses%3D64%26usr_bkt_pv%3D12%26usr_pvc_bs%3D1%26usr_pvc_24hr%3D1%26usr_pvc_30d%3D1%26usr_svc_30d%3D1%26usr_auth%3Dfalse%26vnd_prx_segments%3D131100%252C131118%252C121100%252C300003%252C210001%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252C240018%252C240019%252Cqx7745%252Cwmhp4i%252Ceuwba9%252Cap05we%252C65f9pd%252Cawpwvf%26usr_segments%3Dco.w2021%26vnd_4d_cached%3D0%26vnd_4d_ctx_sg%3D%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26vnd_4d_xid%3D74c407ba-cc71-4c85-94c2-5a307e44f09c&cookie_enabled=1&bc=31&abxe=1&lmt=1590075867&dt=1590075867767&dlt=1590075866087&idt=1579&frm=20&biw=1600&bih=1200&oid=3&adxs=800&adys=50&adks=3614482195&ucis=1&ifi=1&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&dssz=48&icsg=144038842797824&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1600x1&msz=1600x1&ga_vid=425008880.1590075868&ga_sid=1590075868&ga_hid=68812284&fws=0&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
4513b788c044183eced374461fcecb1dd39e42cd29cb3b0b52a4e447fad6b32b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:27 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
197
x-xss-protection
0
google-lineitem-id
-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.wired.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
container.html
249a53b1e4be45e3e794333e4c2541ab.safeframe.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://249a53b1e4be45e3e794333e4c2541ab.safeframe.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

ads
securepubads.g.doubleclick.net/gampad/
408 B
372 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=4403451964970526&correlator=4439504434337096&output=ldjh&impl=fifs&adsid=NT&vrg=2020050602&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200521&iu_parts=3379%2Cconde.wired.native%2Cin-content%2Csecurity%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=320x50&fluid=height&ppid=74c407bacc714c8594c25a307e44f09c&prev_scp=pos%3Din-content%26ctx_slot_type%3Din_content%26ctx_slot_rn%3D0%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Din_content_0&eri=1&cust_params=m_data%3Dwaiting%26m_safety%3Dwaiting%26m_categories%3Dwaiting%26m_mv%3Dwaiting%26m_gv%3Dwaiting%26amznbid%3D0%26amznp%3D0%26env_device_type%3Ddesktop%26ctx_template%3Dmt_article_two_column%26ctx_page_channel%3Dsecurity%26ctx_page_sub_channel%3Dcyberattacks-and-hacks%26env_server%3Dproduction%26ctx_cns_version%3D6.32.25%26ctx_page_slug%3Ddns-ddos-amplification-attack%26cnt_copilotid%3D5ec1e85cd58e99fafced8096%26cnt_platform%3Dverso%26cnt_tags%3Ddns%252Cddos%252Cinternet%252Ccybersecurity%252Csecurity%252Ccyberattacks-and-hacks%26cnt_cm%3Dcm_pay_ent_sample%252Ccm_pay_scope_none%252Ccm_pay_ent_sample_cnt_1%252Ccm_pay_ent_sample_max_4%26usr_bkt_eva%3D60%26usr_bkt_ses%3D64%26usr_bkt_pv%3D12%26usr_pvc_bs%3D1%26usr_pvc_24hr%3D1%26usr_pvc_30d%3D1%26usr_svc_30d%3D1%26usr_auth%3Dfalse%26vnd_prx_segments%3D131100%252C131118%252C121100%252C300003%252C210001%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252C240018%252C240019%252Cqx7745%252Cwmhp4i%252Ceuwba9%252Cap05we%252C65f9pd%252Cawpwvf%26usr_segments%3Dco.w2021%26vnd_4d_cached%3D0%26vnd_4d_ctx_sg%3D%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26vnd_4d_xid%3D74c407ba-cc71-4c85-94c2-5a307e44f09c&cookie_enabled=1&bc=31&abxe=1&lmt=1590075867&dt=1590075867792&dlt=1590075866087&idt=1579&frm=20&biw=1600&bih=1200&oid=3&adxs=214&adys=1763&adks=3600696306&ucis=2&ifi=2&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&dssz=48&icsg=144038842797824&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=716x0&msz=716x0&ga_vid=425008880.1590075868&ga_sid=1590075868&ga_hid=68812284&fws=0&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
954426dd745a222474a99bd81e34c32eee3b4fde47c298856481ed364120e34e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:27 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
204
x-xss-protection
0
google-lineitem-id
-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.wired.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
165 KB
69 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=4403451964970526&correlator=4439504434337096&output=ldjh&impl=fifs&adsid=NT&vrg=2020050602&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200521&iu_parts=3379%2Cwiredcom.cm%2Csecurity%2Ccyberattacks-and-hacks&enc_prev_ius=0%2F1%2F2%2F3&prev_iu_szs=1280x300&ppid=74c407bacc714c8594c25a307e44f09c&prev_scp=pos%3Dcm%26ctx_slot_type%3Dcm_paywall_bar_call_to_action%26ctx_slot_rn%3D0%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dcm_paywall_bar_call_to_action_0&eri=1&cust_params=m_data%3Dwaiting%26m_safety%3Dwaiting%26m_categories%3Dwaiting%26m_mv%3Dwaiting%26m_gv%3Dwaiting%26amznbid%3D0%26amznp%3D0%26env_device_type%3Ddesktop%26ctx_template%3Dmt_article_two_column%26ctx_page_channel%3Dsecurity%26ctx_page_sub_channel%3Dcyberattacks-and-hacks%26env_server%3Dproduction%26ctx_cns_version%3D6.32.25%26ctx_page_slug%3Ddns-ddos-amplification-attack%26cnt_copilotid%3D5ec1e85cd58e99fafced8096%26cnt_platform%3Dverso%26cnt_tags%3Ddns%252Cddos%252Cinternet%252Ccybersecurity%252Csecurity%252Ccyberattacks-and-hacks%26cnt_cm%3Dcm_pay_ent_sample%252Ccm_pay_scope_none%252Ccm_pay_ent_sample_cnt_1%252Ccm_pay_ent_sample_max_4%26usr_bkt_eva%3D60%26usr_bkt_ses%3D64%26usr_bkt_pv%3D12%26usr_pvc_bs%3D1%26usr_pvc_24hr%3D1%26usr_pvc_30d%3D1%26usr_svc_30d%3D1%26usr_auth%3Dfalse%26vnd_prx_segments%3D131100%252C131118%252C121100%252C300003%252C210001%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252C240018%252C240019%252Cqx7745%252Cwmhp4i%252Ceuwba9%252Cap05we%252C65f9pd%252Cawpwvf%26usr_segments%3Dco.w2021%26vnd_4d_cached%3D0%26vnd_4d_ctx_sg%3D%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26vnd_4d_xid%3D74c407ba-cc71-4c85-94c2-5a307e44f09c&cookie_enabled=1&bc=31&abxe=1&lmt=1590075867&dt=1590075867802&dlt=1590075866087&idt=1579&frm=20&biw=1600&bih=1200&oid=3&adxs=160&adys=1200&adks=1058725820&ucis=3&ifi=3&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&dssz=48&icsg=144038842797824&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1600x-1&msz=1600x-1&ga_vid=425008880.1590075868&ga_sid=1590075868&ga_hid=68812284&fws=512&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
f1500d879a60f65f592f229f7b7bc10d32f4f1f283aeb3eab647f2ad4634cfc6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:27 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
69969
x-xss-protection
0
google-lineitem-id
5371845003
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138311697870
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.wired.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
400 B
369 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=4403451964970526&correlator=4439504434337096&output=ldjh&impl=fifs&adsid=NT&vrg=2020050602&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200521&iu_parts=3379%2Cwiredcom.cm%2Csecurity%2Ccyberattacks-and-hacks&enc_prev_ius=0%2F1%2F2%2F3&prev_iu_szs=930x550&ppid=74c407bacc714c8594c25a307e44f09c&prev_scp=pos%3Dcm%26ctx_slot_type%3Dcm_paywall_inline_barrier%26ctx_slot_rn%3D0%26pos_instance%3D2%26ctx_slot_instance%3D0%26ctx_slot_name%3Dcm_paywall_inline_barrier_0&eri=1&cust_params=m_data%3Dwaiting%26m_safety%3Dwaiting%26m_categories%3Dwaiting%26m_mv%3Dwaiting%26m_gv%3Dwaiting%26amznbid%3D0%26amznp%3D0%26env_device_type%3Ddesktop%26ctx_template%3Dmt_article_two_column%26ctx_page_channel%3Dsecurity%26ctx_page_sub_channel%3Dcyberattacks-and-hacks%26env_server%3Dproduction%26ctx_cns_version%3D6.32.25%26ctx_page_slug%3Ddns-ddos-amplification-attack%26cnt_copilotid%3D5ec1e85cd58e99fafced8096%26cnt_platform%3Dverso%26cnt_tags%3Ddns%252Cddos%252Cinternet%252Ccybersecurity%252Csecurity%252Ccyberattacks-and-hacks%26cnt_cm%3Dcm_pay_ent_sample%252Ccm_pay_scope_none%252Ccm_pay_ent_sample_cnt_1%252Ccm_pay_ent_sample_max_4%26usr_bkt_eva%3D60%26usr_bkt_ses%3D64%26usr_bkt_pv%3D12%26usr_pvc_bs%3D1%26usr_pvc_24hr%3D1%26usr_pvc_30d%3D1%26usr_svc_30d%3D1%26usr_auth%3Dfalse%26vnd_prx_segments%3D131100%252C131118%252C121100%252C300003%252C210001%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252C240018%252C240019%252Cqx7745%252Cwmhp4i%252Ceuwba9%252Cap05we%252C65f9pd%252Cawpwvf%26usr_segments%3Dco.w2021%26vnd_4d_cached%3D0%26vnd_4d_ctx_sg%3D%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26vnd_4d_xid%3D74c407ba-cc71-4c85-94c2-5a307e44f09c&cookie_enabled=1&bc=31&abxe=1&lmt=1590075867&dt=1590075867808&dlt=1590075866087&idt=1579&frm=20&biw=1600&bih=1200&oid=3&adxs=214&adys=5355&adks=3026250122&ucis=4&ifi=4&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&dssz=48&icsg=144038842797824&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x550&msz=0x550&ga_vid=425008880.1590075868&ga_sid=1590075868&ga_hid=68812284&fws=0&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
4d19a993ba76a74799c8d86817da641748e9400de3f4ac3570f0990c5016dc04
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:27 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
201
x-xss-protection
0
google-lineitem-id
-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.wired.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
50 KB
36 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=4403451964970526&correlator=4439504434337096&output=ldjh&impl=fifs&adsid=NT&vrg=2020050602&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200521&iu_parts=3379%2Cconde.wired.cm%2Cnav-cta%2Csecurity%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=80x40&ppid=74c407bacc714c8594c25a307e44f09c&prev_scp=pos%3Dnav-cta%26ctx_slot_type%3Dnav_cta%26ctx_slot_rn%3D0%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dnav_cta_0&eri=1&cust_params=m_data%3Dwaiting%26m_safety%3Dwaiting%26m_categories%3Dwaiting%26m_mv%3Dwaiting%26m_gv%3Dwaiting%26amznbid%3D0%26amznp%3D0%26env_device_type%3Ddesktop%26ctx_template%3Dmt_article_two_column%26ctx_page_channel%3Dsecurity%26ctx_page_sub_channel%3Dcyberattacks-and-hacks%26env_server%3Dproduction%26ctx_cns_version%3D6.32.25%26ctx_page_slug%3Ddns-ddos-amplification-attack%26cnt_copilotid%3D5ec1e85cd58e99fafced8096%26cnt_platform%3Dverso%26cnt_tags%3Ddns%252Cddos%252Cinternet%252Ccybersecurity%252Csecurity%252Ccyberattacks-and-hacks%26cnt_cm%3Dcm_pay_ent_sample%252Ccm_pay_scope_none%252Ccm_pay_ent_sample_cnt_1%252Ccm_pay_ent_sample_max_4%26usr_bkt_eva%3D60%26usr_bkt_ses%3D64%26usr_bkt_pv%3D12%26usr_pvc_bs%3D1%26usr_pvc_24hr%3D1%26usr_pvc_30d%3D1%26usr_svc_30d%3D1%26usr_auth%3Dfalse%26vnd_prx_segments%3D131100%252C131118%252C121100%252C300003%252C210001%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252C240018%252C240019%252Cqx7745%252Cwmhp4i%252Ceuwba9%252Cap05we%252C65f9pd%252Cawpwvf%26usr_segments%3Dco.w2021%26vnd_4d_cached%3D0%26vnd_4d_ctx_sg%3D%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26vnd_4d_xid%3D74c407ba-cc71-4c85-94c2-5a307e44f09c&cookie_enabled=1&bc=31&abxe=1&lmt=1590075867&dt=1590075867815&dlt=1590075866087&idt=1579&frm=20&biw=1600&bih=1200&oid=3&adxs=1434&adys=19&adks=2667067849&ucis=5&ifi=5&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&dssz=48&icsg=144038842797824&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=80x-1&msz=80x-1&ga_vid=425008880.1590075868&ga_sid=1590075868&ga_hid=68812284&fws=512&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
8121d2518756b5dafa0e4c0050f2c45b752df908936bf338b2a3f932d03faee9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:27 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
36961
x-xss-protection
0
google-lineitem-id
5372985539
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138311697852
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.wired.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
257 KB
143 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=4403451964970526&correlator=4439504434337096&output=ldjh&impl=fifs&adsid=NT&vrg=2020050602&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200521&iu_parts=3379%2Cconde.wired.cm%2Cnav-rollover%2Csecurity%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=300x200&ppid=74c407bacc714c8594c25a307e44f09c&prev_scp=pos%3Dnav-rollover%26ctx_slot_type%3Dnav_rollover%26ctx_slot_rn%3D0%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dnav_rollover_0&eri=1&cust_params=m_data%3Dwaiting%26m_safety%3Dwaiting%26m_categories%3Dwaiting%26m_mv%3Dwaiting%26m_gv%3Dwaiting%26amznbid%3D0%26amznp%3D0%26env_device_type%3Ddesktop%26ctx_template%3Dmt_article_two_column%26ctx_page_channel%3Dsecurity%26ctx_page_sub_channel%3Dcyberattacks-and-hacks%26env_server%3Dproduction%26ctx_cns_version%3D6.32.25%26ctx_page_slug%3Ddns-ddos-amplification-attack%26cnt_copilotid%3D5ec1e85cd58e99fafced8096%26cnt_platform%3Dverso%26cnt_tags%3Ddns%252Cddos%252Cinternet%252Ccybersecurity%252Csecurity%252Ccyberattacks-and-hacks%26cnt_cm%3Dcm_pay_ent_sample%252Ccm_pay_scope_none%252Ccm_pay_ent_sample_cnt_1%252Ccm_pay_ent_sample_max_4%26usr_bkt_eva%3D60%26usr_bkt_ses%3D64%26usr_bkt_pv%3D12%26usr_pvc_bs%3D1%26usr_pvc_24hr%3D1%26usr_pvc_30d%3D1%26usr_svc_30d%3D1%26usr_auth%3Dfalse%26vnd_prx_segments%3D131100%252C131118%252C121100%252C300003%252C210001%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252C240018%252C240019%252Cqx7745%252Cwmhp4i%252Ceuwba9%252Cap05we%252C65f9pd%252Cawpwvf%26usr_segments%3Dco.w2021%26vnd_4d_cached%3D0%26vnd_4d_ctx_sg%3D%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26vnd_4d_xid%3D74c407ba-cc71-4c85-94c2-5a307e44f09c&cookie_enabled=1&bc=31&abxe=1&lmt=1590075867&dt=1590075867821&dlt=1590075866087&idt=1579&frm=20&biw=1600&bih=1200&oid=3&adxs=1205&adys=38&adks=3527217923&ucis=6&ifi=6&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&dssz=48&icsg=144038842797824&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=300x-1&msz=300x-1&ga_vid=425008880.1590075868&ga_sid=1590075868&ga_hid=68812284&fws=512&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
d6e03f5038abd5d5f40e9d0d90b688c5b2810eba96d5e37e1d94ce941d332b2e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:27 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
146537
x-xss-protection
0
google-lineitem-id
5372985575
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138312068593
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.wired.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
401 B
367 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=4403451964970526&correlator=4439504434337096&output=ldjh&impl=fifs&adsid=NT&vrg=2020050602&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200521&iu_parts=3379%2Cconde.wired.cm%2Cin-content%2Csecurity%2Carticle%2C2&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=450x140&ppid=74c407bacc714c8594c25a307e44f09c&prev_scp=pos%3Din-content%26ctx_slot_type%3Dcm_in_content%26ctx_slot_rn%3D0%26pos_instance%3D2%26ctx_slot_instance%3D0%26ctx_slot_name%3Dcm_in_content_0&eri=1&cust_params=m_data%3Dwaiting%26m_safety%3Dwaiting%26m_categories%3Dwaiting%26m_mv%3Dwaiting%26m_gv%3Dwaiting%26amznbid%3D0%26amznp%3D0%26env_device_type%3Ddesktop%26ctx_template%3Dmt_article_two_column%26ctx_page_channel%3Dsecurity%26ctx_page_sub_channel%3Dcyberattacks-and-hacks%26env_server%3Dproduction%26ctx_cns_version%3D6.32.25%26ctx_page_slug%3Ddns-ddos-amplification-attack%26cnt_copilotid%3D5ec1e85cd58e99fafced8096%26cnt_platform%3Dverso%26cnt_tags%3Ddns%252Cddos%252Cinternet%252Ccybersecurity%252Csecurity%252Ccyberattacks-and-hacks%26cnt_cm%3Dcm_pay_ent_sample%252Ccm_pay_scope_none%252Ccm_pay_ent_sample_cnt_1%252Ccm_pay_ent_sample_max_4%26usr_bkt_eva%3D60%26usr_bkt_ses%3D64%26usr_bkt_pv%3D12%26usr_pvc_bs%3D1%26usr_pvc_24hr%3D1%26usr_pvc_30d%3D1%26usr_svc_30d%3D1%26usr_auth%3Dfalse%26vnd_prx_segments%3D131100%252C131118%252C121100%252C300003%252C210001%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252C240018%252C240019%252Cqx7745%252Cwmhp4i%252Ceuwba9%252Cap05we%252C65f9pd%252Cawpwvf%26usr_segments%3Dco.w2021%26vnd_4d_cached%3D0%26vnd_4d_ctx_sg%3D%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26vnd_4d_xid%3D74c407ba-cc71-4c85-94c2-5a307e44f09c&cookie_enabled=1&bc=31&abxe=1&lmt=1590075867&dt=1590075867829&dlt=1590075866087&idt=1579&frm=20&biw=1600&bih=1200&oid=3&adxs=348&adys=2500&adks=1834807156&ucis=7&ifi=7&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&dssz=48&icsg=144038842797824&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=716x140&msz=716x140&ga_vid=425008880.1590075868&ga_sid=1590075868&ga_hid=68812284&fws=0&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
944c281e1b7ff1f622ede8ea4009fcb9286a36393ab91df8f6c599f5cf373860
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:27 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
198
x-xss-protection
0
google-lineitem-id
-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.wired.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
257 KB
143 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=4403451964970526&correlator=4439504434337096&output=ldjh&impl=fifs&adsid=NT&vrg=2020050602&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200521&iu_parts=3379%2Cconde.wired.cm%2Ccm-footer%2Csecurity%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=940x140&ppid=74c407bacc714c8594c25a307e44f09c&prev_scp=pos%3Dcm-footer%26ctx_slot_type%3Dcm_footer%26ctx_slot_rn%3D0%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dcm_footer_0&eri=1&cust_params=m_data%3Dwaiting%26m_safety%3Dwaiting%26m_categories%3Dwaiting%26m_mv%3Dwaiting%26m_gv%3Dwaiting%26amznbid%3D0%26amznp%3D0%26env_device_type%3Ddesktop%26ctx_template%3Dmt_article_two_column%26ctx_page_channel%3Dsecurity%26ctx_page_sub_channel%3Dcyberattacks-and-hacks%26env_server%3Dproduction%26ctx_cns_version%3D6.32.25%26ctx_page_slug%3Ddns-ddos-amplification-attack%26cnt_copilotid%3D5ec1e85cd58e99fafced8096%26cnt_platform%3Dverso%26cnt_tags%3Ddns%252Cddos%252Cinternet%252Ccybersecurity%252Csecurity%252Ccyberattacks-and-hacks%26cnt_cm%3Dcm_pay_ent_sample%252Ccm_pay_scope_none%252Ccm_pay_ent_sample_cnt_1%252Ccm_pay_ent_sample_max_4%26usr_bkt_eva%3D60%26usr_bkt_ses%3D64%26usr_bkt_pv%3D12%26usr_pvc_bs%3D1%26usr_pvc_24hr%3D1%26usr_pvc_30d%3D1%26usr_svc_30d%3D1%26usr_auth%3Dfalse%26vnd_prx_segments%3D131100%252C131118%252C121100%252C300003%252C210001%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252C240018%252C240019%252Cqx7745%252Cwmhp4i%252Ceuwba9%252Cap05we%252C65f9pd%252Cawpwvf%26usr_segments%3Dco.w2021%26vnd_4d_cached%3D0%26vnd_4d_ctx_sg%3D%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26vnd_4d_xid%3D74c407ba-cc71-4c85-94c2-5a307e44f09c&cookie_enabled=1&bc=31&abxe=1&lmt=1590075867&dt=1590075867839&dlt=1590075866087&idt=1579&frm=20&biw=1600&bih=1200&oid=3&adxs=330&adys=6144&adks=2989442466&ucis=8&ifi=8&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&dssz=48&icsg=144038842797824&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1600x140&msz=1600x140&ga_vid=425008880.1590075868&ga_sid=1590075868&ga_hid=68812284&fws=0&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
0e6b594f87fd2696c317fe668415b10b829632a79fe17453a831f0c0df045bdb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:27 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
146206
x-xss-protection
0
google-lineitem-id
5372986298
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138312068590
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.wired.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
srv-2020-05-21-15.pixel.parsely.com/start/
77 B
380 B
Script
General
Full URL
https://srv-2020-05-21-15.pixel.parsely.com/start/?rand=1590075867883&plid=55676908&idsite=wired.com&url=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&urlref=&screen=1600x1200%7C1600x1200%7C24&data=%7B%22plan%22%3A%22Not+Active%22%7D&sid=1&surl=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&sref=&sts=1590075867867&slts=0&title=Web+Giants+Scrambled+to+Head+Off+a+Dangerous+DDoS+Technique+%7C+WIRED&date=Thu+May+21+2020+17%3A44%3A27+GMT%2B0200+(Central+European+Summer+Time)&action=pageview&pvid=7224406&callback=parselyStartCallback
Requested by
Host: cdn.parsely.com
URL: https://cdn.parsely.com/keys/wired.com/p.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.200.125.126 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-200-125-126.compute-1.amazonaws.com
Software
nginx /
Resource Hash
57f44d9b92b6501f63fb1eee0cddd33f7e3b1d72c276cc234e7f18e0a66079b7

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 15:44:28 GMT
Server
nginx
Connection
keep-alive
P3P
CP="CUR ADM OUR NOR STA NID"
Content-Length
77
Content-Type
application/json
widget_iframe.2a008290075125adde2d7b849b06a0bb.html
platform.twitter.com/widgets/ Frame DC78
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/widget_iframe.2a008290075125adde2d7b849b06a0bb.html?origin=https%3A%2F%2Fwww.wired.com
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
192.229.233.25 Los Angeles, United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (ska/F70B) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/story/dns-ddos-amplification-attack/

Response headers

Content-Encoding
gzip
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Age
166490
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Thu, 21 May 2020 15:44:27 GMT
Etag
"9fa476ae827f556d5b037fe43632370d+gzip"
Last-Modified
Tue, 12 May 2020 17:24:25 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (ska/F70B)
Vary
Accept-Encoding
X-Cache
HIT
Content-Length
5825
user
4d.condenastdigital.com/
67 B
466 B
XHR
General
Full URL
https://4d.condenastdigital.com/user?xid=74c407ba-cc71-4c85-94c2-5a307e44f09c
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.86.193.219 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-86-193-219.compute-1.amazonaws.com
Software
/
Resource Hash
b62abf899420eb4254a9d8503b355870fb28c3265c2fe9abbbd59b2289c10d34

Request headers

Accept
text/plain
Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 15:44:28 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://www.wired.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
content
4d.condenastdigital.com/
4 KB
2 KB
XHR
General
Full URL
https://4d.condenastdigital.com/content?url=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.86.193.219 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-86-193-219.compute-1.amazonaws.com
Software
/
Resource Hash
01d3a976039e41847dd0a3506a9148714d624e9e951192f6af69377e1de89584

Request headers

Accept
text/plain
Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 15:44:28 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://www.wired.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A27.972Z&_t=in-view&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=6800&pSw=1600&pSh=1200&uID=84fa1008-d3bc-4e25-a738-5c772b88ff1f&uNw=1&uUq=1&sID=15b269ad-904b-49b9-bc56-cc387f5f5e9d&pID=159ae3bc-90df-41b6-b3a4-64b5b8fe9857&uDt=desktop&_o=wired&_c=paywall&dim4=paywall-bar-call-to-action&environment=prod&origin=wired
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:28 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A27.985Z&_t=in-view&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=6800&pSw=1600&pSh=1200&uID=84fa1008-d3bc-4e25-a738-5c772b88ff1f&sID=15b269ad-904b-49b9-bc56-cc387f5f5e9d&pID=159ae3bc-90df-41b6-b3a4-64b5b8fe9857&uDt=desktop&_o=wired&_c=paywall&dim2=1&dim3=3&dim4=paywall-bar-call-to-action&environment=prod&origin=wired
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:28 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A27.994Z&_t=assigned-experiments&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=6800&pSw=1600&pSh=1200&uID=84fa1008-d3bc-4e25-a738-5c772b88ff1f&sID=15b269ad-904b-49b9-bc56-cc387f5f5e9d&pID=159ae3bc-90df-41b6-b3a4-64b5b8fe9857&uDt=desktop&_o=wired&_c=general&dim1=%7B%22assignments%22%3A%5B%7B%22payload%22%3A%22%7B%7D%22%2C%22assignment%22%3A%22control%22%2C%22experimentLabel%22%3A%22wired-personalized-recirc-test%22%2C%22bucketLabel%22%3A%22control%22%2C%22status%22%3A%22NEW_ASSIGNMENT%22%2C%22applicationName%22%3A%22Verso%22%2C%22pageName%22%3A%22wired%22%2C%22userID%22%3A%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%7D%5D%7D&environment=prod&origin=wired
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:28 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A27.999Z&_t=in-view&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=6800&pSw=1600&pSh=1200&uID=84fa1008-d3bc-4e25-a738-5c772b88ff1f&sID=15b269ad-904b-49b9-bc56-cc387f5f5e9d&pID=159ae3bc-90df-41b6-b3a4-64b5b8fe9857&uDt=desktop&_o=wired&_c=verso-pattern-tracking&dim5=%5B%7B%22pattern%22%3A%22PaywallConductor%22%7D%5D&dim6=%5B%7B%22applicationName%22%3A%22Verso%22%2C%22experimentLabel%22%3A%22wired-personalized-recirc-test%22%2C%22bucketLabel%22%3A%22control%22%2C%22userID%22%3A%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%2C%22pageName%22%3A%22wired%22%7D%5D&environment=prod&origin=wired
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:28 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A28.006Z&_t=in-view&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=6800&pSw=1600&pSh=1200&uID=84fa1008-d3bc-4e25-a738-5c772b88ff1f&sID=15b269ad-904b-49b9-bc56-cc387f5f5e9d&pID=159ae3bc-90df-41b6-b3a4-64b5b8fe9857&uDt=desktop&_o=wired&_c=verso-pattern-tracking&dim5=%5B%7B%22pattern%22%3A%22PaywallConductor%22%7D%2C%7B%22pattern%22%3A%22ConnectedBookmarkAlert%22%7D%5D&dim6=%5B%7B%22applicationName%22%3A%22Verso%22%2C%22experimentLabel%22%3A%22wired-personalized-recirc-test%22%2C%22bucketLabel%22%3A%22control%22%2C%22userID%22%3A%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%2C%22pageName%22%3A%22wired%22%7D%5D&environment=prod&origin=wired
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:28 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A28.018Z&_t=in-view&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=6800&pSw=1600&pSh=1200&uID=84fa1008-d3bc-4e25-a738-5c772b88ff1f&sID=15b269ad-904b-49b9-bc56-cc387f5f5e9d&pID=159ae3bc-90df-41b6-b3a4-64b5b8fe9857&uDt=desktop&_o=wired&_c=verso-pattern-tracking&dim5=%5B%7B%22pattern%22%3A%22PaywallConductor%22%7D%2C%7B%22pattern%22%3A%22ConnectedBookmarkAlert%22%7D%2C%7B%22pattern%22%3A%22PaywallConductor%22%7D%5D&dim6=%5B%7B%22applicationName%22%3A%22Verso%22%2C%22experimentLabel%22%3A%22wired-personalized-recirc-test%22%2C%22bucketLabel%22%3A%22control%22%2C%22userID%22%3A%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%2C%22pageName%22%3A%22wired%22%7D%5D&environment=prod&origin=wired
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:28 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A28.031Z&_t=in-view&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=6800&pSw=1600&pSh=1200&uID=84fa1008-d3bc-4e25-a738-5c772b88ff1f&sID=15b269ad-904b-49b9-bc56-cc387f5f5e9d&pID=159ae3bc-90df-41b6-b3a4-64b5b8fe9857&uDt=desktop&_o=wired&_c=verso-pattern-tracking&dim5=%5B%7B%22pattern%22%3A%22PaywallConductor%22%7D%2C%7B%22pattern%22%3A%22ConnectedBookmarkAlert%22%7D%2C%7B%22pattern%22%3A%22PaywallConductor%22%7D%2C%7B%22pattern%22%3A%22ContentHeader%22%7D%5D&dim6=%5B%7B%22applicationName%22%3A%22Verso%22%2C%22experimentLabel%22%3A%22wired-personalized-recirc-test%22%2C%22bucketLabel%22%3A%22control%22%2C%22userID%22%3A%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%2C%22pageName%22%3A%22wired%22%7D%5D&environment=prod&origin=wired
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:28 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A28.036Z&_t=in-view&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=6800&pSw=1600&pSh=1200&uID=84fa1008-d3bc-4e25-a738-5c772b88ff1f&sID=15b269ad-904b-49b9-bc56-cc387f5f5e9d&pID=159ae3bc-90df-41b6-b3a4-64b5b8fe9857&uDt=desktop&_o=wired&_c=verso-pattern-tracking&dim5=%5B%7B%22pattern%22%3A%22PaywallConductor%22%7D%2C%7B%22pattern%22%3A%22ConnectedBookmarkAlert%22%7D%2C%7B%22pattern%22%3A%22PaywallConductor%22%7D%2C%7B%22pattern%22%3A%22ContentHeader%22%7D%2C%7B%22pattern%22%3A%22TitleBlock%22%7D%5D&dim6=%5B%7B%22applicationName%22%3A%22Verso%22%2C%22experimentLabel%22%3A%22wired-personalized-recirc-test%22%2C%22bucketLabel%22%3A%22control%22%2C%22userID%22%3A%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%2C%22pageName%22%3A%22wired%22%7D%5D&environment=prod&origin=wired
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:28 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A28.047Z&_t=in-view&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=6800&pSw=1600&pSh=1200&uID=84fa1008-d3bc-4e25-a738-5c772b88ff1f&sID=15b269ad-904b-49b9-bc56-cc387f5f5e9d&pID=159ae3bc-90df-41b6-b3a4-64b5b8fe9857&uDt=desktop&_o=wired&_c=verso-pattern-tracking&dim5=%5B%7B%22pattern%22%3A%22PaywallConductor%22%7D%2C%7B%22pattern%22%3A%22ConnectedBookmarkAlert%22%7D%2C%7B%22pattern%22%3A%22PaywallConductor%22%7D%2C%7B%22pattern%22%3A%22ContentHeader%22%7D%2C%7B%22pattern%22%3A%22TitleBlock%22%7D%2C%7B%22pattern%22%3A%22Caption%22%7D%5D&dim6=%5B%7B%22applicationName%22%3A%22Verso%22%2C%22experimentLabel%22%3A%22wired-personalized-recirc-test%22%2C%22bucketLabel%22%3A%22control%22%2C%22userID%22%3A%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%2C%22pageName%22%3A%22wired%22%7D%5D&environment=prod&origin=wired
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:28 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A28.051Z&_t=in-view&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=6800&pSw=1600&pSh=1200&uID=84fa1008-d3bc-4e25-a738-5c772b88ff1f&sID=15b269ad-904b-49b9-bc56-cc387f5f5e9d&pID=159ae3bc-90df-41b6-b3a4-64b5b8fe9857&uDt=desktop&_o=wired&_c=verso-pattern-tracking&dim5=%5B%7B%22pattern%22%3A%22PaywallConductor%22%7D%2C%7B%22pattern%22%3A%22ConnectedBookmarkAlert%22%7D%2C%7B%22pattern%22%3A%22PaywallConductor%22%7D%2C%7B%22pattern%22%3A%22ContentHeader%22%7D%2C%7B%22pattern%22%3A%22TitleBlock%22%7D%2C%7B%22pattern%22%3A%22Caption%22%7D%2C%7B%22pattern%22%3A%22SocialIcons%22%7D%5D&dim6=%5B%7B%22applicationName%22%3A%22Verso%22%2C%22experimentLabel%22%3A%22wired-personalized-recirc-test%22%2C%22bucketLabel%22%3A%22control%22%2C%22userID%22%3A%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%2C%22pageName%22%3A%22wired%22%7D%5D&environment=prod&origin=wired
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:28 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A28.055Z&_t=in-view&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=6800&pSw=1600&pSh=1200&uID=84fa1008-d3bc-4e25-a738-5c772b88ff1f&sID=15b269ad-904b-49b9-bc56-cc387f5f5e9d&pID=159ae3bc-90df-41b6-b3a4-64b5b8fe9857&uDt=desktop&_o=wired&_c=verso-pattern-tracking&dim5=%5B%7B%22pattern%22%3A%22PaywallConductor%22%7D%2C%7B%22pattern%22%3A%22ConnectedBookmarkAlert%22%7D%2C%7B%22pattern%22%3A%22PaywallConductor%22%7D%2C%7B%22pattern%22%3A%22ContentHeader%22%7D%2C%7B%22pattern%22%3A%22TitleBlock%22%7D%2C%7B%22pattern%22%3A%22Caption%22%7D%2C%7B%22pattern%22%3A%22SocialIcons%22%7D%2C%7B%22pattern%22%3A%22RecircMostPopular%22%7D%5D&dim6=%5B%7B%22applicationName%22%3A%22Verso%22%2C%22experimentLabel%22%3A%22wired-personalized-recirc-test%22%2C%22bucketLabel%22%3A%22control%22%2C%22userID%22%3A%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%2C%22pageName%22%3A%22wired%22%7D%5D&environment=prod&origin=wired
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:28 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A28.060Z&_t=pubadsReady&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=6800&pSw=1600&pSh=1200&uID=84fa1008-d3bc-4e25-a738-5c772b88ff1f&sID=15b269ad-904b-49b9-bc56-cc387f5f5e9d&pID=159ae3bc-90df-41b6-b3a4-64b5b8fe9857&uDt=desktop&_o=wired&_c=ad_metrics&dim1=%7B%22runtimeId%22%3A%22EKq2UhQ1gVQSZ%22%2C%22pageContext%22%3A%7B%22channel%22%3A%22security%22%2C%22contentType%22%3A%22article%22%2C%22keywords%22%3A%7B%22copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22platform%22%3A%5B%22verso%22%5D%2C%22tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%7D%2C%22server%22%3A%22production%22%2C%22slug%22%3A%22dns-ddos-amplification-attack%22%2C%22subChannel%22%3A%22cyberattacks-and-hacks%22%2C%22templateType%22%3A%22mt_article_two_column%22%2C%22privateMode%22%3Afalse%7D%2C%22version%22%3A%226.32.25%22%7D&environment=prod&origin=wired
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:28 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A28.115Z&_t=slot_rendered&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=6800&pSw=1600&pSh=1200&uID=84fa1008-d3bc-4e25-a738-5c772b88ff1f&sID=15b269ad-904b-49b9-bc56-cc387f5f5e9d&pID=159ae3bc-90df-41b6-b3a4-64b5b8fe9857&uDt=desktop&_o=wired&_c=cns_ads&dim1=%7B%22channel%22%3A%22security%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22subChannel%22%3A%22cyberattacks-and-hacks%22%2C%22template%22%3A%22mt_article_two_column%22%2C%22version%22%3A%226.32.25%22%7D&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.wired%2Finterstitial%2Fsecurity%2Farticle%2F1%22%2C%22advertiserId%22%3Anull%2C%22campaignId%22%3Anull%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22_out_of_page_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Atrue%2C%22isFirstRequested%22%3Atrue%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22platform%22%3A%5B%22verso%22%5D%2C%22tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22out_of_page_0%22%2C%22outOfPage%22%3Atrue%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%221x1%22%2C%22slug%22%3A%22dns-ddos-amplification-attack%22%7D&dim3=%7B%22footerStart%22%3A1590075866631%2C%22headerStart%22%3A1590075866350%2C%22navigationStart%22%3A1590075865794%2C%22injected%22%3A1590075868115%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22interstitial%22%5D%2C%22ctx_slot_type%22%3A%5B%22out_of_page%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22out_of_page_0%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22amznbid%22%3A%5B%220%22%5D%2C%22amznp%22%3A%5B%220%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22mt_article_two_column%22%5D%2C%22ctx_page_channel%22%3A%5B%22security%22%5D%2C%22ctx_page_sub_channel%22%3A%5B%22cyberattacks-and-hacks%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.32.25%22%5D%2C%22ctx_page_slug%22%3A%5B%22dns-ddos-amplification-attack%22%5D%2C%22cnt_copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22cnt_platform%22%3A%5B%22verso%22%5D%2C%22cnt_tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cnt_cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%2C%22usr_bkt_eva%22%3A%5B%2260%22%5D%2C%22usr_bkt_ses%22%3A%5B%2264%22%5D%2C%22usr_bkt_pv%22%3A%5B%2212%22%5D%2C%22usr_pvc_bs%22%3A%5B%221%22%5D%2C%22usr_pvc_24hr%22%3A%5B%221%22%5D%2C%22usr_pvc_30d%22%3A%5B%221%22%5D%2C%22usr_svc_30d%22%3A%5B%221%22%5D%2C%22usr_auth%22%3A%5B%22false%22%5D%2C%22vnd_prx_segments%22%3A%5B%22131100%22%2C%22131118%22%2C%22121100%22%2C%22300003%22%2C%22210001%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22240018%22%2C%22240019%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22euwba9%22%2C%22ap05we%22%2C%2265f9pd%22%2C%22awpwvf%22%5D%2C%22usr_segments%22%3A%5B%22co.w2021%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_sg%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_xid%22%3A%5B%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%5D%2C%22vnd_4d_sid%22%3A%5B%2215b269ad-904b-49b9-bc56-cc387f5f5e9d%22%5D%2C%22vnd_4d_pid%22%3A%5B%22159ae3bc-90df-41b6-b3a4-64b5b8fe9857%22%5D%7D&environment=prod&origin=wired
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:28 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A28.135Z&_t=slot_rendered&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=6800&pSw=1600&pSh=1200&uID=84fa1008-d3bc-4e25-a738-5c772b88ff1f&sID=15b269ad-904b-49b9-bc56-cc387f5f5e9d&pID=159ae3bc-90df-41b6-b3a4-64b5b8fe9857&uDt=desktop&_o=wired&_c=cns_ads&dim1=%7B%22channel%22%3A%22security%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22subChannel%22%3A%22cyberattacks-and-hacks%22%2C%22template%22%3A%22mt_article_two_column%22%2C%22version%22%3A%226.32.25%22%7D&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.wired.native%2Fin-content%2Fsecurity%2Farticle%2F1%22%2C%22advertiserId%22%3Anull%2C%22campaignId%22%3Anull%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22in_content_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Atrue%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22platform%22%3A%5B%22verso%22%5D%2C%22tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22in_content_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22fluid%22%2C%22slug%22%3A%22dns-ddos-amplification-attack%22%7D&dim3=%7B%22footerStart%22%3A1590075866631%2C%22headerStart%22%3A1590075866350%2C%22navigationStart%22%3A1590075865794%2C%22injected%22%3A1590075868135%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22in-content%22%5D%2C%22ctx_slot_type%22%3A%5B%22in_content%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22in_content_0%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22amznbid%22%3A%5B%220%22%5D%2C%22amznp%22%3A%5B%220%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22mt_article_two_column%22%5D%2C%22ctx_page_channel%22%3A%5B%22security%22%5D%2C%22ctx_page_sub_channel%22%3A%5B%22cyberattacks-and-hacks%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.32.25%22%5D%2C%22ctx_page_slug%22%3A%5B%22dns-ddos-amplification-attack%22%5D%2C%22cnt_copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22cnt_platform%22%3A%5B%22verso%22%5D%2C%22cnt_tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cnt_cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%2C%22usr_bkt_eva%22%3A%5B%2260%22%5D%2C%22usr_bkt_ses%22%3A%5B%2264%22%5D%2C%22usr_bkt_pv%22%3A%5B%2212%22%5D%2C%22usr_pvc_bs%22%3A%5B%221%22%5D%2C%22usr_pvc_24hr%22%3A%5B%221%22%5D%2C%22usr_pvc_30d%22%3A%5B%221%22%5D%2C%22usr_svc_30d%22%3A%5B%221%22%5D%2C%22usr_auth%22%3A%5B%22false%22%5D%2C%22vnd_prx_segments%22%3A%5B%22131100%22%2C%22131118%22%2C%22121100%22%2C%22300003%22%2C%22210001%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22240018%22%2C%22240019%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22euwba9%22%2C%22ap05we%22%2C%2265f9pd%22%2C%22awpwvf%22%5D%2C%22usr_segments%22%3A%5B%22co.w2021%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_sg%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_xid%22%3A%5B%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%5D%2C%22vnd_4d_sid%22%3A%5B%2215b269ad-904b-49b9-bc56-cc387f5f5e9d%22%5D%2C%22vnd_4d_pid%22%3A%5B%22159ae3bc-90df-41b6-b3a4-64b5b8fe9857%22%5D%7D&environment=prod&origin=wired
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:28 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A28.168Z&_t=slot_rendered&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=6800&pSw=1600&pSh=1200&uID=84fa1008-d3bc-4e25-a738-5c772b88ff1f&sID=15b269ad-904b-49b9-bc56-cc387f5f5e9d&pID=159ae3bc-90df-41b6-b3a4-64b5b8fe9857&uDt=desktop&_o=wired&_c=cns_ads&dim1=%7B%22channel%22%3A%22security%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22subChannel%22%3A%22cyberattacks-and-hacks%22%2C%22template%22%3A%22mt_article_two_column%22%2C%22version%22%3A%226.32.25%22%7D&dim2=%7B%22adUnitPath%22%3A%223379%2Fwiredcom.cm%2Fsecurity%2Fcyberattacks-and-hacks%22%2C%22advertiserId%22%3Anull%2C%22campaignId%22%3Anull%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22cm_paywall_inline_barrier_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Atrue%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22platform%22%3A%5B%22verso%22%5D%2C%22tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22cm_paywall_inline_barrier_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22930x550%22%2C%22slug%22%3A%22dns-ddos-amplification-attack%22%7D&dim3=%7B%22footerStart%22%3A1590075866631%2C%22headerStart%22%3A1590075866350%2C%22navigationStart%22%3A1590075865794%2C%22injected%22%3A1590075868167%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22cm%22%5D%2C%22ctx_slot_type%22%3A%5B%22cm_paywall_inline_barrier%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%222%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22cm_paywall_inline_barrier_0%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22amznbid%22%3A%5B%220%22%5D%2C%22amznp%22%3A%5B%220%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22mt_article_two_column%22%5D%2C%22ctx_page_channel%22%3A%5B%22security%22%5D%2C%22ctx_page_sub_channel%22%3A%5B%22cyberattacks-and-hacks%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.32.25%22%5D%2C%22ctx_page_slug%22%3A%5B%22dns-ddos-amplification-attack%22%5D%2C%22cnt_copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22cnt_platform%22%3A%5B%22verso%22%5D%2C%22cnt_tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cnt_cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%2C%22usr_bkt_eva%22%3A%5B%2260%22%5D%2C%22usr_bkt_ses%22%3A%5B%2264%22%5D%2C%22usr_bkt_pv%22%3A%5B%2212%22%5D%2C%22usr_pvc_bs%22%3A%5B%221%22%5D%2C%22usr_pvc_24hr%22%3A%5B%221%22%5D%2C%22usr_pvc_30d%22%3A%5B%221%22%5D%2C%22usr_svc_30d%22%3A%5B%221%22%5D%2C%22usr_auth%22%3A%5B%22false%22%5D%2C%22vnd_prx_segments%22%3A%5B%22131100%22%2C%22131118%22%2C%22121100%22%2C%22300003%22%2C%22210001%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22240018%22%2C%22240019%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22euwba9%22%2C%22ap05we%22%2C%2265f9pd%22%2C%22awpwvf%22%5D%2C%22usr_segments%22%3A%5B%22co.w2021%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_sg%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_xid%22%3A%5B%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%5D%2C%22vnd_4d_sid%22%3A%5B%2215b269ad-904b-49b9-bc56-cc387f5f5e9d%22%5D%2C%22vnd_4d_pid%22%3A%5B%22159ae3bc-90df-41b6-b3a4-64b5b8fe9857%22%5D%7D&environment=prod&origin=wired
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:28 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
analytics.js
www.google-analytics.com/
45 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-5HBJC2K&l=dataLayer
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
2f1fd973e6c48489ae07c467e3278635b856c698d1f502e06af3ab555937deac
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 30 Apr 2020 21:54:13 GMT
server
Golfe2
age
2889
date
Thu, 21 May 2020 14:56:19 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18433
expires
Thu, 21 May 2020 16:56:19 GMT
v2
z-na.associates-amazon.com/onetag/
7 KB
3 KB
Script
General
Full URL
https://z-na.associates-amazon.com/onetag/v2?MarketPlace=US&instanceId=11cb70e4-21b3-453f-834c-1463094700df
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.148.222 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-148-222.fra53.r.cloudfront.net
Software
Server /
Resource Hash
a6283b27709736a91a00c12d1548358d60320f2f13f9768848b43d69242a6e7d

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Thu, 21 May 2020 05:15:04 GMT
content-encoding
gzip
accept-charset
UTF-8
server
Server
age
37764
x-amz-rid
KAFCCRQFHHW3EBG3JPD1
vary
accept-encoding
x-cache
Hit from cloudfront
content-type
text/javascript
access-control-allow-origin
*
x-amz-cf-pop
FRA53
x-amz-cf-id
FH0dgmPfvRWCIHcBP0pYYhDETUTIBN781nFMvagfTHm10P7Y8JoFdw==
via
1.1 b7f7970e9c911e165d4cb9f70deac42a.cloudfront.net (CloudFront)
100099X1555751.skimlinks.js
s.skimresources.com/js/
43 KB
16 KB
Script
General
Full URL
https://s.skimresources.com/js/100099X1555751.skimlinks.js
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.11 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
c5194af04a3707534d2127670d3012ffa829557ec0564297f4f5f3a211edcef4

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:28 GMT
content-encoding
gzip
last-modified
Wed, 13 May 2020 14:14:52 GMT
server
AmazonS3
x-amz-request-id
5B7C1E9E3729EA0F
etag
"39c1ee52237ec7890bcc78a505199173"
x-hw
1590075868.cds048.sk1.hn,1590075868.cds069.sk1.c
content-type
application/octet-stream
status
200
cache-control
max-age=3600
accept-ranges
bytes
content-length
16461
x-amz-id-2
SrHi1URDv3vXJCQEPUVYotkGbALGei2MMGw+vUs3ugG/9Zu6ege+F96UVEVoeqTF5jV9Pd2VS10=
view
securepubads.g.doubleclick.net/pcs/ Frame 8562
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstiMcVN4aPuL0phluvCmkdTiMbSfuqAE8rZiMCYFLWlWwBBPXX01TjB38NSWRjngSwN6edK97yucO5eAMC2KBD_z5Znuo456XIt2y7FrN3C_9yaXH3uvgPAHUHU9HVxIt69HyY949XGLz0rUtdMvLfwUTNDO2d7A-qICjuKO3QWlIttXQMljPBIFkhUUe08otKYoYgyQhCloBTaVjwWG6KhgOWt2pSbEV6Reacb63mUXU6kESDgiykcxo6rGoYeHCQFA0PAJ84882S7v-98yOUILk_tIiJEI46ZfE8&sai=AMfl-YROGa9SMssZtO8G9nI2SQHHsEg8M-5RnIpswrCpUIMdxeo_8b9zpN31f7G077YbLB8DxI2VgA1vVnL5XSdM-STDUQYAGm2qHhoCXdkeB-j3P_cTjEJCxO66ZKqaUbdkoA&sig=Cg0ArKJSzClj7Odti1QVEAE&urlfix=1&adurl=
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 21 May 2020 15:44:28 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Thu, 21 May 2020 15:44:28 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 8562
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
124220f530266be8497184bf5b9adc70961a8021bfae7e70136fe862a35d17d2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1589974910160429"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28390
x-xss-protection
0
expires
Thu, 21 May 2020 15:44:28 GMT
truncated
/ Frame 8562
20 KB
20 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1b81df5367a5c58a64318acde1a43ac95f1163ab8545e4faa7a3efa1b47f5388

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
Origin
https://www.wired.com

Response headers

Content-Type
application/font-woff;charset=utf-8
osd.js
www.googletagservices.com/activeview/js/current/
73 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
656716137d4e28b0da293f471affb65b1beb1a6c2d9fe2fa9c3640a592754b1f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1589974910160429"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
27764
x-xss-protection
0
expires
Thu, 21 May 2020 15:44:28 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A28.335Z&_t=slot_rendered&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=6800&pSw=1600&pSh=1200&uID=84fa1008-d3bc-4e25-a738-5c772b88ff1f&sID=15b269ad-904b-49b9-bc56-cc387f5f5e9d&pID=159ae3bc-90df-41b6-b3a4-64b5b8fe9857&uDt=desktop&_o=wired&_c=cns_ads&dim1=%7B%22channel%22%3A%22security%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22subChannel%22%3A%22cyberattacks-and-hacks%22%2C%22template%22%3A%22mt_article_two_column%22%2C%22version%22%3A%226.32.25%22%7D&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.wired.cm%2Fnav-cta%2Fsecurity%2Farticle%2F1%22%2C%22advertiserId%22%3A347421895%2C%22campaignId%22%3A2695337190%2C%22creativeId%22%3A138311697852%2C%22elementId%22%3A%22nav_cta_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22platform%22%3A%5B%22verso%22%5D%2C%22tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%7D%2C%22lineItemId%22%3A5372985539%2C%22name%22%3A%22nav_cta_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%2280x40%22%2C%22slug%22%3A%22dns-ddos-amplification-attack%22%7D&dim3=%7B%22footerStart%22%3A1590075866631%2C%22headerStart%22%3A1590075866350%2C%22navigationStart%22%3A1590075865794%2C%22injected%22%3A1590075868335%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22nav-cta%22%5D%2C%22ctx_slot_type%22%3A%5B%22nav_cta%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22nav_cta_0%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22amznbid%22%3A%5B%220%22%5D%2C%22amznp%22%3A%5B%220%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22mt_article_two_column%22%5D%2C%22ctx_page_channel%22%3A%5B%22security%22%5D%2C%22ctx_page_sub_channel%22%3A%5B%22cyberattacks-and-hacks%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.32.25%22%5D%2C%22ctx_page_slug%22%3A%5B%22dns-ddos-amplification-attack%22%5D%2C%22cnt_copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22cnt_platform%22%3A%5B%22verso%22%5D%2C%22cnt_tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cnt_cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%2C%22usr_bkt_eva%22%3A%5B%2260%22%5D%2C%22usr_bkt_ses%22%3A%5B%2264%22%5D%2C%22usr_bkt_pv%22%3A%5B%2212%22%5D%2C%22usr_pvc_bs%22%3A%5B%221%22%5D%2C%22usr_pvc_24hr%22%3A%5B%221%22%5D%2C%22usr_pvc_30d%22%3A%5B%221%22%5D%2C%22usr_svc_30d%22%3A%5B%221%22%5D%2C%22usr_auth%22%3A%5B%22false%22%5D%2C%22vnd_prx_segments%22%3A%5B%22131100%22%2C%22131118%22%2C%22121100%22%2C%22300003%22%2C%22210001%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22240018%22%2C%22240019%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22euwba9%22%2C%22ap05we%22%2C%2265f9pd%22%2C%22awpwvf%22%5D%2C%22usr_segments%22%3A%5B%22co.w2021%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_sg%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_xid%22%3A%5B%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%5D%2C%22vnd_4d_sid%22%3A%5B%2215b269ad-904b-49b9-bc56-cc387f5f5e9d%22%5D%2C%22vnd_4d_pid%22%3A%5B%22159ae3bc-90df-41b6-b3a4-64b5b8fe9857%22%5D%7D&environment=prod&origin=wired
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:28 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A28.355Z&_t=slot_rendered&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=6700&pSw=1600&pSh=1200&uID=84fa1008-d3bc-4e25-a738-5c772b88ff1f&sID=15b269ad-904b-49b9-bc56-cc387f5f5e9d&pID=159ae3bc-90df-41b6-b3a4-64b5b8fe9857&uDt=desktop&_o=wired&_c=cns_ads&dim1=%7B%22channel%22%3A%22security%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22subChannel%22%3A%22cyberattacks-and-hacks%22%2C%22template%22%3A%22mt_article_two_column%22%2C%22version%22%3A%226.32.25%22%7D&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.wired.cm%2Fin-content%2Fsecurity%2Farticle%2F2%22%2C%22advertiserId%22%3Anull%2C%22campaignId%22%3Anull%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22cm_in_content_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Atrue%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22platform%22%3A%5B%22verso%22%5D%2C%22tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22cm_in_content_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22450x140%22%2C%22slug%22%3A%22dns-ddos-amplification-attack%22%7D&dim3=%7B%22footerStart%22%3A1590075866631%2C%22headerStart%22%3A1590075866350%2C%22navigationStart%22%3A1590075865794%2C%22injected%22%3A1590075868355%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22in-content%22%5D%2C%22ctx_slot_type%22%3A%5B%22cm_in_content%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%222%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22cm_in_content_0%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22amznbid%22%3A%5B%220%22%5D%2C%22amznp%22%3A%5B%220%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22mt_article_two_column%22%5D%2C%22ctx_page_channel%22%3A%5B%22security%22%5D%2C%22ctx_page_sub_channel%22%3A%5B%22cyberattacks-and-hacks%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.32.25%22%5D%2C%22ctx_page_slug%22%3A%5B%22dns-ddos-amplification-attack%22%5D%2C%22cnt_copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22cnt_platform%22%3A%5B%22verso%22%5D%2C%22cnt_tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cnt_cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%2C%22usr_bkt_eva%22%3A%5B%2260%22%5D%2C%22usr_bkt_ses%22%3A%5B%2264%22%5D%2C%22usr_bkt_pv%22%3A%5B%2212%22%5D%2C%22usr_pvc_bs%22%3A%5B%221%22%5D%2C%22usr_pvc_24hr%22%3A%5B%221%22%5D%2C%22usr_pvc_30d%22%3A%5B%221%22%5D%2C%22usr_svc_30d%22%3A%5B%221%22%5D%2C%22usr_auth%22%3A%5B%22false%22%5D%2C%22vnd_prx_segments%22%3A%5B%22131100%22%2C%22131118%22%2C%22121100%22%2C%22300003%22%2C%22210001%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22240018%22%2C%22240019%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22euwba9%22%2C%22ap05we%22%2C%2265f9pd%22%2C%22awpwvf%22%5D%2C%22usr_segments%22%3A%5B%22co.w2021%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_sg%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_xid%22%3A%5B%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%5D%2C%22vnd_4d_sid%22%3A%5B%2215b269ad-904b-49b9-bc56-cc387f5f5e9d%22%5D%2C%22vnd_4d_pid%22%3A%5B%22159ae3bc-90df-41b6-b3a4-64b5b8fe9857%22%5D%7D&environment=prod&origin=wired
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:28 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
fastlane.json
fastlane.rubiconproject.com/a/api/
260 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&site_id=306872&zone_id=1548440&size_id=2&alt_size_ids=57&us_privacy=1---&rf=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&tk_flint=pbjs_lite_v3.18.0&x_source.tid=ee50e0f6-2474-4665-87b6-3a835800c5cb&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.6583300021201279
Requested by
Host: www.wired.com
URL: https://www.wired.com/hotzones/esi/wired/prebid.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
69.173.144.143 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
a568605de7d750b7099cea7ab0c5e382231890eb6da9a22ec60841f1caf8db32

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Thu, 21 May 2020 15:44:28 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://www.wired.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=328
Content-Length
260
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
260 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&site_id=306872&zone_id=1548442&size_id=2&alt_size_ids=57&us_privacy=1---&rf=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&tk_flint=pbjs_lite_v3.18.0&x_source.tid=ee50e0f6-2474-4665-87b6-3a835800c5cb&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.035835557623278724
Requested by
Host: www.wired.com
URL: https://www.wired.com/hotzones/esi/wired/prebid.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
69.173.144.143 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
57ba7ccedcc4fe209a2bc2f53b1ea83971c67b1f4e6f35eddbe12d9a5f9531a1

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Thu, 21 May 2020 15:44:28 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://www.wired.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=283
Content-Length
260
Expires
Wed, 17 Sep 1975 21:32:10 GMT
cygnus
as-sec.casalemedia.com/
24 B
985 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?s=376149&v=7.2&r={%22id%22:%224ec1301738dbc8%22,%22imp%22:[{%22id%22:%22542009d11ff42b%22,%22ext%22:{%22siteID%22:%22376149%22,%22sid%22:%22728x90%22},%22banner%22:{%22w%22:728,%22h%22:90,%22topframe%22:1}},{%22id%22:%226621386ec62c06%22,%22ext%22:{%22siteID%22:%22376148%22,%22sid%22:%22970x250%22},%22banner%22:{%22w%22:970,%22h%22:250,%22topframe%22:1}}],%22site%22:{%22page%22:%22https://www.wired.com/story/dns-ddos-amplification-attack/%22},%22ext%22:{%22source%22:%22prebid%22},%22regs%22:{%22ext%22:{%22us_privacy%22:%221---%22}}}&ac=j&sd=1
Requested by
Host: www.wired.com
URL: https://www.wired.com/hotzones/esi/wired/prebid.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.98 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-225-98.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
022b499a2a996b7d3bb1231e3bc7360e2cd65de4696ca5f008d12319ee9d62d3

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Thu, 21 May 2020 15:44:28 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://www.wired.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Content-Length
44
Expires
Thu, 21 May 2020 15:44:28 GMT
prebid
ib.adnxs.com/ut/v3/
256 B
1 KB
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: www.wired.com
URL: https://www.wired.com/hotzones/esi/wired/prebid.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
37.252.173.62 , Ascension Island, ASN29990 (ASN-APPNEX, US),
Reverse DNS
535.bm-nginx-loadbalancer.mgmt.fra1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
a5da2a0205d2adf2b1b1e2f6c8041c2f3a8ffc5387cf71253d7cb15389bd7d9b
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Thu, 21 May 2020 15:44:30 GMT
X-Proxy-Origin
165.231.142.36; 165.231.142.36; 535.bm-nginx-loadbalancer.mgmt.fra1; *.adnxs.com; 37.252.173.42:80
AN-X-Request-Uuid
9fb317cc-bc2f-4188-a4e6-54a496b6aea5
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.wired.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
256
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
ADTECH;cfp=1;rndc=1590075867;v=2;cmd=bid;cors=yes;alias=22bdc7d038c6a95;misc=1590075868417;us_privacy=1---
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091231/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091231/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=22bdc7d038c6a95;misc=1590075868417;us_privacy=1---;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091231/0/0/ADTECH;cfp=1;rndc=1590075867;v=2;cmd=bid;cors=yes;alias=22bdc7d038c6a95;misc=1590075868417;us_privacy=1---
48 B
205 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091231/0/0/ADTECH;cfp=1;rndc=1590075867;v=2;cmd=bid;cors=yes;alias=22bdc7d038c6a95;misc=1590075868417;us_privacy=1---
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:97b6:26be:138a:cba8:bb01 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
cb655e796d6227e78d53cbb5585e160bf5ec7cb84e1b2ee2879734aacc6d5399

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:29 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
application/json
access-control-allow-origin
https://www.wired.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
x-adtech-meta
{"Debug": {"IP": "0.0.0.0", "Selector": "pri-select030c.us-east-1.prod.adtech.aolcloud.net", "UserId": "5EC697706E6517442D9135D5E0000000"}}
content-length
48
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:28 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091231/0/0/ADTECH;cfp=1;rndc=1590075867;v=2;cmd=bid;cors=yes;alias=22bdc7d038c6a95;misc=1590075868417;us_privacy=1---
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://www.wired.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1590075868;v=2;cmd=bid;cors=yes;alias=2315f89142273f8;misc=1590075868417;us_privacy=1---
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091229/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091229/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=2315f89142273f8;misc=1590075868417;us_privacy=1---;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091229/0/0/ADTECH;cfp=1;rndc=1590075868;v=2;cmd=bid;cors=yes;alias=2315f89142273f8;misc=1590075868417;us_privacy=1---
48 B
128 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091229/0/0/ADTECH;cfp=1;rndc=1590075868;v=2;cmd=bid;cors=yes;alias=2315f89142273f8;misc=1590075868417;us_privacy=1---
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:97b6:26be:138a:cba8:bb01 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
6631dd59cf4813b908d0cf9281d7372815111d8af2c8205c2f17de8c5b4f7710

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:29 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
application/json
access-control-allow-origin
https://www.wired.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
48
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:28 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091229/0/0/ADTECH;cfp=1;rndc=1590075868;v=2;cmd=bid;cors=yes;alias=2315f89142273f8;misc=1590075868417;us_privacy=1---
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://www.wired.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
arj
condenastus-d.openx.net/w/1.0/
189 B
571 B
XHR
General
Full URL
https://condenastus-d.openx.net/w/1.0/arj?ju=https://www.wired.com/story/dns-ddos-amplification-attack/&ch=UTF-8&res=1600x1200x24&ifr=false&tz=-120&tws=1600x1200&be=1&bc=hb_pb_3.0.2&dddid=ee50e0f6-2474-4665-87b6-3a835800c5cb,ee50e0f6-2474-4665-87b6-3a835800c5cb&nocache=1590075868419&us_privacy=1---&pubcid=81375f6f-fdc9-4025-9f24-9ca5d894cfd6&aus=728x90,970x250|728x90,970x250&divIds=hero_728x90_970x250,hero_728x90_970x250&auid=541000862,541000867
Requested by
Host: www.wired.com
URL: https://www.wired.com/hotzones/esi/wired/prebid.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.186.1 /
Resource Hash
5d7bac3ebd0f83e66f0cbd438b67932d4e3e311fdc0f952bcf9737a2559c1691

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:28 GMT
content-encoding
gzip
server
OXGW/16.186.1
status
200
vary
Accept, Accept-Encoding
p3p
CP="CUR ADM OUR NOR STA NID"
access-control-allow-origin
https://www.wired.com
cache-control
private, max-age=0, no-cache
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
content-length
175
via
1.1 google
expires
Mon, 26 Jul 1997 05:00:00 GMT
prebid
prebid.media.net/rtb/
77 B
284 B
XHR
General
Full URL
https://prebid.media.net/rtb/prebid
Requested by
Host: www.wired.com
URL: https://www.wired.com/hotzones/esi/wired/prebid.min.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
72.247.224.27 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-27.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
ff3c6c0abbc21a541961c96709039ed88850f1707dce978fbf299783796792cf

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:28 GMT
server
nginx
status
200
content-type
application/json;charset=ISO-8859-1
access-control-allow-origin
https://www.wired.com
cache-control
max-age=0, no-cache, no-store
access-control-allow-credentials
true
content-length
77
expires
Thu, 21 May 2020 15:44:28 GMT
cdb
bidder.criteo.com/
0
143 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?profileId=207&av=29&wv=3.18.0&cb=71999479104
Requested by
Host: www.wired.com
URL: https://www.wired.com/hotzones/esi/wired/prebid.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
178.250.2.152 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

status
204
date
Thu, 21 May 2020 15:44:28 GMT
access-control-allow-credentials
true
server
Finatra
access-control-allow-origin
https://www.wired.com
timing-allow-origin
*
vary
Origin
fastlane.json
fastlane.rubiconproject.com/a/api/
241 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&site_id=306872&zone_id=1548468&size_id=15&alt_size_ids=10&us_privacy=1---&rf=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&tk_flint=pbjs_lite_v3.18.0&x_source.tid=0f2a30f7-714a-4e25-9bed-5e4de1a9be06&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.04102729098095437
Requested by
Host: www.wired.com
URL: https://www.wired.com/hotzones/esi/wired/prebid.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
69.173.144.143 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
5445abe9b60f3fe1299e0456d9d791e6a06c3179460e68589710ee4f9d045854

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Thu, 21 May 2020 15:44:28 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://www.wired.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=440
Content-Length
241
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
3 KB
3 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&site_id=306872&zone_id=1548470&size_id=15&alt_size_ids=10&us_privacy=1---&rf=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&tk_flint=pbjs_lite_v3.18.0&x_source.tid=0f2a30f7-714a-4e25-9bed-5e4de1a9be06&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.058376461847723604
Requested by
Host: www.wired.com
URL: https://www.wired.com/hotzones/esi/wired/prebid.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
69.173.144.143 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
8b8108a57c76633f19d435103f851ef5007c6626b7824c58c5303d19ecf15f8c

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Thu, 21 May 2020 15:44:28 GMT
Content-Encoding
gzip
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://www.wired.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=173
Content-Length
1553
Expires
Wed, 17 Sep 1975 21:32:10 GMT
cygnus
as-sec.casalemedia.com/
25 B
986 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?s=376181&v=7.2&r={%22id%22:%2227b12b343a7d424%22,%22imp%22:[{%22id%22:%2228cdc3a0967738e%22,%22ext%22:{%22siteID%22:%22376181%22,%22sid%22:%22300x250%22},%22banner%22:{%22w%22:300,%22h%22:250,%22topframe%22:1}},{%22id%22:%2229cfe4596619e71%22,%22ext%22:{%22siteID%22:%22376179%22,%22sid%22:%22300x600%22},%22banner%22:{%22w%22:300,%22h%22:600,%22topframe%22:1}}],%22site%22:{%22page%22:%22https://www.wired.com/story/dns-ddos-amplification-attack/%22},%22ext%22:{%22source%22:%22prebid%22},%22regs%22:{%22ext%22:{%22us_privacy%22:%221---%22}}}&ac=j&sd=1
Requested by
Host: www.wired.com
URL: https://www.wired.com/hotzones/esi/wired/prebid.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.98 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-225-98.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cdf94370c5fe0ceb948861c93f1fdfe2d8d17752352205bcc90e34404efc4337

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Thu, 21 May 2020 15:44:28 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://www.wired.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Content-Length
45
Expires
Thu, 21 May 2020 15:44:28 GMT
prebid
ib.adnxs.com/ut/v3/
260 B
1 KB
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: www.wired.com
URL: https://www.wired.com/hotzones/esi/wired/prebid.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
37.252.173.62 , Ascension Island, ASN29990 (ASN-APPNEX, US),
Reverse DNS
535.bm-nginx-loadbalancer.mgmt.fra1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
d98aaf43f3ce4a8f7fc49991aee6c562b441951d9231f46f76a2b3328e550356
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Thu, 21 May 2020 15:44:30 GMT
X-Proxy-Origin
165.231.142.36; 165.231.142.36; 535.bm-nginx-loadbalancer.mgmt.fra1; *.adnxs.com; 37.252.173.50:80
AN-X-Request-Uuid
db7c76d2-b8cf-4d39-908e-7d6aea6688e9
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.wired.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
260
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
ADTECH;cfp=1;rndc=1590075867;v=2;cmd=bid;cors=yes;alias=455bbe9ebf9f3b7;misc=1590075868436;us_privacy=1---
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091246/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091246/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=455bbe9ebf9f3b7;misc=1590075868436;us_privacy=1---;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091246/0/0/ADTECH;cfp=1;rndc=1590075867;v=2;cmd=bid;cors=yes;alias=455bbe9ebf9f3b7;misc=1590075868436;us_privacy=1---
48 B
81 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091246/0/0/ADTECH;cfp=1;rndc=1590075867;v=2;cmd=bid;cors=yes;alias=455bbe9ebf9f3b7;misc=1590075868436;us_privacy=1---
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:97b6:26be:138a:cba8:bb01 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
610391497fb36d4ddd0e322bc86250e78a37dd5b6a1cd0149e136a981e118e9e

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:29 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
application/json
access-control-allow-origin
https://www.wired.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
48
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:28 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091246/0/0/ADTECH;cfp=1;rndc=1590075867;v=2;cmd=bid;cors=yes;alias=455bbe9ebf9f3b7;misc=1590075868436;us_privacy=1---
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://www.wired.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1590075867;v=2;cmd=bid;cors=yes;alias=4611116488bc24;misc=1590075868436;us_privacy=1---
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091240/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091240/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=4611116488bc24;misc=1590075868436;us_privacy=1---;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091240/0/0/ADTECH;cfp=1;rndc=1590075867;v=2;cmd=bid;cors=yes;alias=4611116488bc24;misc=1590075868436;us_privacy=1---
48 B
87 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091240/0/0/ADTECH;cfp=1;rndc=1590075867;v=2;cmd=bid;cors=yes;alias=4611116488bc24;misc=1590075868436;us_privacy=1---
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:97b6:26be:138a:cba8:bb01 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
a5a8bb39e444fd986b225539add86e19062f8e3dd5e324bb52f6e0f02e67cc96

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:29 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
application/json
access-control-allow-origin
https://www.wired.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
accept-ranges
bytes
content-length
48
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:28 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5091240/0/0/ADTECH;cfp=1;rndc=1590075867;v=2;cmd=bid;cors=yes;alias=4611116488bc24;misc=1590075868436;us_privacy=1---
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://www.wired.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
arj
condenastus-d.openx.net/w/1.0/
189 B
374 B
XHR
General
Full URL
https://condenastus-d.openx.net/w/1.0/arj?ju=https://www.wired.com/story/dns-ddos-amplification-attack/&ch=UTF-8&res=1600x1200x24&ifr=false&tz=-120&tws=1600x1200&be=1&bc=hb_pb_3.0.2&dddid=0f2a30f7-714a-4e25-9bed-5e4de1a9be06,0f2a30f7-714a-4e25-9bed-5e4de1a9be06&nocache=1590075868438&us_privacy=1---&pubcid=81375f6f-fdc9-4025-9f24-9ca5d894cfd6&aus=300x250,300x600|300x250,300x600&divIds=rail_300x250_300x600,rail_300x250_300x600&auid=541000882,541000850
Requested by
Host: www.wired.com
URL: https://www.wired.com/hotzones/esi/wired/prebid.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.186.1 /
Resource Hash
c31a00544f2b4161327d0742e2436a73eed5f6fa7136c3bc9e0b2cd0ab7d703b

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:28 GMT
content-encoding
gzip
server
OXGW/16.186.1
status
200
vary
Accept, Accept-Encoding
p3p
CP="CUR ADM OUR NOR STA NID"
access-control-allow-origin
https://www.wired.com
cache-control
private, max-age=0, no-cache
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
content-length
177
via
1.1 google
expires
Mon, 26 Jul 1997 05:00:00 GMT
prebid
prebid.media.net/rtb/
77 B
284 B
XHR
General
Full URL
https://prebid.media.net/rtb/prebid
Requested by
Host: www.wired.com
URL: https://www.wired.com/hotzones/esi/wired/prebid.min.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
72.247.224.27 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-27.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
56c62cad31ca453c3c4078b24c3f15a7e91a462e0a8645159b8e7665b18f04f1

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:28 GMT
server
nginx
status
200
content-type
application/json;charset=ISO-8859-1
access-control-allow-origin
https://www.wired.com
cache-control
max-age=0, no-cache, no-store
access-control-allow-credentials
true
content-length
77
expires
Thu, 21 May 2020 15:44:28 GMT
cdb
bidder.criteo.com/
0
143 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?profileId=207&av=29&wv=3.18.0&cb=98664316079
Requested by
Host: www.wired.com
URL: https://www.wired.com/hotzones/esi/wired/prebid.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
178.250.2.152 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

status
204
date
Thu, 21 May 2020 15:44:27 GMT
access-control-allow-credentials
true
server
Finatra
access-control-allow-origin
https://www.wired.com
timing-allow-origin
*
vary
Origin
embed-api.json
player.cnevids.com/
6 KB
3 KB
Fetch
General
Full URL
https://player.cnevids.com/embed-api.json?videoId=590a4a94fd2e610c45000008&embedLocation=wired
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/590a4a94fd2e610c45000008.js?autoplay=1&muted=1&onReady=onReady15900758672450&isRightRail=false&onIframeReady=onIframeReady15900758672451
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.149.47 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-149-47.fra53.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
aa456b8870f17c9c4135dd96abbd411b927ed441030fcc6cea41192a8cfd9339
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 15:44:28 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Amz-Cf-Pop
FRA53
X-Cache
Miss from cloudfront
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
2058
X-XSS-Protection
1; mode=block
X-Request-Id
99c1efcc-2538-48b2-b602-aeb47f6ecb58
X-Runtime
0.021170
X-Backend-Node
10.110.29.24
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"30301386b248cb819450463e47694c96"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Access-Control-Allow-Methods
GET, OPTIONS
Content-Type
application/json; charset=utf-8
Via
1.1 9edca61f65102033971d096a9351690a.cloudfront.net (CloudFront)
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
Access-Control-Allow-Origin
*
X-Amz-Cf-Id
kv1OtuvR7IoBhBDLfzkv_yWX5kY3CaxJzdTNtEfmLLngXzNf9ovZ1A==
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 61B2
264 KB
90 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/590a4a94fd2e610c45000008.js?autoplay=1&muted=1&onReady=onReady15900758672450&isRightRail=false&onIframeReady=onIframeReady15900758672451
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
21eecef24071930fe32a70e72af2a611f8fe2f97ab49b997eb720ead5ed7bbe4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
91718
x-xss-protection
0
expires
Thu, 21 May 2020 15:44:28 GMT
gpt_proxy.js
imasdk.googleapis.com/js/sdkloader/
65 KB
24 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/gpt_proxy.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/590a4a94fd2e610c45000008.js?autoplay=1&muted=1&onReady=onReady15900758672450&isRightRail=false&onIframeReady=onIframeReady15900758672451
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
68fe824b03036f78b48a8db2ca7922449c6fcb9400541ba3c25fc27c62103086
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:36:57 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 14 May 2020 15:51:06 GMT
server
sffe
age
451
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=900
accept-ranges
bytes
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
24263
x-xss-protection
0
expires
Thu, 21 May 2020 15:51:57 GMT
player-style-3b3a013ac40046610e8f2fefe02c3b07.css
d2c8v52ll5s99u.cloudfront.net/player/ Frame 61B2
74 KB
12 KB
Stylesheet
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-3b3a013ac40046610e8f2fefe02c3b07.css
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/590a4a94fd2e610c45000008.js?autoplay=1&muted=1&onReady=onReady15900758672450&isRightRail=false&onIframeReady=onIframeReady15900758672451
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.157.237 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-157-237.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
596b76b93c7801ba85fb53f2f6e2281d4dbffc96ddc18bb056e8cb0e94be34fd

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Mar 2020 23:39:57 GMT
Content-Encoding
gzip
Age
6710672
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
11365
Last-Modified
Wed, 05 Jun 2019 16:03:54 GMT
Server
AmazonS3
ETag
"cff060eda5015972d532696ec91d375b"
Content-Type
text/css; charset=utf-8
Via
1.1 3283735112d0a322451d32ef038129c9.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
X-Amz-Cf-Pop
FRA53
Accept-Ranges
bytes
X-Amz-Cf-Id
5Pd3vsZXPSrv5k523eUlve-JsGMU-qO5RrIf0mVcrQ5zJ6HsFhGRXQ==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
main-49be74de237db7d6199d.js
d2c8v52ll5s99u.cloudfront.net/player/ Frame 61B2
915 KB
230 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/main-49be74de237db7d6199d.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/590a4a94fd2e610c45000008.js?autoplay=1&muted=1&onReady=onReady15900758672450&isRightRail=false&onIframeReady=onIframeReady15900758672451
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.157.237 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-157-237.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
2ef034ee68ab0f17cfa73f14f263a4a975bf412cd3ef3c1d075c16289fcd072e

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 03 Apr 2020 14:39:21 GMT
Content-Encoding
gzip
Age
4151108
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
234939
Last-Modified
Thu, 02 Apr 2020 20:09:14 GMT
Server
AmazonS3
ETag
"cc216b9263ca9c6c249ef9bfd6d3639d"
Content-Type
application/javascript
Via
1.1 4ba0e9deb9465045a3261b8712935964.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
X-Amz-Cf-Pop
FRA53
Accept-Ranges
bytes
X-Amz-Cf-Id
pMFvjM64-GCRJB2GVOwGZV-BM3vIZ5ZTAXNlJ860jjRj67f2CGW63g==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame EFBF
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstsInCbTpjLx0tODIxy0haWXaUptKdo_sgXH2ENo-pxuDX1vfbiQKsam41-rYRQtPwM-DwfqTrnlv3ouuGqVrdHjc1UxJO90uNO1Zz2tjfHiIDFpvrbQutFtEIfQS6khjJAIx0r0RCDu9hoCIIxTN9lJObdj4SA9HK6JCWZDxUYEp5EolwuKNncajXkRR8KFEU40LNKMxm5JK7ZtyDL-nFDU5oLiqSVVGJsOtXHrOCBuECJNz7gDW6_PMQ_h7X8Ru-OBy5AmXB0JgH4jFlMKrY2NiRimxfdFjWj0X64vQ&sai=AMfl-YSXD7tWj-C3lqBQR0l6JMyDDO9KCUVI8z2LNoMHPGExstKko7jfVfqCEr9IRDPIfw0C7CXlCOy6yzJIV2pDRHzv_M1uN_8Rl_mzivD5vH5g5l0QAkXGzdivUePuCnBKRQ&sig=Cg0ArKJSzHOSN8od921tEAE&urlfix=1&adurl=
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 21 May 2020 15:44:28 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
truncated
/ Frame EFBF
111 KB
111 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
277d25da29388ec43b383a4ce118698db8c98a9d0a3987a2e974e7961c15b23f

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
Origin
https://www.wired.com

Response headers

Content-Type
font/truetype;charset=utf-8
WiredMono-Regular.woff2
www.wired.com/verso/static/wired/assets/fonts/ Frame EFBF
18 KB
19 KB
Font
General
Full URL
https://www.wired.com/verso/static/wired/assets/fonts/WiredMono-Regular.woff2
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.194 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx/1.15.8 /
Resource Hash
c8c9128b649afff93f89f77eb2aa5a4bbbb1443bebc5156d0f697780c8beaa26
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
Strict-Transport-Security max-age=31536000; preload

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
Origin
https://www.wired.com

Response headers

date
Thu, 21 May 2020 15:44:28 GMT
via
1.1 varnish
age
521
x-cache
HIT
status
200
x-ua-device
desktop
apple-news-services-parsed-url
/verso/static/wired/assets/fonts/WiredMono-Regular.woff2
last-modified
Thu, 21 May 2020 15:31:32 GMT
strict-transport-security
max-age=31536000; preload
content-length
18912
x-amz-id-2
oTtM0SG24VJrlAZA5W1FkLBM/Nbb8NOtq/iY6rKjfhXvIfbpZ/huAcZiZTuUIqiS5Dxk1WEWv7o=
x-served-by
cache-fra19180-FRA
apple-news-services-handled
false
server
nginx/1.15.8
x-timer
S1590075869.575069,VS0,VE0
apple-news-services-request-url
/verso/static/wired/assets/fonts/WiredMono-Regular.woff2
etag
"e755d282ae1120887b3b1d207bb930ce"
vary
accept-encoding
x-amz-request-id
CCF5D1A86E1BFB51
access-control-allow-origin
https://www.wired.com
expires
Fri, 21 May 2021 15:35:47 GMT
cache-control
max-age=31536000, immutable
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
accept-ranges
bytes
content-type
binary/octet-stream
apple-news-services-host
verso-prod.conde.io
x-cache-hits
2
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame EFBF
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
124220f530266be8497184bf5b9adc70961a8021bfae7e70136fe862a35d17d2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1589974910160429"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28390
x-xss-protection
0
expires
Thu, 21 May 2020 15:44:28 GMT
WIRED_2806_cover_subs%20no_spine.jpg
media.wired.com/photos/5eba9f7f48074637267906e2/master/w_500,c_limit/ Frame EFBF
67 KB
67 KB
Image
General
Full URL
https://media.wired.com/photos/5eba9f7f48074637267906e2/master/w_500,c_limit/WIRED_2806_cover_subs%20no_spine.jpg
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.239 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
f1cb32016462a07fb19bac2d45af5816b206b98183e5a94d6917c21c1ac1a6ac

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 15:44:28 GMT
Connection
keep-alive
Age
786822
X-Cache
HIT, HIT
Fastly-Io-Info
ifsz=5489809 idim=2399x3263 ifmt=jpeg ofsz=68494 odim=500x680 ofmt=webp
Fastly-Stats
io=1
Fastly-Restarts
1
X-Served-By
cache-bwi5120-BWI, cache-hhn4072-HHN
experience
katra
Accept-Ranges
bytes
X-Timer
S1590075869.752579,VS0,VE1
Etag
"AQ+gX9UdhjVke4cusY0pZ4nmAi93w+7a+qNHX1gu8+k"
Vary
Accept
Content-Type
image/webp
cache-control
max-age=31536, must-revalidate, public
Content-Length
68494
X-Cache-Hits
1, 2
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A28.602Z&_t=slot_rendered&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=7300&pSw=1600&pSh=1200&uID=84fa1008-d3bc-4e25-a738-5c772b88ff1f&sID=15b269ad-904b-49b9-bc56-cc387f5f5e9d&pID=159ae3bc-90df-41b6-b3a4-64b5b8fe9857&uDt=desktop&_o=wired&_c=cns_ads&dim1=%7B%22channel%22%3A%22security%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22subChannel%22%3A%22cyberattacks-and-hacks%22%2C%22template%22%3A%22mt_article_two_column%22%2C%22version%22%3A%226.32.25%22%7D&dim2=%7B%22adUnitPath%22%3A%223379%2Fwiredcom.cm%2Fsecurity%2Fcyberattacks-and-hacks%22%2C%22advertiserId%22%3A347421895%2C%22campaignId%22%3A2695337190%2C%22creativeId%22%3A138311697870%2C%22elementId%22%3A%22cm_paywall_bar_call_to_action_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22platform%22%3A%5B%22verso%22%5D%2C%22tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%7D%2C%22lineItemId%22%3A5371845003%2C%22name%22%3A%22cm_paywall_bar_call_to_action_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%221280x300%22%2C%22slug%22%3A%22dns-ddos-amplification-attack%22%7D&dim3=%7B%22footerStart%22%3A1590075866631%2C%22headerStart%22%3A1590075866350%2C%22navigationStart%22%3A1590075865794%2C%22injected%22%3A1590075868602%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22cm%22%5D%2C%22ctx_slot_type%22%3A%5B%22cm_paywall_bar_call_to_action%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22cm_paywall_bar_call_to_action_0%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22amznbid%22%3A%5B%220%22%5D%2C%22amznp%22%3A%5B%220%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22mt_article_two_column%22%5D%2C%22ctx_page_channel%22%3A%5B%22security%22%5D%2C%22ctx_page_sub_channel%22%3A%5B%22cyberattacks-and-hacks%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.32.25%22%5D%2C%22ctx_page_slug%22%3A%5B%22dns-ddos-amplification-attack%22%5D%2C%22cnt_copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22cnt_platform%22%3A%5B%22verso%22%5D%2C%22cnt_tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cnt_cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%2C%22usr_bkt_eva%22%3A%5B%2260%22%5D%2C%22usr_bkt_ses%22%3A%5B%2264%22%5D%2C%22usr_bkt_pv%22%3A%5B%2212%22%5D%2C%22usr_pvc_bs%22%3A%5B%221%22%5D%2C%22usr_pvc_24hr%22%3A%5B%221%22%5D%2C%22usr_pvc_30d%22%3A%5B%221%22%5D%2C%22usr_svc_30d%22%3A%5B%221%22%5D%2C%22usr_auth%22%3A%5B%22false%22%5D%2C%22vnd_prx_segments%22%3A%5B%22131100%22%2C%22131118%22%2C%22121100%22%2C%22300003%22%2C%22210001%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22240018%22%2C%22240019%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22euwba9%22%2C%22ap05we%22%2C%2265f9pd%22%2C%22awpwvf%22%5D%2C%22usr_segments%22%3A%5B%22co.w2021%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_sg%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_xid%22%3A%5B%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%5D%2C%22vnd_4d_sid%22%3A%5B%2215b269ad-904b-49b9-bc56-cc387f5f5e9d%22%5D%2C%22vnd_4d_pid%22%3A%5B%22159ae3bc-90df-41b6-b3a4-64b5b8fe9857%22%5D%7D&environment=prod&origin=wired
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:28 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
otFlat.json
cdn.cookielaw.org/scripttemplates/5.15.0/assets/
17 KB
3 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/scripttemplates/5.15.0/assets/otFlat.json
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.15.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:1cb7:261b:1f9c:2074:3c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (frc/8EA7) /
Resource Hash
e60d72219eb682a93fea26976d93acbe542afdd65065fd1e05c393d8dd996a30

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Thu, 21 May 2020 15:44:28 GMT
content-encoding
gzip
content-md5
02SC5G8dyC7Cq0+bUBFRrg==
age
14206
x-cache
HIT
status
200
content-length
3207
x-ms-lease-status
unlocked
last-modified
Mon, 18 May 2020 06:40:18 GMT
server
ECAcc (frc/8EA7)
etag
0x8D7FAF654B00A17
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
*
x-ms-request-id
4ede4bee-101e-0085-5165-2f8f33000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Thu, 21 May 2020 19:44:28 GMT
otPcCenter.json
cdn.cookielaw.org/scripttemplates/5.15.0/assets/
96 KB
19 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/scripttemplates/5.15.0/assets/otPcCenter.json
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.15.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:1cb7:261b:1f9c:2074:3c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (frc/8F63) /
Resource Hash
6234bda70902a34b0504d70cd42ab0a37b14ed39834342148c562ae7df78ec1c

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Thu, 21 May 2020 15:44:28 GMT
content-encoding
gzip
content-md5
eN5Gtlp2Rl7V1h72oHIGYQ==
age
14207
x-cache
HIT
status
200
content-length
19180
x-ms-lease-status
unlocked
last-modified
Mon, 18 May 2020 06:40:18 GMT
server
ECAcc (frc/8F63)
etag
0x8D7FAF654D2B3C8
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
*
x-ms-request-id
f29a6eb3-601e-0046-1d65-2f0670000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Thu, 21 May 2020 19:44:28 GMT
bid
c.amazon-adsystem.com/e/dtb/
37 B
381 B
XHR
General
Full URL
https://c.amazon-adsystem.com/e/dtb/bid?src=3035&u=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pid=j0xipBzM8W2dA&cb=0&ws=1600x1200&v=7.50.00&t=1000&slots=%5B%7B%22sd%22%3A%220%22%2C%22s%22%3A%5B%22728x90%22%2C%22970x250%22%5D%2C%22sn%22%3A%22hero%2Fdesktop%22%7D%2C%7B%22sd%22%3A%221%22%2C%22s%22%3A%5B%22300x250%22%2C%22300x600%22%5D%2C%22sn%22%3A%22rail%2Fdesktop%22%7D%5D&pj=%7B%22si_section%22%3A%22security%22%2C%22us_privacy%22%3A%221---%22%7D&gdprl=%7B%22status%22%3A%22cmp-timeout%22%7D
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.153.170 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-153-170.fra53.r.cloudfront.net
Software
Server /
Resource Hash
88187fc7bfb40693d22635ec675a56b5b37318d74fea56d845413b78f1ec0e34

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:28 GMT
via
1.1 4ba0e9deb9465045a3261b8712935964.cloudfront.net (CloudFront)
server
Server
x-amz-cf-pop
FRA53
status
200
vary
User-Agent
x-cache
Miss from cloudfront
content-type
text/javascript;charset=UTF-8
access-control-allow-origin
https://www.wired.com
access-control-allow-credentials
true
timing-allow-origin
*
content-length
37
x-amz-cf-id
hrosKHuSGmuUImLzuGtNYOvkdUvmqHpbtiED3L1byM6L0RAqJG5Erw==
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A28.706Z&_t=pageview&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035&cEnt=domain%2C%20ddos%2C%20nxnsattack%2C%20cloudflare%2C%20google%2C%20dyn%2C%20dan%20kaminsky%2C%20lior%20shafir%2C%20tel%20aviv%20university%2C%20botnet%2C%20mirai%2C%20amazon%2C%20hacker%2C%20reddit%2C%20spotify%2C%20herzliya%2C%20head%2C%20phone%2C%20microsoft%2C%20anat%20bremler-barr&cEnw=0.8771759765780737%2C%200.8338062589064815%2C%200.7648210431735492%2C%200.7514458020584966%2C%200.7317869554836482%2C%200.6880327132394504%2C%200.6459096081084209%2C%200.6452865510103766%2C%200.621896185053759%2C%200.5989079930460709%2C%200.5942368447904924%2C%200.5410839432213714%2C%200.5033271113253491%2C%200.46697963005128895%2C%200.4657578192440538%2C%200.4278893088937706%2C%200.4267021729964771%2C%200.41944985438039595%2C%200.4069384737931213%2C%200.374782232092937&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&cPd=2020-05-19T10%3A00%3A00.000Z&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=7300&pSw=1600&pSh=1200&uID=2a36347c-3e6d-48d2-be9f-8311e276647d&uNw=1&uUq=1&pID=4ace29e1-f455-4b7d-8b0c-b6f9ba75f604&uDt=desktop&_o=wired&_c=general&xID=74c407ba-cc71-4c85-94c2-5a307e44f09c&environment=prod&origin=wired&cKh=server%2Cdns%2Cdomain%2Cddos%2Cresearcher%2Camplification%2Cnxnsattack%2Ccloudflare%2Cgoogle%2Csubdomain%2Crequest%2Cdyn%2Cdan%20kaminsky%2Clior%20shafir%2Cinternet%2Caddress%2Cprovider%2Ctel%20aviv%20university&dim6=%5B%7B%22applicationName%22%3A%22Verso%22%2C%22experimentLabel%22%3A%22wired-personalized-recirc-test%22%2C%22bucketLabel%22%3A%22control%22%2C%22userID%22%3A%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%2C%22pageName%22%3A%22wired%22%7D%5D
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:28 GMT
Connection
keep-alive
transfer-encoding
chunked
Content-Type
image/gif
view
securepubads.g.doubleclick.net/pcs/ Frame 265B
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjss2t9oEeLI0MH2O6wC-49qDB6g3bWIrr1KzSDlQHqQff-W3me0RuS4kEEHkeOOudLalrkOLBBOJx5qBOCfy8rXam2M-xQB2mDG-Q8hm6RZcKuhbk7VGJawUyZfluVaVYpiphOMDI8YcJqWuf8ZGpz8sLR8wKlEKGrsSn7VHrHDh3LPdsMFP4Ujt0gk9NsRaxMZvLSOh2Y1Hx9ruw6AL1LCKA0dtAudvmORV39GwA79l3DmkdBbxpievqxOnLUEtvzN23p4M81cKqGt9iMZkTGrffzo0LoBh09sYfHjXCS4i4w&sai=AMfl-YSPWBWvPZuq_ZjbI-YQcgUNUhBReoT5oSG57FYxfdQAnubd7g09UxlGSMSwbNw4K_qxCt4UhZ1DMed9Ik8bL7GmUmzu8aaRUUBfJP3tFWtdJe0P35zLjNLMD-TzL6geYw&sig=Cg0ArKJSzN_T6jKEcTO6EAE&urlfix=1&adurl=
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 21 May 2020 15:44:28 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Thu, 21 May 2020 15:44:28 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 265B
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
124220f530266be8497184bf5b9adc70961a8021bfae7e70136fe862a35d17d2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1589974910160429"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28390
x-xss-protection
0
expires
Thu, 21 May 2020 15:44:28 GMT
truncated
/ Frame 265B
20 KB
0
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1b81df5367a5c58a64318acde1a43ac95f1163ab8545e4faa7a3efa1b47f5388

Request headers

Origin
https://www.wired.com
Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
application/font-woff;charset=utf-8
truncated
/ Frame 265B
46 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
fd65ed43609a7956881d37ee1920272ad92a7a384716c09bbde11a87eed80e35

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/ Frame 265B
109 KB
109 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ba9bc4578683117bc9dc212d2ecb4db46144f4d4bf5aafcfca27b6d5992027aa

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
Origin
https://www.wired.com

Response headers

Content-Type
font/truetype;charset=utf-8
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A28.906Z&_t=slot_rendered&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035&cEnt=domain%2C%20ddos%2C%20nxnsattack%2C%20cloudflare%2C%20google%2C%20dyn%2C%20dan%20kaminsky%2C%20lior%20shafir%2C%20tel%20aviv%20university%2C%20botnet%2C%20mirai%2C%20amazon%2C%20hacker%2C%20reddit%2C%20spotify%2C%20herzliya%2C%20head%2C%20phone%2C%20microsoft%2C%20anat%20bremler-barr&cEnw=0.8771759765780737%2C%200.8338062589064815%2C%200.7648210431735492%2C%200.7514458020584966%2C%200.7317869554836482%2C%200.6880327132394504%2C%200.6459096081084209%2C%200.6452865510103766%2C%200.621896185053759%2C%200.5989079930460709%2C%200.5942368447904924%2C%200.5410839432213714%2C%200.5033271113253491%2C%200.46697963005128895%2C%200.4657578192440538%2C%200.4278893088937706%2C%200.4267021729964771%2C%200.41944985438039595%2C%200.4069384737931213%2C%200.374782232092937&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&cPd=2020-05-19T10%3A00%3A00.000Z&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=7300&pSw=1600&pSh=1200&uID=2a36347c-3e6d-48d2-be9f-8311e276647d&sID=029620a5-5c1e-4209-9229-5cfa3d766f3f&pID=4ace29e1-f455-4b7d-8b0c-b6f9ba75f604&uDt=desktop&_o=wired&_c=cns_ads&xID=74c407ba-cc71-4c85-94c2-5a307e44f09c&dim1=%7B%22channel%22%3A%22security%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22subChannel%22%3A%22cyberattacks-and-hacks%22%2C%22template%22%3A%22mt_article_two_column%22%2C%22version%22%3A%226.32.25%22%7D&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.wired.cm%2Fnav-rollover%2Fsecurity%2Farticle%2F1%22%2C%22advertiserId%22%3A347421895%2C%22campaignId%22%3A2695337190%2C%22creativeId%22%3A138312068593%2C%22elementId%22%3A%22nav_rollover_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22platform%22%3A%5B%22verso%22%5D%2C%22tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%7D%2C%22lineItemId%22%3A5372985575%2C%22name%22%3A%22nav_rollover_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x200%22%2C%22slug%22%3A%22dns-ddos-amplification-attack%22%7D&dim3=%7B%22footerStart%22%3A1590075866631%2C%22headerStart%22%3A1590075866350%2C%22navigationStart%22%3A1590075865794%2C%22injected%22%3A1590075868905%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22nav-rollover%22%5D%2C%22ctx_slot_type%22%3A%5B%22nav_rollover%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22nav_rollover_0%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22mt_article_two_column%22%5D%2C%22ctx_page_channel%22%3A%5B%22security%22%5D%2C%22ctx_page_sub_channel%22%3A%5B%22cyberattacks-and-hacks%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.32.25%22%5D%2C%22ctx_page_slug%22%3A%5B%22dns-ddos-amplification-attack%22%5D%2C%22cnt_copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22cnt_platform%22%3A%5B%22verso%22%5D%2C%22cnt_tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cnt_cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%2C%22usr_bkt_eva%22%3A%5B%2260%22%5D%2C%22usr_bkt_ses%22%3A%5B%2264%22%5D%2C%22usr_bkt_pv%22%3A%5B%2212%22%5D%2C%22usr_pvc_bs%22%3A%5B%221%22%5D%2C%22usr_pvc_24hr%22%3A%5B%221%22%5D%2C%22usr_pvc_30d%22%3A%5B%221%22%5D%2C%22usr_svc_30d%22%3A%5B%221%22%5D%2C%22usr_auth%22%3A%5B%22false%22%5D%2C%22vnd_prx_segments%22%3A%5B%22131100%22%2C%22131118%22%2C%22121100%22%2C%22300003%22%2C%22210001%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22240018%22%2C%22240019%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22euwba9%22%2C%22ap05we%22%2C%2265f9pd%22%2C%22awpwvf%22%5D%2C%22usr_segments%22%3A%5B%22co.w2021%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_sg%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_xid%22%3A%5B%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%5D%2C%22vnd_4d_sid%22%3A%5B%2215b269ad-904b-49b9-bc56-cc387f5f5e9d%22%5D%2C%22vnd_4d_pid%22%3A%5B%22159ae3bc-90df-41b6-b3a4-64b5b8fe9857%22%5D%7D&environment=prod&origin=wired&cKh=server%2Cdns%2Cdomain%2Cddos%2Cresearcher%2Camplification%2Cnxnsattack%2Ccloudflare%2Cgoogle%2Csubdomain%2Crequest%2Cdyn%2Cdan%20kaminsky%2Clior%20shafir%2Cinternet%2Caddress%2Cprovider%2Ctel%20aviv%20university
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:29 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
view
securepubads.g.doubleclick.net/pcs/ Frame 9E55
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsv3z4vuWPNfS_DZJY3L27e9S9YfWlAzaS0WtNL6a11Iz1f7gJENkO2xrlkTbRZkBjS_WaSWFJjSuOzLe4wO5LRIPM7rygZw6cpWUksU-PkTS8VJsYfaIUftDk76_CId4Vy8Pk90qfYCLCh_JkAKDc4ZmUedlKQ-nHcHHbjiaFOMHXN9cavB15TtMRP-NSQr0Og5FSqIYPYxZdgQIpj19BWAiwIuTzlhNyGeMZDVKfouV9GXyoUByjNyLAmfOtZtRyLpP_qVIzB5pc8I7-vo50kDXrt_67s6VlfpiSgHtw&sai=AMfl-YT-lDxDCN1fQ8ux8UcsdbZGLNecLF2sPRwMMxJmkj4s66Xgj4zE_usjfDoO1OIiyFS7eQDQq-uOvRzhUT0zIWg3_XNHuO8vcBGTmBRp-Yritvau14HaPylrznZ_i1_ZBw&sig=Cg0ArKJSzCEATXqYjCnZEAE&urlfix=1&adurl=
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 21 May 2020 15:44:28 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Thu, 21 May 2020 15:44:28 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 9E55
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
124220f530266be8497184bf5b9adc70961a8021bfae7e70136fe862a35d17d2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1589974910160429"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28390
x-xss-protection
0
expires
Thu, 21 May 2020 15:44:28 GMT
truncated
/ Frame 9E55
20 KB
0
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1b81df5367a5c58a64318acde1a43ac95f1163ab8545e4faa7a3efa1b47f5388

Request headers

Origin
https://www.wired.com
Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
application/font-woff;charset=utf-8
truncated
/ Frame 9E55
45 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1156bbfd835f82e4f8d20f7609d3b5015d5816e03bad1393cab0fc53b6d45db3

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/ Frame 9E55
109 KB
109 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ba9bc4578683117bc9dc212d2ecb4db46144f4d4bf5aafcfca27b6d5992027aa

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
Origin
https://www.wired.com

Response headers

Content-Type
font/truetype;charset=utf-8
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A28.971Z&_t=slot_rendered&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035&cEnt=domain%2C%20ddos%2C%20nxnsattack%2C%20cloudflare%2C%20google%2C%20dyn%2C%20dan%20kaminsky%2C%20lior%20shafir%2C%20tel%20aviv%20university%2C%20botnet%2C%20mirai%2C%20amazon%2C%20hacker%2C%20reddit%2C%20spotify%2C%20herzliya%2C%20head%2C%20phone%2C%20microsoft%2C%20anat%20bremler-barr&cEnw=0.8771759765780737%2C%200.8338062589064815%2C%200.7648210431735492%2C%200.7514458020584966%2C%200.7317869554836482%2C%200.6880327132394504%2C%200.6459096081084209%2C%200.6452865510103766%2C%200.621896185053759%2C%200.5989079930460709%2C%200.5942368447904924%2C%200.5410839432213714%2C%200.5033271113253491%2C%200.46697963005128895%2C%200.4657578192440538%2C%200.4278893088937706%2C%200.4267021729964771%2C%200.41944985438039595%2C%200.4069384737931213%2C%200.374782232092937&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&cPd=2020-05-19T10%3A00%3A00.000Z&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=7300&pSw=1600&pSh=1200&uID=2a36347c-3e6d-48d2-be9f-8311e276647d&sID=029620a5-5c1e-4209-9229-5cfa3d766f3f&pID=4ace29e1-f455-4b7d-8b0c-b6f9ba75f604&uDt=desktop&_o=wired&_c=cns_ads&xID=74c407ba-cc71-4c85-94c2-5a307e44f09c&dim1=%7B%22channel%22%3A%22security%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22subChannel%22%3A%22cyberattacks-and-hacks%22%2C%22template%22%3A%22mt_article_two_column%22%2C%22version%22%3A%226.32.25%22%7D&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.wired.cm%2Fcm-footer%2Fsecurity%2Farticle%2F1%22%2C%22advertiserId%22%3A347421895%2C%22campaignId%22%3A2695337190%2C%22creativeId%22%3A138312068590%2C%22elementId%22%3A%22cm_footer_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22platform%22%3A%5B%22verso%22%5D%2C%22tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%7D%2C%22lineItemId%22%3A5372986298%2C%22name%22%3A%22cm_footer_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22940x140%22%2C%22slug%22%3A%22dns-ddos-amplification-attack%22%7D&dim3=%7B%22footerStart%22%3A1590075866631%2C%22headerStart%22%3A1590075866350%2C%22navigationStart%22%3A1590075865794%2C%22injected%22%3A1590075868971%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22cm-footer%22%5D%2C%22ctx_slot_type%22%3A%5B%22cm_footer%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22cm_footer_0%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22mt_article_two_column%22%5D%2C%22ctx_page_channel%22%3A%5B%22security%22%5D%2C%22ctx_page_sub_channel%22%3A%5B%22cyberattacks-and-hacks%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.32.25%22%5D%2C%22ctx_page_slug%22%3A%5B%22dns-ddos-amplification-attack%22%5D%2C%22cnt_copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22cnt_platform%22%3A%5B%22verso%22%5D%2C%22cnt_tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cnt_cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%2C%22usr_bkt_eva%22%3A%5B%2260%22%5D%2C%22usr_bkt_ses%22%3A%5B%2264%22%5D%2C%22usr_bkt_pv%22%3A%5B%2212%22%5D%2C%22usr_pvc_bs%22%3A%5B%221%22%5D%2C%22usr_pvc_24hr%22%3A%5B%221%22%5D%2C%22usr_pvc_30d%22%3A%5B%221%22%5D%2C%22usr_svc_30d%22%3A%5B%221%22%5D%2C%22usr_auth%22%3A%5B%22false%22%5D%2C%22vnd_prx_segments%22%3A%5B%22131100%22%2C%22131118%22%2C%22121100%22%2C%22300003%22%2C%22210001%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22240018%22%2C%22240019%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22euwba9%22%2C%22ap05we%22%2C%2265f9pd%22%2C%22awpwvf%22%5D%2C%22usr_segments%22%3A%5B%22co.w2021%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_sg%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_xid%22%3A%5B%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%5D%2C%22vnd_4d_sid%22%3A%5B%2215b269ad-904b-49b9-bc56-cc387f5f5e9d%22%5D%2C%22vnd_4d_pid%22%3A%5B%22159ae3bc-90df-41b6-b3a4-64b5b8fe9857%22%5D%7D&environment=prod&origin=wired&cKh=server%2Cdns%2Cdomain%2Cddos%2Cresearcher%2Camplification%2Cnxnsattack%2Ccloudflare%2Cgoogle%2Csubdomain%2Crequest%2Cdyn%2Cdan%20kaminsky%2Clior%20shafir%2Cinternet%2Caddress%2Cprovider%2Ctel%20aviv%20university
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:29 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
linkid.js
www.google-analytics.com/plugins/ua/
2 KB
957 B
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/linkid.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
92fca55833f48b4289ac8f1cedd48752b580fce4ec4b5d81670b8193d6e51b54
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 14:50:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 22 Oct 2019 18:15:00 GMT
server
sffe
age
3231
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
859
x-xss-protection
0
expires
Thu, 21 May 2020 15:50:38 GMT
publisher:getClientId
ampcid.google.com/v1/
74 B
268 B
XHR
General
Full URL
https://ampcid.google.com/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
991bfe84fec788f2b7d432b99a60c1e2aa2e799bc0137da8cf478299d0fc9a10
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Thu, 21 May 2020 15:44:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://www.wired.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
94
x-xss-protection
0
truncated
/ Frame EFBF
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
47820a25c9e3087ca687cb0016201ccec1cf82e985316e61898c97e3c9478664

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame 8562
209 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4dfe322714457c8b6c341a69eed35da7e5b58925e7279e5ffc5de334236e006b

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
publisher:getClientId
ampcid.google.de/v1/
3 B
267 B
XHR
General
Full URL
https://ampcid.google.de/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Thu, 21 May 2020 15:44:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://www.wired.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
23
x-xss-protection
0
Science_contacttracing_542743265.jpg
media.wired.com/photos/5ebb0be8c8897781bab6e255/1:1/w_350%2Ch_350%2Cc_limit/
13 KB
14 KB
Image
General
Full URL
https://media.wired.com/photos/5ebb0be8c8897781bab6e255/1:1/w_350%2Ch_350%2Cc_limit/Science_contacttracing_542743265.jpg
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.239 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
22a8926ac8b3833e78459c9a9c4ce4201a54d839a16d2f02ce060ffc00602162

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 15:44:29 GMT
Connection
keep-alive
Age
696664
X-Cache
HIT, HIT
Fastly-Io-Info
ifsz=357884 idim=2400x1800 ifmt=jpeg ofsz=13358 odim=350x350 ofmt=webp
Fastly-Stats
io=1
Fastly-Restarts
1
X-Served-By
cache-bwi5140-BWI, cache-hhn4072-HHN
experience
katra
Accept-Ranges
bytes
X-Timer
S1590075869.296812,VS0,VE1
Etag
"UzejCGAN8WnxlpLe8w2cZzDfH4sModfUKYWzDuPDP/k"
Vary
Accept
Content-Type
image/webp
cache-control
max-age=31536, must-revalidate, public
Content-Length
13358
X-Cache-Hits
1, 7
RROSALES_WIRED_MARCUS_HUTCHINS_0288-Web-Size.jpg
media.wired.com/photos/5eb33b09c8897781bab6e20e/1:1/w_350%2Ch_350%2Cc_limit/
17 KB
18 KB
Image
General
Full URL
https://media.wired.com/photos/5eb33b09c8897781bab6e20e/1:1/w_350%2Ch_350%2Cc_limit/RROSALES_WIRED_MARCUS_HUTCHINS_0288-Web-Size.jpg
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.239 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
a1fb3002fa09c0a421dcedd123ca340f5f6d0a916334e0930dae2f7e6005b426

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 15:44:29 GMT
Connection
keep-alive
Age
845953
X-Cache
HIT, HIT
Fastly-Io-Info
ifsz=2502006 idim=2400x1600 ifmt=jpeg ofsz=17606 odim=350x350 ofmt=webp
Fastly-Stats
io=1
Fastly-Restarts
1
X-Served-By
cache-bwi5122-BWI, cache-hhn4072-HHN
experience
katra
Accept-Ranges
bytes
X-Timer
S1590075869.356223,VS0,VE1
Etag
"pCsPpDlvAkqlqu+F4ZiFb//tTMBTNGQVY7ETr58nl1o"
Vary
Accept
Content-Type
image/webp
cache-control
max-age=31536, must-revalidate, public
Content-Length
17606
X-Cache-Hits
1, 7
Security_nigerian_unemploymentfraud_GettyImages-1219747227.jpg
media.wired.com/photos/5ec2f3af6c0df3393bc20f81/1:1/w_350%2Ch_350%2Cc_limit/
15 KB
15 KB
Image
General
Full URL
https://media.wired.com/photos/5ec2f3af6c0df3393bc20f81/1:1/w_350%2Ch_350%2Cc_limit/Security_nigerian_unemploymentfraud_GettyImages-1219747227.jpg
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.239 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
948b504398671afd8ecc6c6d646a067e038f24a58982657bdeccd66ce80378bd

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 15:44:29 GMT
Connection
keep-alive
Age
227050
X-Cache
HIT, HIT
Fastly-Io-Info
ifsz=414109 idim=2400x1600 ifmt=jpeg ofsz=14960 odim=350x350 ofmt=webp
Fastly-Stats
io=1
Fastly-Restarts
1
X-Served-By
cache-bwi5151-BWI, cache-hhn4047-HHN
experience
katra
Accept-Ranges
bytes
X-Timer
S1590075869.403771,VS0,VE1
Etag
"fAvuUN5qUSvp3pxZAw5sPm/4Y8S3CPyJdhZaL+Wfy/o"
Vary
Accept
Content-Type
image/webp
cache-control
max-age=31536, must-revalidate, public
Content-Length
14960
X-Cache-Hits
1, 7
Science_density_1150104188.jpg
media.wired.com/photos/5ec44acc5bea2fa8333c4ed6/1:1/w_350%2Ch_350%2Cc_limit/
21 KB
21 KB
Image
General
Full URL
https://media.wired.com/photos/5ec44acc5bea2fa8333c4ed6/1:1/w_350%2Ch_350%2Cc_limit/Science_density_1150104188.jpg
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.239 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
3fab230c4a6c418b4a0dc12eb8f447c374c82f7b9f9078dcaba9ac8850a46bbd

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 15:44:29 GMT
Connection
keep-alive
Age
102982
X-Cache
HIT, HIT
Fastly-Io-Info
ifsz=460566 idim=2300x1725 ifmt=jpeg ofsz=21072 odim=350x350 ofmt=webp
Fastly-Stats
io=1
Fastly-Restarts
1
X-Served-By
cache-bwi5126-BWI, cache-hhn4020-HHN
experience
katra
Accept-Ranges
bytes
X-Timer
S1590075869.404193,VS0,VE1
Etag
"nHaLCZJNul3i4AdFYetuv6aMv3oQMe+WqVrfH3KB3s0"
Vary
Accept
Content-Type
image/webp
cache-control
max-age=31536, must-revalidate, public
Content-Length
21072
X-Cache-Hits
1, 6
truncated
/ Frame 265B
213 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
58d0a337dbe45ce9dea8cef77aa67a7eb152bfae5dee75f1e1e3842079901850

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
ads
securepubads.g.doubleclick.net/gampad/
302 B
187 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=4403451964970526&correlator=4439504434337096&output=ldjh&impl=fifs&adsid=NT&vrg=2020050602&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200521&iu_parts=3379%2Cconde.wired.native%2Caside%2Csecurity%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=320x50%7C2x2&fluid=height&ppid=74c407bacc714c8594c25a307e44f09c&prev_scp=pos%3Daside%26ctx_slot_type%3Daside%26ctx_slot_rn%3D0%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Daside_0&eri=1&cust_params=m_data%3D1%26m_safety%3Dsafe%26m_categories%3Dmoat_safe%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26env_device_type%3Ddesktop%26ctx_template%3Dmt_article_two_column%26ctx_page_channel%3Dsecurity%26ctx_page_sub_channel%3Dcyberattacks-and-hacks%26env_server%3Dproduction%26ctx_cns_version%3D6.32.25%26ctx_page_slug%3Ddns-ddos-amplification-attack%26cnt_copilotid%3D5ec1e85cd58e99fafced8096%26cnt_platform%3Dverso%26cnt_tags%3Ddns%252Cddos%252Cinternet%252Ccybersecurity%252Csecurity%252Ccyberattacks-and-hacks%26cnt_cm%3Dcm_pay_ent_sample%252Ccm_pay_scope_none%252Ccm_pay_ent_sample_cnt_1%252Ccm_pay_ent_sample_max_4%26usr_bkt_eva%3D60%26usr_bkt_ses%3D64%26usr_bkt_pv%3D12%26usr_pvc_bs%3D1%26usr_pvc_24hr%3D1%26usr_pvc_30d%3D1%26usr_svc_30d%3D1%26usr_auth%3Dfalse%26vnd_prx_segments%3D131100%252C131118%252C121100%252C300003%252C210001%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252C240018%252C240019%252Cqx7745%252Cwmhp4i%252Ceuwba9%252Cap05we%252C65f9pd%252Cawpwvf%26usr_segments%3Dco.w2021%26vnd_4d_cached%3D0%26vnd_4d_ctx_sg%3D%26vnd_4d_ctx_topics%3Ddomain%252Cddos%252Cnxnsattack%252Ccloudflare%252Cgoogle%252Cdyn%252Cdan_kaminsky%252Clior_shafir%252Ctel_aviv_university%252Cbotnet%252Cmirai%252Camazon%252Chacker%252Creddit%252Cspotify%252Cherzliya%252Chead%252Cphone%252Cmicrosoft%252Canat_bremler-barr%26vnd_4d_ctx_entities%3Ddomain%252Cddos%252Cnxnsattack%252Ccloudflare%252Cgoogle%252Cdyn%252Cdan_kaminsky%252Clior_shafir%252Ctel_aviv_university%252Cbotnet%252Cmirai%252Camazon%252Chacker%252Creddit%252Cspotify%252Cherzliya%252Chead%252Cphone%252Cmicrosoft%252Canat_bremler-barr%26vnd_4d_ctx_keywords%3Dserver%252Cdns%252Cdomain%252Cddos%252Cresearcher%252Camplification%252Cnxnsattack%252Ccloudflare%252Cgoogle%252Csubdomain%252Crequest%252Cdyn%252Cdan_kaminsky%252Clior_shafir%252Cinternet%252Caddress%252Cprovider%252Ctel_aviv_university%252Cbotnet%252Cmirai%26vnd_4d_usr_topics%3D%26vnd_4d_xid%3D74c407ba-cc71-4c85-94c2-5a307e44f09c%26vnd_4d_sid%3D029620a5-5c1e-4209-9229-5cfa3d766f3f%26vnd_4d_pid%3D4ace29e1-f455-4b7d-8b0c-b6f9ba75f604%26ctx_advertisers%3D347421895%26ctx_line_items%3D5372985539%252C5371845003%252C5372985575%252C5372986298%26ctx_creatives%3D138311697852%252C138311697870%252C138312068593%252C138312068590&cookie=ID%3Da3c78eb1ceb1487c%3AT%3D1590075867%3AS%3DALNI_MYAW3Jbni4YkFhAR1lRV8AeyU2UIg&cookie_enabled=1&bc=31&abxe=1&lmt=1590075869&dt=1590075869307&dlt=1590075866087&idt=1579&frm=20&biw=1600&bih=1200&oid=3&adxs=-12245933&adys=-12245933&adks=1253013061&ucis=9&ifi=9&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&dssz=59&icsg=845146500427776&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x0&msz=0x0&ga_vid=425008880.1590075868&ga_sid=1590075868&ga_hid=68812284&fws=640&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
d5ccc2b73882bac3e8f07d6943aa13558f493864a6186105e50c2de5e6b31d92
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:29 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
113
x-xss-protection
0
google-lineitem-id
-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.wired.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
truncated
/ Frame 9E55
213 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
998a77e289ecb47ee3e3e804e3e2b515d4fc109a2661cb2da4f1715c5560a9f7

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
onetag
assoc-na.associates-amazon.com/
64 B
408 B
XHR
General
Full URL
https://assoc-na.associates-amazon.com/onetag?src=330&sz=1x1&pj=%7B%22tracking_id%22%3A%22w050b-20%22%2C%22region%22%3A%22US%22%2C%22slotNum%22%3A0%2C%22assocPayloadId%22%3Anull%2C%22refUrl%22%3A%22https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F%22%2C%22pageTitle%22%3A%22Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique%20%7C%20WIRED%22%7D&u=https://www.wired.com/story/dns-ddos-amplification-attack/
Requested by
Host: z-na.associates-amazon.com
URL: https://z-na.associates-amazon.com/onetag/v2?MarketPlace=US&instanceId=11cb70e4-21b3-453f-834c-1463094700df
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
72.21.195.65 Ashburn, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
s3-1.amazonaws.com
Software
Server /
Resource Hash
9987bd313c744c1948e318dccaf1b282af9ed5050face496439fb99c491138e4

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 15:44:29 GMT
Server
Server
x-amz-rid
03ZNGY81ZBQNVWRM590Q
Vary
Accept-Encoding,X-Amzn-CDN-Cache,X-Amzn-AX-Treatment,User-Agent
Content-Type
application/json
Access-Control-Allow-Origin
https://www.wired.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
64
robots.txt
t.skimresources.com/api/v2/ Frame 5222
0
102 B
Image
General
Full URL
https://t.skimresources.com/api/v2/robots.txt?__skimjs_preflight__please_ignore__=true&rnd=0.5401691157105082
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
206
date
Thu, 21 May 2020 15:44:29 GMT
via
1.1 google
server
Python/3.7 aiohttp/3.5.4
alt-svc
clear
content-length
0
content-type
text/plain charset=UTF-8
px.gif
p.skimresources.com/
43 B
244 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=1&rn=6.958529485655111
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
35.190.91.160 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
160.91.190.35.bc.googleusercontent.com
Software
Skimlinks Pixel 1.0 /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:29 GMT
via
1.1 google
server
Skimlinks Pixel 1.0
p3p
policyref="http://skimlinks.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
status
200
content-type
image/gif
alt-svc
clear
content-length
43
px.gif
p.skimresources.com/
43 B
102 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=2&rn=6.958529485655111
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
35.190.91.160 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
160.91.190.35.bc.googleusercontent.com
Software
Skimlinks Pixel 1.0 /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:29 GMT
via
1.1 google
server
Skimlinks Pixel 1.0
p3p
policyref="http://skimlinks.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
status
200
content-type
image/gif
alt-svc
clear
content-length
43
otCMP.js
cdn.cookielaw.org/scripttemplates/5.15.0/
16 KB
5 KB
Script
General
Full URL
https://cdn.cookielaw.org/scripttemplates/5.15.0/otCMP.js
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.15.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:1cb7:261b:1f9c:2074:3c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (frc/8F86) /
Resource Hash
fd9ee23548e148a3798e79ae0553689b81675afe6791f53d5e8af20973e6a7b0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Thu, 21 May 2020 15:44:29 GMT
content-encoding
gzip
content-md5
cgEQ1F8+NKFKe9J6MXvYfw==
age
14208
x-cache
HIT
status
200
content-length
5312
x-ms-lease-status
unlocked
last-modified
Mon, 18 May 2020 06:40:34 GMT
server
ECAcc (frc/8F86)
etag
0x8D7FAF65E3AA090
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
x-ms-request-id
a0977130-101e-012b-6b65-2fea0b000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
expires
Thu, 21 May 2020 19:44:29 GMT
ads
securepubads.g.doubleclick.net/gampad/
12 KB
6 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=4403451964970526&correlator=4439504434337096&output=ldjh&impl=fifs&adsid=NT&vrg=2020050602&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200521&iu_parts=3379%2Cconde.wired%2Chero%2Csecurity%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=728x90%7C970x250%7C970x90%7C9x1%7C10x1&ppid=74c407bacc714c8594c25a307e44f09c&prev_scp=pos%3Dhero%26ctx_slot_type%3Dhero%26ctx_slot_rn%3D0%26m_mv%3DslotNoHistData%26m_gv%3DslotNoHistData%26amznbid%3D2%26amznp%3D2%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dhero_0&eri=1&cust_params=m_data%3D1%26m_safety%3Dsafe%26m_categories%3Dmoat_safe%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26env_device_type%3Ddesktop%26ctx_template%3Dmt_article_two_column%26ctx_page_channel%3Dsecurity%26ctx_page_sub_channel%3Dcyberattacks-and-hacks%26env_server%3Dproduction%26ctx_cns_version%3D6.32.25%26ctx_page_slug%3Ddns-ddos-amplification-attack%26cnt_copilotid%3D5ec1e85cd58e99fafced8096%26cnt_platform%3Dverso%26cnt_tags%3Ddns%252Cddos%252Cinternet%252Ccybersecurity%252Csecurity%252Ccyberattacks-and-hacks%26cnt_cm%3Dcm_pay_ent_sample%252Ccm_pay_scope_none%252Ccm_pay_ent_sample_cnt_1%252Ccm_pay_ent_sample_max_4%26usr_bkt_eva%3D60%26usr_bkt_ses%3D64%26usr_bkt_pv%3D12%26usr_pvc_bs%3D1%26usr_pvc_24hr%3D1%26usr_pvc_30d%3D1%26usr_svc_30d%3D1%26usr_auth%3Dfalse%26vnd_prx_segments%3D131100%252C131118%252C121100%252C300003%252C210001%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252C240018%252C240019%252Cqx7745%252Cwmhp4i%252Ceuwba9%252Cap05we%252C65f9pd%252Cawpwvf%26usr_segments%3Dco.w2021%26vnd_4d_cached%3D0%26vnd_4d_ctx_sg%3D%26vnd_4d_ctx_topics%3Ddomain%252Cddos%252Cnxnsattack%252Ccloudflare%252Cgoogle%252Cdyn%252Cdan_kaminsky%252Clior_shafir%252Ctel_aviv_university%252Cbotnet%252Cmirai%252Camazon%252Chacker%252Creddit%252Cspotify%252Cherzliya%252Chead%252Cphone%252Cmicrosoft%252Canat_bremler-barr%26vnd_4d_ctx_entities%3Ddomain%252Cddos%252Cnxnsattack%252Ccloudflare%252Cgoogle%252Cdyn%252Cdan_kaminsky%252Clior_shafir%252Ctel_aviv_university%252Cbotnet%252Cmirai%252Camazon%252Chacker%252Creddit%252Cspotify%252Cherzliya%252Chead%252Cphone%252Cmicrosoft%252Canat_bremler-barr%26vnd_4d_ctx_keywords%3Dserver%252Cdns%252Cdomain%252Cddos%252Cresearcher%252Camplification%252Cnxnsattack%252Ccloudflare%252Cgoogle%252Csubdomain%252Crequest%252Cdyn%252Cdan_kaminsky%252Clior_shafir%252Cinternet%252Caddress%252Cprovider%252Ctel_aviv_university%252Cbotnet%252Cmirai%26vnd_4d_usr_topics%3D%26vnd_4d_xid%3D74c407ba-cc71-4c85-94c2-5a307e44f09c%26vnd_4d_sid%3D029620a5-5c1e-4209-9229-5cfa3d766f3f%26vnd_4d_pid%3D4ace29e1-f455-4b7d-8b0c-b6f9ba75f604%26ctx_advertisers%3D347421895%26ctx_line_items%3D5372985539%252C5371845003%252C5372985575%252C5372986298%26ctx_creatives%3D138311697852%252C138311697870%252C138312068593%252C138312068590&cookie=ID%3Da3c78eb1ceb1487c%3AT%3D1590075867%3AS%3DALNI_MYAW3Jbni4YkFhAR1lRV8AeyU2UIg&cookie_enabled=1&bc=31&abxe=1&lmt=1590075869&dt=1590075869444&dlt=1590075866087&idt=1579&frm=20&biw=1600&bih=1200&oid=3&adxs=436&adys=50&adks=2032318971&ucis=a&ifi=10&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&dssz=60&icsg=3380585954340864&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1600x90&msz=1600x90&ga_vid=425008880.1590075868&ga_sid=1590075868&ga_hid=68812284&fws=0&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
2346c6a19d3d03015bb9072964f4dcfcd19abaefc3279f31e24684504ceb4a68
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:29 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5965
x-xss-protection
0
google-lineitem-id
5365161014
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138310817832
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.wired.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
6 KB
3 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=4403451964970526&correlator=4439504434337096&output=ldjh&impl=fifs&adsid=NT&vrg=2020050602&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200521&iu_parts=3379%2Cconde.wired%2Crail%2Csecurity%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=300x250%7C300x600&ppid=74c407bacc714c8594c25a307e44f09c&prev_scp=pos%3Drail%26ctx_slot_type%3Drail%26ctx_slot_rn%3D0%26m_mv%3DslotNoHistData%26m_gv%3DslotNoHistData%26amznbid%3D2%26amznp%3D2%26hb_format%3Dbanner%26hb_source%3Dclient%26hb_size%3D300x250%26hb_pb%3D0.06%26hb_adid%3D47ea40d10d68bd9%26hb_bidder%3Drubicon%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Drail_0&eri=1&cust_params=m_data%3D1%26m_safety%3Dsafe%26m_categories%3Dmoat_safe%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26env_device_type%3Ddesktop%26ctx_template%3Dmt_article_two_column%26ctx_page_channel%3Dsecurity%26ctx_page_sub_channel%3Dcyberattacks-and-hacks%26env_server%3Dproduction%26ctx_cns_version%3D6.32.25%26ctx_page_slug%3Ddns-ddos-amplification-attack%26cnt_copilotid%3D5ec1e85cd58e99fafced8096%26cnt_platform%3Dverso%26cnt_tags%3Ddns%252Cddos%252Cinternet%252Ccybersecurity%252Csecurity%252Ccyberattacks-and-hacks%26cnt_cm%3Dcm_pay_ent_sample%252Ccm_pay_scope_none%252Ccm_pay_ent_sample_cnt_1%252Ccm_pay_ent_sample_max_4%26usr_bkt_eva%3D60%26usr_bkt_ses%3D64%26usr_bkt_pv%3D12%26usr_pvc_bs%3D1%26usr_pvc_24hr%3D1%26usr_pvc_30d%3D1%26usr_svc_30d%3D1%26usr_auth%3Dfalse%26vnd_prx_segments%3D131100%252C131118%252C121100%252C300003%252C210001%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252C240018%252C240019%252Cqx7745%252Cwmhp4i%252Ceuwba9%252Cap05we%252C65f9pd%252Cawpwvf%26usr_segments%3Dco.w2021%26vnd_4d_cached%3D0%26vnd_4d_ctx_sg%3D%26vnd_4d_ctx_topics%3Ddomain%252Cddos%252Cnxnsattack%252Ccloudflare%252Cgoogle%252Cdyn%252Cdan_kaminsky%252Clior_shafir%252Ctel_aviv_university%252Cbotnet%252Cmirai%252Camazon%252Chacker%252Creddit%252Cspotify%252Cherzliya%252Chead%252Cphone%252Cmicrosoft%252Canat_bremler-barr%26vnd_4d_ctx_entities%3Ddomain%252Cddos%252Cnxnsattack%252Ccloudflare%252Cgoogle%252Cdyn%252Cdan_kaminsky%252Clior_shafir%252Ctel_aviv_university%252Cbotnet%252Cmirai%252Camazon%252Chacker%252Creddit%252Cspotify%252Cherzliya%252Chead%252Cphone%252Cmicrosoft%252Canat_bremler-barr%26vnd_4d_ctx_keywords%3Dserver%252Cdns%252Cdomain%252Cddos%252Cresearcher%252Camplification%252Cnxnsattack%252Ccloudflare%252Cgoogle%252Csubdomain%252Crequest%252Cdyn%252Cdan_kaminsky%252Clior_shafir%252Cinternet%252Caddress%252Cprovider%252Ctel_aviv_university%252Cbotnet%252Cmirai%26vnd_4d_usr_topics%3D%26vnd_4d_xid%3D74c407ba-cc71-4c85-94c2-5a307e44f09c%26vnd_4d_sid%3D029620a5-5c1e-4209-9229-5cfa3d766f3f%26vnd_4d_pid%3D4ace29e1-f455-4b7d-8b0c-b6f9ba75f604%26ctx_advertisers%3D347421895%26ctx_line_items%3D5372985539%252C5371845003%252C5372985575%252C5372986298%26ctx_creatives%3D138311697852%252C138311697870%252C138312068593%252C138312068590&cookie=ID%3Da3c78eb1ceb1487c%3AT%3D1590075867%3AS%3DALNI_MYAW3Jbni4YkFhAR1lRV8AeyU2UIg&cookie_enabled=1&bc=31&abxe=1&lmt=1590075869&dt=1590075869456&dlt=1590075866087&idt=1579&frm=20&biw=1600&bih=1200&oid=3&adxs=1086&adys=1220&adks=3607248659&ucis=b&ifi=11&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&dssz=60&icsg=3380585954340864&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=300x250&msz=300x250&ga_vid=425008880.1590075868&ga_sid=1590075868&ga_hid=68812284&fws=512&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
b22b0e6f6552b691e753d0c7ed9806e6b1d4301eb06f2af0ce3a7569908afc0b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:29 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
3086
x-xss-protection
0
google-lineitem-id
5040599734
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138267908832
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.wired.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
bf7a80fa-2ad9-4ec7-b7a2-9b3fd8e20f05
https://www.wired.com/ Frame 61B2
31 B
0
Other
General
Full URL
blob:https://www.wired.com/bf7a80fa-2ad9-4ec7-b7a2-9b3fd8e20f05
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-49be74de237db7d6199d.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7725538fe2f71147bffeba7452b434c826aef9009666cb4360c605d0b2a91d1d

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
31
Content-Type
application/javascript
sf-ui-display-medium-webfont.woff2
d2c8v52ll5s99u.cloudfront.net/assets/fonts/ Frame 61B2
29 KB
30 KB
Font
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/assets/fonts/sf-ui-display-medium-webfont.woff2
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.157.237 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-157-237.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
d281c9d6bae645f3da6d2f0769a2cf0668709fd28e2021ce74821cdd8c7117b3

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-3b3a013ac40046610e8f2fefe02c3b07.css
Origin
https://www.wired.com

Response headers

Date
Thu, 21 May 2020 15:44:31 GMT
Content-Encoding
gzip
Vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
X-Amz-Cf-Pop
FRA53
X-Cache
RefreshHit from cloudfront
Connection
keep-alive
Content-Length
29632
Access-Control-Allow-Origin
*
Last-Modified
Mon, 26 Jun 2017 15:24:42 GMT
Server
AmazonS3
ETag
"7d18db04f980971f2a9c5026bbc34bed"
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET
Content-Type
application/font-woff2
Via
1.1 3283735112d0a322451d32ef038129c9.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
Accept-Ranges
bytes
X-Amz-Cf-Id
qaKbbTLAMqOloa27GuZ8x49moXdLq8oGIPFxs-cjf39yW_G4sjRftQ==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
bridge3.386.2_en.html
imasdk.googleapis.com/js/core/ Frame F2A9
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.386.2_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.386.2_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.wired.com/story/dns-ddos-amplification-attack/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/story/dns-ddos-amplification-attack/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
201954
date
Wed, 20 May 2020 15:54:26 GMT
expires
Thu, 20 May 2021 15:54:26 GMT
last-modified
Thu, 14 May 2020 15:48:13 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
85803
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
client.js
s0.2mdn.net/instream/video/ Frame 61B2
26 KB
11 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:802::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
10523
x-xss-protection
0
expires
Thu, 21 May 2020 15:44:29 GMT
integrator.js
adservice.google.com/adsid/ Frame 61B2
109 B
168 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.wired.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 21 May 2020 15:44:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
104
x-xss-protection
0
fbevents.js
connect.facebook.net/en_US/ Frame 61B2
131 KB
31 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-49be74de237db7d6199d.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
4cb61e44bf63a9e090e666898cd04d382e4c33b55b62cc5e9ff7dab055fbf787
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-27=":443"; ma=3600
content-length
31766
x-xss-protection
0
pragma
public
x-fb-debug
+DsBdW/XcEadI26YfKuEPtGN9BpwTXRWgkmrefBoph8X9W5t6alPEM4w3AjIU3JIaikPnKryrfETEcLpj2HvtA==
x-fb-trip-id
664085054
x-frame-options
DENY
date
Thu, 21 May 2020 15:44:29 GMT, Thu, 21 May 2020 15:44:29 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
comscore-min.js
d2c8v52ll5s99u.cloudfront.net/player/ Frame 61B2
38 KB
11 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/comscore-min.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-49be74de237db7d6199d.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.157.237 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-157-237.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
833a86642252016b29f08dd45ffd27f9e00ca237f28d8c5f0147a6e15d009377

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 15:41:55 GMT
Content-Encoding
gzip
Last-Modified
Wed, 24 May 2017 18:19:15 GMT
Server
AmazonS3
Age
155
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
text/javascript
Via
1.1 4ba0e9deb9465045a3261b8712935964.cloudfront.net (CloudFront)
Connection
keep-alive
Transfer-Encoding
chunked
X-Amz-Cf-Pop
FRA53
X-Amz-Cf-Id
MncMbzGOD97puOfnFjQmGbZio2NLGzqQiG2Q2mFf8qCV7RItQAIKfg==
infinityid
infinityid.condenastdigital.com/ Frame 61B2
36 B
1 KB
XHR
General
Full URL
https://infinityid.condenastdigital.com/infinityid
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-49be74de237db7d6199d.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.231.184.25 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-231-184-25.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
6661e1c7295acfb5f269ca116cc4a93b856a6ba0392407d7c23a77a343af4ef6

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 15:44:29 GMT
content-encoding
gzip
Server
nginx/1.15.8
vary
origin,accept-encoding
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
https://www.wired.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
transfer-encoding
chunked
expires
0
track
capture.condenastdigital.com/ Frame 61B2
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2020-05-21T15%3A44%3A29.557Z&_c=&_t=Player%20Requested&sID=029620a5-5c1e-4209-9229-5cfa3d766f3f&pID=4ace29e1-f455-4b7d-8b0c-b6f9ba75f604&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:29 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
wired_barrett-security-tk.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_wired.png,fl_progressive,g_face,h_450,q_80,w_800/v1493847109/ Frame 61B2
40 KB
41 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_wired.png,fl_progressive,g_face,h_450,q_80,w_800/v1493847109/wired_barrett-security-tk.jpg
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.157.216 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-157-216.fra53.r.cloudfront.net
Software
Cloudinary /
Resource Hash
6e56f067cb3ec81399d0925339a0ff254df9115a7e3ce5aed14f1ca1110ea624
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 b7f7970e9c911e165d4cb9f70deac42a.cloudfront.net (CloudFront)
ETag
"154c3b2f1716dde2e9219ac0238e94b0"
X-Amz-Cf-Pop
FRA53
X-Cache
Hit from cloudfront
Server-Timing
fastly;dur=1;cpu=0;start=2020-05-21T03:10:19.051Z;desc=hit,rtt;dur=1
Content-Length
40821
Last-Modified
Sun, 12 Nov 2017 00:10:21 GMT
Server
Cloudinary
Cache-Control
public, no-transform, max-age=300
Date
Thu, 21 May 2020 15:44:30 GMT
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,ETag,Server-Timing
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
M4wQ0DRRZ_3hsKToNH7mP7ij_d9cnHDPBo1riWm0fWubYKEkpjjtuA==
/
r.skimresources.com/api/
Redirect Chain
  • https://r.skimresources.com/api/
  • https://r.skimresources.com/api/?xguid=01E8VYGJPW8C297NJZJZ6M2T3K&persistence=1&checksum=28ace76b637aa07bffeeedc67986ff7b0af2dfe2c9fc6256540c536263666079
173 B
487 B
XHR
General
Full URL
https://r.skimresources.com/api/?xguid=01E8VYGJPW8C297NJZJZ6M2T3K&persistence=1&checksum=28ace76b637aa07bffeeedc67986ff7b0af2dfe2c9fc6256540c536263666079
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
7dc988bbb0e37d0f64b034f1ef88203a7e63605a32fe9f12e37dfbdbbc2484bb
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
openresty/1.11.2.5
status
200
vary
Accept-Encoding
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://www.wired.com
access-control-allow-credentials
true
strict-transport-security
max-age=31536000
content-type
application/json
alt-svc
clear
via
1.1 google

Redirect headers

date
Thu, 21 May 2020 15:44:29 GMT
via
1.1 google
server
openresty/1.11.2.5
status
307
location
https://r.skimresources.com/api/?xguid=01E8VYGJPW8C297NJZJZ6M2T3K&persistence=1&checksum=28ace76b637aa07bffeeedc67986ff7b0af2dfe2c9fc6256540c536263666079
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://www.wired.com
access-control-allow-credentials
true
strict-transport-security
max-age=31536000
content-type
text/html
alt-svc
clear
content-length
193
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A29.847Z&_t=slot_rendered&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035&cEnt=domain%2C%20ddos%2C%20nxnsattack%2C%20cloudflare%2C%20google%2C%20dyn%2C%20dan%20kaminsky%2C%20lior%20shafir%2C%20tel%20aviv%20university%2C%20botnet%2C%20mirai%2C%20amazon%2C%20hacker%2C%20reddit%2C%20spotify%2C%20herzliya%2C%20head%2C%20phone%2C%20microsoft%2C%20anat%20bremler-barr&cEnw=0.8771759765780737%2C%200.8338062589064815%2C%200.7648210431735492%2C%200.7514458020584966%2C%200.7317869554836482%2C%200.6880327132394504%2C%200.6459096081084209%2C%200.6452865510103766%2C%200.621896185053759%2C%200.5989079930460709%2C%200.5942368447904924%2C%200.5410839432213714%2C%200.5033271113253491%2C%200.46697963005128895%2C%200.4657578192440538%2C%200.4278893088937706%2C%200.4267021729964771%2C%200.41944985438039595%2C%200.4069384737931213%2C%200.374782232092937&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&cPd=2020-05-19T10%3A00%3A00.000Z&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=7300&pSw=1600&pSh=1200&uID=3e451649-3bfa-4913-ae30-cbfdfcad151f&uNw=1&uUq=1&pID=cf3c874e-d299-41c3-af8e-2a69712b1f32&uDt=desktop&_o=wired&_c=cns_ads&xID=74c407ba-cc71-4c85-94c2-5a307e44f09c&dim1=%7B%22channel%22%3A%22security%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22subChannel%22%3A%22cyberattacks-and-hacks%22%2C%22template%22%3A%22mt_article_two_column%22%2C%22version%22%3A%226.32.25%22%7D&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.wired.native%2Faside%2Fsecurity%2Farticle%2F1%22%2C%22advertiserId%22%3Anull%2C%22campaignId%22%3Anull%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22aside_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Atrue%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22platform%22%3A%5B%22verso%22%5D%2C%22tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22aside_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%222x2%2Cfluid%22%2C%22slug%22%3A%22dns-ddos-amplification-attack%22%7D&dim3=%7B%22footerStart%22%3A1590075866631%2C%22headerStart%22%3A1590075866350%2C%22navigationStart%22%3A1590075865794%2C%22injected%22%3A1590075869847%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22aside%22%5D%2C%22ctx_slot_type%22%3A%5B%22aside%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22aside_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22mt_article_two_column%22%5D%2C%22ctx_page_channel%22%3A%5B%22security%22%5D%2C%22ctx_page_sub_channel%22%3A%5B%22cyberattacks-and-hacks%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.32.25%22%5D%2C%22ctx_page_slug%22%3A%5B%22dns-ddos-amplification-attack%22%5D%2C%22cnt_copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22cnt_platform%22%3A%5B%22verso%22%5D%2C%22cnt_tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cnt_cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%2C%22usr_bkt_eva%22%3A%5B%2260%22%5D%2C%22usr_bkt_ses%22%3A%5B%2264%22%5D%2C%22usr_bkt_pv%22%3A%5B%2212%22%5D%2C%22usr_pvc_bs%22%3A%5B%221%22%5D%2C%22usr_pvc_24hr%22%3A%5B%221%22%5D%2C%22usr_pvc_30d%22%3A%5B%221%22%5D%2C%22usr_svc_30d%22%3A%5B%221%22%5D%2C%22usr_auth%22%3A%5B%22false%22%5D%2C%22vnd_prx_segments%22%3A%5B%22131100%22%2C%22131118%22%2C%22121100%22%2C%22300003%22%2C%22210001%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22240018%22%2C%22240019%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22euwba9%22%2C%22ap05we%22%2C%2265f9pd%22%2C%22awpwvf%22%5D%2C%22usr_segments%22%3A%5B%22co.w2021%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_sg%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22domain%22%2C%22ddos%22%2C%22nxnsattack%22%2C%22cloudflare%22%2C%22google%22%2C%22dyn%22%2C%22dan_kaminsky%22%2C%22lior_shafir%22%2C%22tel_aviv_university%22%2C%22botnet%22%2C%22mirai%22%2C%22amazon%22%2C%22hacker%22%2C%22reddit%22%2C%22spotify%22%2C%22herzliya%22%2C%22head%22%2C%22phone%22%2C%22microsoft%22%2C%22anat_bremler-barr%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22domain%22%2C%22ddos%22%2C%22nxnsattack%22%2C%22cloudflare%22%2C%22google%22%2C%22dyn%22%2C%22dan_kaminsky%22%2C%22lior_shafir%22%2C%22tel_aviv_university%22%2C%22botnet%22%2C%22mirai%22%2C%22amazon%22%2C%22hacker%22%2C%22reddit%22%2C%22spotify%22%2C%22herzliya%22%2C%22head%22%2C%22phone%22%2C%22microsoft%22%2C%22anat_bremler-barr%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22server%22%2C%22dns%22%2C%22domain%22%2C%22ddos%22%2C%22researcher%22%2C%22amplification%22%2C%22nxnsattack%22%2C%22cloudflare%22%2C%22google%22%2C%22subdomain%22%2C%22request%22%2C%22dyn%22%2C%22dan_kaminsky%22%2C%22lior_shafir%22%2C%22internet%22%2C%22address%22%2C%22provider%22%2C%22tel_aviv_university%22%2C%22botnet%22%2C%22mirai%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_xid%22%3A%5B%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%5D%2C%22vnd_4d_sid%22%3A%5B%22029620a5-5c1e-4209-9229-5cfa3d766f3f%22%5D%2C%22vnd_4d_pid%22%3A%5B%224ace29e1-f455-4b7d-8b0c-b6f9ba75f604%22%5D%2C%22ctx_advertisers%22%3A%5B%22347421895%22%5D%2C%22ctx_line_items%22%3A%5B%225372985539%22%2C%225371845003%22%2C%225372985575%22%2C%225372986298%22%5D%2C%22ctx_creatives%22%3A%5B%22138311697852%22%2C%22138311697870%22%2C%22138312068593%22%2C%22138312068590%22%5D%7D&environment=prod&origin=wired&cKh=server%2Cdns%2Cdomain%2Cddos%2Cresearcher%2Camplification%2Cnxnsattack%2Ccloudflare%2Cgoogle%2Csubdomain%2Crequest%2Cdyn%2Cdan%20kaminsky%2Clior%20shafir%2Cinternet%2Caddress%2Cprovider%2Ctel%20aviv%20university
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:29 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
publishertag.prebid.js
static.criteo.net/js/ld/
67 KB
21 KB
Script
General
Full URL
https://static.criteo.net/js/ld/publishertag.prebid.js
Requested by
Host: www.wired.com
URL: https://www.wired.com/hotzones/esi/wired/prebid.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:2638::3 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
nginx /
Resource Hash
fcc4bd2980862773a80339fe80f550c6f2a6f8cc0205bf01f287a00155f0aae2

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:29 GMT
content-encoding
gzip
last-modified
Thu, 23 Apr 2020 08:37:42 GMT
server
nginx
etag
W/"5ea153d6-10c8e"
status
200
content-type
text/javascript
access-control-allow-origin
*
cache-control
max-age=86400, public
timing-allow-origin
*
expires
Fri, 22 May 2020 15:44:29 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame A898
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsssTasd1UD0Uq2LOG9gwa9wgdYpAUSwk2IWwRDsxTTwsrurBRLGBv1VZdHcSIcwW2KrVWaJ6s3rjyHriTcBwSGPt35j9-Ii7kpU7vtpXDQaeiLYox4JLYYbqmDNPdhT4SglsLT19D35bk8DPHYh-O7Q4ZYpe-qxWo17B5G0UeRWMp0n6NEGnglXAMeXdBA-TGOgF9075G-jifLd3Dhjg5tWcYeNU2rz3UQkDfgXnC3uAhtf6v7wXuLbYpR5H85MzSptNy6_zgp8nj5reTmE5S4Wzv_kj3k&sai=AMfl-YSJcBtNbZGQBSpEItjT7O1kkTzhFUXQcvR9qRU0UHCp9nfrrZRImKsObtXUEG8T8rlQNkqJsxQqw8Jz_GD68yYy9wFB6r6Z-ftnZW2S6Rq5m-VHo3AdCQGEVFzucozlGNqwrw46-8woqO_nccGD&sig=Cg0ArKJSzGoiUPlXJ1yJEAE&adurl=
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 21 May 2020 15:44:29 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Thu, 21 May 2020 15:44:29 GMT
window_focus_fy2019.js
tpc.googlesyndication.com/pagead/js/r20200519/r20110914/client/ Frame A898
2 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20200519/r20110914/client/window_focus_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
b4c97f26141f17253a09becbe3ff5c25f292c220e5b155b8e4b69513fa71cb2d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:28:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
968
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1235
x-xss-protection
0
server
cafe
etag
1097331598879969194
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Thu, 04 Jun 2020 15:28:21 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame A898
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
124220f530266be8497184bf5b9adc70961a8021bfae7e70136fe862a35d17d2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1589974910160429"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28390
x-xss-protection
0
expires
Thu, 21 May 2020 15:44:29 GMT
l
www.google.com/ads/measurement/ Frame A898
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaTazRj1ATqK9abV79_5AN5pXyiUp8EuCnBL6XDa93ooS-TXpE3WawW7jUdl44nXiRokT5JhugDvCt3kIWjnRbgMhc5N2A
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

moatad.js
z.moatads.com/condenastdfp9588492144/ Frame A898
305 KB
102 KB
Script
General
Full URL
https://z.moatads.com/condenastdfp9588492144/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
72.247.226.64 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-226-64.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
40a0e60058bfe0d62f6b64fefeebd925dbe21f6303a3ef7b0cbedbea56c09cd4

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:29 GMT
content-encoding
gzip
last-modified
Tue, 19 May 2020 21:13:33 GMT
server
AmazonS3
x-amz-request-id
976ACD4C5F59816A
etag
"5ff70349a3a7ef41c4f3db961796bf8a"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=29673
accept-ranges
bytes
content-length
104164
x-amz-id-2
acIzv+rVt5dw4kLWIzr8MFS2Lkmdhh3YLn4I6SXLPYZvOMtbQSXjYkuMe3i/FRZADWb9YlKzGZw=
9778312539477072520
tpc.googlesyndication.com/simgad/ Frame A898
75 KB
75 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/9778312539477072520
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
9c5dd7cffcdb66e4f582adf9fde3e24925afff69235463d60d2152c12ab06aad
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 19 May 2020 23:45:03 GMT
x-content-type-options
nosniff
age
143966
x-dns-prefetch-control
off
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
76759
x-xss-protection
0
last-modified
Thu, 07 May 2020 13:57:50 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 19 May 2021 23:45:03 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A29.885Z&_t=slot_rendered&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035&cEnt=domain%2C%20ddos%2C%20nxnsattack%2C%20cloudflare%2C%20google%2C%20dyn%2C%20dan%20kaminsky%2C%20lior%20shafir%2C%20tel%20aviv%20university%2C%20botnet%2C%20mirai%2C%20amazon%2C%20hacker%2C%20reddit%2C%20spotify%2C%20herzliya%2C%20head%2C%20phone%2C%20microsoft%2C%20anat%20bremler-barr&cEnw=0.8771759765780737%2C%200.8338062589064815%2C%200.7648210431735492%2C%200.7514458020584966%2C%200.7317869554836482%2C%200.6880327132394504%2C%200.6459096081084209%2C%200.6452865510103766%2C%200.621896185053759%2C%200.5989079930460709%2C%200.5942368447904924%2C%200.5410839432213714%2C%200.5033271113253491%2C%200.46697963005128895%2C%200.4657578192440538%2C%200.4278893088937706%2C%200.4267021729964771%2C%200.41944985438039595%2C%200.4069384737931213%2C%200.374782232092937&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&cPd=2020-05-19T10%3A00%3A00.000Z&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=7400&pSw=1600&pSh=1200&uID=3e451649-3bfa-4913-ae30-cbfdfcad151f&sID=42229899-76d0-4b27-8d6e-0a164ce0d0ab&pID=cf3c874e-d299-41c3-af8e-2a69712b1f32&uDt=desktop&_o=wired&_c=cns_ads&xID=74c407ba-cc71-4c85-94c2-5a307e44f09c&dim1=%7B%22channel%22%3A%22security%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22subChannel%22%3A%22cyberattacks-and-hacks%22%2C%22template%22%3A%22mt_article_two_column%22%2C%22version%22%3A%226.32.25%22%7D&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.wired%2Fhero%2Fsecurity%2Farticle%2F1%22%2C%22advertiserId%22%3A4552798968%2C%22campaignId%22%3A2691565179%2C%22creativeId%22%3A138310817832%2C%22elementId%22%3A%22hero_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Atrue%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22platform%22%3A%5B%22verso%22%5D%2C%22tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%7D%2C%22lineItemId%22%3A5365161014%2C%22name%22%3A%22hero_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22728x90%22%2C%22slug%22%3A%22dns-ddos-amplification-attack%22%7D&dim3=%7B%22footerStart%22%3A1590075866631%2C%22headerStart%22%3A1590075866350%2C%22navigationStart%22%3A1590075865794%2C%22injected%22%3A1590075869885%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22hero%22%5D%2C%22ctx_slot_type%22%3A%5B%22hero%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22hero_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22mt_article_two_column%22%5D%2C%22ctx_page_channel%22%3A%5B%22security%22%5D%2C%22ctx_page_sub_channel%22%3A%5B%22cyberattacks-and-hacks%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.32.25%22%5D%2C%22ctx_page_slug%22%3A%5B%22dns-ddos-amplification-attack%22%5D%2C%22cnt_copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22cnt_platform%22%3A%5B%22verso%22%5D%2C%22cnt_tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cnt_cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%2C%22usr_bkt_eva%22%3A%5B%2260%22%5D%2C%22usr_bkt_ses%22%3A%5B%2264%22%5D%2C%22usr_bkt_pv%22%3A%5B%2212%22%5D%2C%22usr_pvc_bs%22%3A%5B%221%22%5D%2C%22usr_pvc_24hr%22%3A%5B%221%22%5D%2C%22usr_pvc_30d%22%3A%5B%221%22%5D%2C%22usr_svc_30d%22%3A%5B%221%22%5D%2C%22usr_auth%22%3A%5B%22false%22%5D%2C%22vnd_prx_segments%22%3A%5B%22131100%22%2C%22131118%22%2C%22121100%22%2C%22300003%22%2C%22210001%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22240018%22%2C%22240019%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22euwba9%22%2C%22ap05we%22%2C%2265f9pd%22%2C%22awpwvf%22%5D%2C%22usr_segments%22%3A%5B%22co.w2021%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_sg%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22domain%22%2C%22ddos%22%2C%22nxnsattack%22%2C%22cloudflare%22%2C%22google%22%2C%22dyn%22%2C%22dan_kaminsky%22%2C%22lior_shafir%22%2C%22tel_aviv_university%22%2C%22botnet%22%2C%22mirai%22%2C%22amazon%22%2C%22hacker%22%2C%22reddit%22%2C%22spotify%22%2C%22herzliya%22%2C%22head%22%2C%22phone%22%2C%22microsoft%22%2C%22anat_bremler-barr%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22domain%22%2C%22ddos%22%2C%22nxnsattack%22%2C%22cloudflare%22%2C%22google%22%2C%22dyn%22%2C%22dan_kaminsky%22%2C%22lior_shafir%22%2C%22tel_aviv_university%22%2C%22botnet%22%2C%22mirai%22%2C%22amazon%22%2C%22hacker%22%2C%22reddit%22%2C%22spotify%22%2C%22herzliya%22%2C%22head%22%2C%22phone%22%2C%22microsoft%22%2C%22anat_bremler-barr%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22server%22%2C%22dns%22%2C%22domain%22%2C%22ddos%22%2C%22researcher%22%2C%22amplification%22%2C%22nxnsattack%22%2C%22cloudflare%22%2C%22google%22%2C%22subdomain%22%2C%22request%22%2C%22dyn%22%2C%22dan_kaminsky%22%2C%22lior_shafir%22%2C%22internet%22%2C%22address%22%2C%22provider%22%2C%22tel_aviv_university%22%2C%22botnet%22%2C%22mirai%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_xid%22%3A%5B%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%5D%2C%22vnd_4d_sid%22%3A%5B%22029620a5-5c1e-4209-9229-5cfa3d766f3f%22%5D%2C%22vnd_4d_pid%22%3A%5B%224ace29e1-f455-4b7d-8b0c-b6f9ba75f604%22%5D%2C%22ctx_advertisers%22%3A%5B%22347421895%22%5D%2C%22ctx_line_items%22%3A%5B%225372985539%22%2C%225371845003%22%2C%225372985575%22%2C%225372986298%22%5D%2C%22ctx_creatives%22%3A%5B%22138311697852%22%2C%22138311697870%22%2C%22138312068593%22%2C%22138312068590%22%5D%7D&environment=prod&origin=wired&cKh=server%2Cdns%2Cdomain%2Cddos%2Cresearcher%2Camplification%2Cnxnsattack%2Ccloudflare%2Cgoogle%2Csubdomain%2Crequest%2Cdyn%2Cdan%20kaminsky%2Clior%20shafir%2Cinternet%2Caddress%2Cprovider%2Ctel%20aviv%20university
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:30 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
e2c4b00f-d4c2-46ce-8485-a88f6bf41954thumbs.mp4
dp8hsntg6do36.cloudfront.net/590a4a94fd2e610c45000008/ Frame 61B2
128 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/590a4a94fd2e610c45000008/e2c4b00f-d4c2-46ce-8485-a88f6bf41954thumbs.mp4
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.149.174 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-149-174.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-

Response headers

Date
Thu, 21 May 2020 03:48:12 GMT
Via
1.1 c0486ca54d4ad5a3da496bc2b5f49cd2.cloudfront.net (CloudFront)
Last-Modified
Wed, 03 May 2017 21:28:42 GMT
Server
AmazonS3
Age
42979
ETag
"1f593ad61df5d036768cc949fdcb2a09"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 0-204343/204344
Connection
keep-alive
X-Amz-Cf-Pop
FRA53
Accept-Ranges
bytes
Content-Length
204344
X-Amz-Cf-Id
j_tgOFcvnxnkye5YEGVGjfJqayWCR2AD3OuHuh7EB8Sypd4fBFnQIw==
e2c4b00f-d4c2-46ce-8485-a88f6bf41954thumbs.mp4
dp8hsntg6do36.cloudfront.net/590a4a94fd2e610c45000008/ Frame 61B2
64 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/590a4a94fd2e610c45000008/e2c4b00f-d4c2-46ce-8485-a88f6bf41954thumbs.mp4
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.149.174 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-149-174.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-

Response headers

Date
Thu, 21 May 2020 03:48:12 GMT
Via
1.1 ae3e6ab763f755c867a3b493d306312c.cloudfront.net (CloudFront)
Last-Modified
Wed, 03 May 2017 21:28:42 GMT
Server
AmazonS3
Age
42979
ETag
"1f593ad61df5d036768cc949fdcb2a09"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 0-204343/204344
Connection
keep-alive
X-Amz-Cf-Pop
FRA53
Accept-Ranges
bytes
Content-Length
204344
X-Amz-Cf-Id
eOZJumIsJCRmldNfVESpT-b9l17fppyK2dhxY4mgZoE8QJfLkC9vuQ==
track
capture.condenastdigital.com/ Frame 61B2
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2020-05-21T15%3A44%3A29.959Z&_c=Player%20Event&_t=Player%20Loaded&app=playerservice&cBr=wired&cCh=videos%2Fshow&cCu=https%3A%2F%2Fwww.wired.com%2Fvideo%2Fwatch%2Fwhat-is-a-ddos-hack-and-how-do-you-avoid-them&cId=590a4a94fd2e610c45000008&cKe=how%20to&cPd=2017-05-05T10%3A00%3A00%2B00%3A00&cTi=What%20is%20a%20DDoS%20Hack%20and%20How%20Do%20You%20Avoid%20Them%3F&mDu=91&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pID=4ace29e1-f455-4b7d-8b0c-b6f9ba75f604&pWw=717&pWh=403.3125&sID=029620a5-5c1e-4209-9229-5cfa3d766f3f&uId=2a36347c-3e6d-48d2-be9f-8311e276647d&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22gitBranch%22%3A%22master%22%2C%22gitSha%22%3A%22af51319%22%2C%22guid%22%3A%22f2e73bab-161c-8cd3-6876-2b27e6f0cf2b%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Atrue%2C%22initialPlayerStartType%22%3A%22autoplay%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A5885.125%2C%22playerType%22%3A%22video-continuous%22%2C%22playsOnPage%22%3A0%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22isRightRail%22%3Afalse%2C%22tabStatus%22%3A%22active%22%2C%22versoPageType%22%3A%22article%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3Anull%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%2C%22podIndex%22%3A%22%22%7D&adId=&org_id=2d59f602-617b-401b-b6c3-3e7c535e02f4&org_app_id=a61a3c7a-01d9-4175-8ab8-7171949de605&pageType=article
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:30 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
e675d06d-9751-4d37-b1ca-f9827c460a6f
https://www.wired.com/ Frame 61B2
5 KB
0
Other
General
Full URL
blob:https://www.wired.com/e675d06d-9751-4d37-b1ca-f9827c460a6f
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-49be74de237db7d6199d.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d5f3418a3fa657175d5341b5e032be036cb4d5818de5d1497f2175be5a7e3701

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
5463
Content-Type
application/javascript
e2c4b00f-d4c2-46ce-8485-a88f6bf41954manifest-ios.m3u8
dp8hsntg6do36.cloudfront.net/590a4a94fd2e610c45000008/ Frame 61B2
918 B
1 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/590a4a94fd2e610c45000008/e2c4b00f-d4c2-46ce-8485-a88f6bf41954manifest-ios.m3u8?videoIndex=0&requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-49be74de237db7d6199d.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.149.174 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-149-174.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
638b5aca866fe49aad729b03d03df0b1b36c92f92b845384dd7ca9791747e022

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 11:25:54 GMT
Via
1.1 b7f7970e9c911e165d4cb9f70deac42a.cloudfront.net (CloudFront)
Vary
Origin
Age
15517
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
918
Last-Modified
Wed, 03 May 2017 21:28:16 GMT
Server
AmazonS3
ETag
"7f5c01115535ad5c7aaca907e3ac7c57"
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
X-Amz-Cf-Pop
FRA53
Accept-Ranges
bytes
X-Amz-Cf-Id
x4hlWf2COaGM-2ICJsQbe3Z0gkFlpBl-BCvzTW83MK4QD3GwRAm6Nw==
collect
www.google-analytics.com/
35 B
125 B
Other
General
Full URL
https://www.google-analytics.com/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:30 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
image/gif
access-control-allow-origin
https://www.wired.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
www.google-analytics.com/
35 B
106 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j82&a=68812284&t=pageview&_s=1&dl=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&dr=%2F&dp=%2Fstory%2Fdns-ddos-amplification-attack%2F&ul=en-us&de=UTF-8&dt=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique%20%7C%20WIRED&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=aChAgUAjAAQC~&jid=497812181&gjid=174545141&cid=425008880.1590075868&tid=UA-8293713-27&_gid=1040492620.1590075869&gtm=2wg5e15HBJC2K&cg1=article&cg3=security&cg4=cyberattacks%20and%20hacks&cd1=GTM-5HBJC2K&cd2=402&cd4=&cd5=&cd6=Thu%20May%2021%202020%2017%3A44%3A28%20GMT%2B0200%20(Central%20European%20Summer%20Time)&cd7=1590075868195.0d6oa848&cd8=-2&cd9=Mozilla%2F5.0%20(Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5)%20AppleWebKit%2F537.36%20(KHTML%2C%20like%20Gecko)%20Chrome%2F74.0.3729.169%20Safari%2F537.36&cd10=English&cd11=desktop&cd12=0&cd13=Tag%20Name%3A%20GA%20-%20Pageview%20-%20Core%20Pageview%20-%20All%20Pages&cd18=&cd19=&cd20=not%20active&cd21=74c407ba-cc71-4c85-94c2-5a307e44f09c&cd24=1&cd25=Andy%20Greenberg&cd26=5ec1e85cd58e99fafced8096&cd27=2&cd28=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cd29=web&cd30=1&cd31=1&cd32=2020-05-19T10%3A00%3A00.000Z&cd34=2020-05-19T21%3A41%3A22.015Z&cd35=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cd36=web&cd38=all&cd39=paywalled&cd43=Wired&cd45=Adblock%20Enabled%20-%20false&cd63=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&cd64=clip_top&cd65=&cd72=multi-tenant&cd74=sample&cd92=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&cd93=security&cd94=cyberattacks%20and%20hacks&cd98=article&cd103=&cd111=1568&cd113=data-layer-loaded&cd114=false&cd115=&cd116=60&cd121=&cd123=mt_article_two_column&cm21=1&cd3=425008880.1590075868&z=1795496802
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 18 May 2020 21:06:23 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
239887
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j82&tid=UA-8293713-27&cid=425008880.1590075868&jid=497812181&gjid=174545141&_gid=1040492620.1590075869&_u=aChAgUAjAAQC~&z=1384597386
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-8293713-27&cid=425008880.1590075868&jid=497812181&_v=j82&z=1384597386
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-8293713-27&cid=425008880.1590075868&jid=497812181&_v=j82&z=1384597386&slf_rd=1&random=430050017
42 B
106 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-8293713-27&cid=425008880.1590075868&jid=497812181&_v=j82&z=1384597386&slf_rd=1&random=430050017
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:30 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:30 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-8293713-27&cid=425008880.1590075868&jid=497812181&_v=j82&z=1384597386&slf_rd=1&random=430050017
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j82&a=68812284&t=event&ni=1&_s=1&dl=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&dr=%2F&dp=%2Fstory%2Fdns-ddos-amplificat...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-8293713-27&cid=425008880.1590075868&jid=1696105618&_gid=1889547380.1590075870&gjid=1670174960&_v=j82&z=2005332925
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-8293713-27&cid=425008880.1590075868&jid=1696105618&_v=j82&z=2005332925
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-8293713-27&cid=425008880.1590075868&jid=1696105618&_v=j82&z=2005332925&slf_rd=1&random=3425403500
42 B
106 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-8293713-27&cid=425008880.1590075868&jid=1696105618&_v=j82&z=2005332925&slf_rd=1&random=3425403500
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:30 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:30 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-8293713-27&cid=425008880.1590075868&jid=1696105618&_v=j82&z=2005332925&slf_rd=1&random=3425403500
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
www.google-analytics.com/
35 B
100 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j82&a=68812284&t=event&ni=1&_s=1&dl=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&dr=%2F&dp=%2Fstory%2Fdns-ddos-amplification-attack%2F&ul=en-us&de=UTF-8&dt=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique%20%7C%20WIRED&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&ec=growler%2Fbarrier%20tracking&ea=article%20count%3A%201&el=paywall-bar-impression&_u=aCjACUAjBAQC~&jid=&gjid=&cid=425008880.1590075868&tid=UA-8293713-27&_gid=1889547380.1590075870&gtm=2wg5e15HBJC2K&cg1=article&cg3=security&cg4=cyberattacks%20and%20hacks&cd1=GTM-5HBJC2K&cd2=402&cd4=&cd5=&cd6=Thu%20May%2021%202020%2017%3A44%3A28%20GMT%2B0200%20(Central%20European%20Summer%20Time)&cd7=1590075868534.bu24eggp&cd8=-2&cd9=Mozilla%2F5.0%20(Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5)%20AppleWebKit%2F537.36%20(KHTML%2C%20like%20Gecko)%20Chrome%2F74.0.3729.169%20Safari%2F537.36&cd10=English&cd11=desktop&cd12=0&cd13=GA%20-%20Event%20-%20Growler%20and%20Barrier%20Tracking&cd18=&cd19=&cd20=not%20active&cd21=74c407ba-cc71-4c85-94c2-5a307e44f09c&cd24=1&cd25=Andy%20Greenberg&cd26=5ec1e85cd58e99fafced8096&cd27=2&cd28=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cd29=web&cd30=1&cd31=1&cd32=2020-05-19T10%3A00%3A00.000Z&cd34=2020-05-19T21%3A41%3A22.015Z&cd35=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cd36=web&cd38=all&cd39=paywalled&cd43=Wired&cd45=Adblock%20Enabled%20-%20false&cd63=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&cd64=clip_top&cd65=&cd72=multi-tenant&cd74=sample&cd92=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&cd93=security&cd94=cyberattacks%20and%20hacks&cd98=article&cd103=&cd111=1568&cd113=paywall-bar-impression&cd114=false&cd115=&cd116=60&cd121=&cd123=mt_article_two_column&cd3=425008880.1590075868&z=1013958271
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 18 May 2020 21:06:23 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
239887
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
collect
www.google-analytics.com/
35 B
100 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j82&a=68812284&t=event&ni=1&_s=1&dl=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&dr=%2F&dp=%2Fstory%2Fdns-ddos-amplification-attack%2F&ul=en-us&de=UTF-8&dt=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique%20%7C%20WIRED&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&ec=recirc&ea=recirc-most_popular-impression&_u=aCjACUAjBAQC~&jid=&gjid=&cid=425008880.1590075868&tid=UA-8293713-27&_gid=1889547380.1590075870&gtm=2wg5e15HBJC2K&cg1=article&cg3=security&cg4=cyberattacks%20and%20hacks&cd1=GTM-5HBJC2K&cd2=402&cd4=&cd5=&cd6=Thu%20May%2021%202020%2017%3A44%3A29%20GMT%2B0200%20(Central%20European%20Summer%20Time)&cd7=1590075869020.uzy5qyc5&cd8=-2&cd9=Mozilla%2F5.0%20(Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5)%20AppleWebKit%2F537.36%20(KHTML%2C%20like%20Gecko)%20Chrome%2F74.0.3729.169%20Safari%2F537.36&cd10=English&cd11=desktop&cd12=0&cd13=GA%20-%20Event%20-%20Recirc%20Events&cd18=&cd19=&cd20=not%20active&cd24=1&cd25=Andy%20Greenberg&cd26=5ec1e85cd58e99fafced8096&cd27=2&cd28=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cd29=web&cd30=1&cd31=1&cd32=2020-05-19T10%3A00%3A00.000Z&cd34=2020-05-19T21%3A41%3A22.015Z&cd35=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cd36=web&cd38=all&cd39=paywalled&cd43=Wired&cd45=Adblock%20Enabled%20-%20false&cd63=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&cd64=clip_top&cd65=&cd72=multi-tenant&cd74=sample&cd92=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&cd93=security&cd94=cyberattacks%20and%20hacks&cd98=article&cd103=&cd111=1568&cd113=recirc-most_popular-impression&cd114=false&cd116=60&cd121=&cd123=mt_article_two_column&cd3=425008880.1590075868&z=325959869
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 18 May 2020 21:06:23 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
239887
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 6438
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsufTo-FnQ9opysi6UBBtWnvBxhmd_17DRNT0o-SQfEocVVyk5MzwSmtsAqmsC_STTHoMQhwOStNNOuNjLuzPOBjZjGnPjAisQnJTG_EM6r6YT08fujMDezff8wO8NvR_JiUiE79oOuky5kQZe1A7Brw77CFJxNxPMjvhVNYKo3zCYHwgZyboUG4HnyU-x5rZpmu8awE2bpjBWZvWLekfzxElk5F7YtuIuB7EvCeVAaEM36nuOmvqyxSEj-P4SA0ybeqqEooDvmIkuHY3mf0WPs_1MdwU8pNKAY&sai=AMfl-YTc5s6Q0F8ufGrbxPy78mMgP2oZDKozBJI_wSt_xII8P4gXjVgGj7qJZJ1zQcr6veUCNJtT1rkyz4LyHn5ybLJNrl-MbdYrg-lw-y9N_DpILZ_5QGpZm355AcXHCGIOAAVSW1UMYwPw92GLvbPf&sig=Cg0ArKJSzFymKlsmvYi2EAE&urlfix=1&adurl=
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 21 May 2020 15:44:30 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Thu, 21 May 2020 15:44:30 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 6438
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
124220f530266be8497184bf5b9adc70961a8021bfae7e70136fe862a35d17d2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1589974910160429"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
28390
x-xss-protection
0
expires
Thu, 21 May 2020 15:44:30 GMT
moatad.js
z.moatads.com/condenastdfp9588492144/ Frame 6438
305 KB
102 KB
Script
General
Full URL
https://z.moatads.com/condenastdfp9588492144/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
72.247.226.64 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-226-64.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
40a0e60058bfe0d62f6b64fefeebd925dbe21f6303a3ef7b0cbedbea56c09cd4

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:30 GMT
content-encoding
gzip
last-modified
Tue, 19 May 2020 21:13:33 GMT
server
AmazonS3
x-amz-request-id
976ACD4C5F59816A
etag
"5ff70349a3a7ef41c4f3db961796bf8a"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=29672
accept-ranges
bytes
content-length
104164
x-amz-id-2
acIzv+rVt5dw4kLWIzr8MFS2Lkmdhh3YLn4I6SXLPYZvOMtbQSXjYkuMe3i/FRZADWb9YlKzGZw=
17759550978833961287
tpc.googlesyndication.com/simgad/ Frame 6438
31 KB
31 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/17759550978833961287?
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5e73548c352971d890ba2741893f05b90b512ad6174dec6272afb6e07b6949b5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 18 May 2020 19:21:10 GMT
x-content-type-options
nosniff
age
246200
x-dns-prefetch-control
off
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
31662
x-xss-protection
0
last-modified
Thu, 18 Apr 2019 20:27:24 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 18 May 2021 19:21:10 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A30.105Z&_t=slot_rendered&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035&cEnt=domain%2C%20ddos%2C%20nxnsattack%2C%20cloudflare%2C%20google%2C%20dyn%2C%20dan%20kaminsky%2C%20lior%20shafir%2C%20tel%20aviv%20university%2C%20botnet%2C%20mirai%2C%20amazon%2C%20hacker%2C%20reddit%2C%20spotify%2C%20herzliya%2C%20head%2C%20phone%2C%20microsoft%2C%20anat%20bremler-barr&cEnw=0.8771759765780737%2C%200.8338062589064815%2C%200.7648210431735492%2C%200.7514458020584966%2C%200.7317869554836482%2C%200.6880327132394504%2C%200.6459096081084209%2C%200.6452865510103766%2C%200.621896185053759%2C%200.5989079930460709%2C%200.5942368447904924%2C%200.5410839432213714%2C%200.5033271113253491%2C%200.46697963005128895%2C%200.4657578192440538%2C%200.4278893088937706%2C%200.4267021729964771%2C%200.41944985438039595%2C%200.4069384737931213%2C%200.374782232092937&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&cPd=2020-05-19T10%3A00%3A00.000Z&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=7400&pSw=1600&pSh=1200&uID=3e451649-3bfa-4913-ae30-cbfdfcad151f&sID=42229899-76d0-4b27-8d6e-0a164ce0d0ab&pID=cf3c874e-d299-41c3-af8e-2a69712b1f32&uDt=desktop&_o=wired&_c=cns_ads&xID=74c407ba-cc71-4c85-94c2-5a307e44f09c&dim1=%7B%22channel%22%3A%22security%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22subChannel%22%3A%22cyberattacks-and-hacks%22%2C%22template%22%3A%22mt_article_two_column%22%2C%22version%22%3A%226.32.25%22%7D&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.wired%2Frail%2Fsecurity%2Farticle%2F1%22%2C%22advertiserId%22%3A4552798968%2C%22campaignId%22%3A2530329078%2C%22creativeId%22%3A138267908832%2C%22elementId%22%3A%22rail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22platform%22%3A%5B%22verso%22%5D%2C%22tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%7D%2C%22lineItemId%22%3A5040599734%2C%22name%22%3A%22rail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x250%2C300x600%22%2C%22slug%22%3A%22dns-ddos-amplification-attack%22%7D&dim3=%7B%22footerStart%22%3A1590075866631%2C%22headerStart%22%3A1590075866350%2C%22navigationStart%22%3A1590075865794%2C%22injected%22%3A1590075870105%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22rail%22%5D%2C%22ctx_slot_type%22%3A%5B%22rail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22hb_format%22%3A%5B%22banner%22%5D%2C%22hb_source%22%3A%5B%22client%22%5D%2C%22hb_size%22%3A%5B%22300x250%22%5D%2C%22hb_pb%22%3A%5B%220.06%22%5D%2C%22hb_adid%22%3A%5B%2247ea40d10d68bd9%22%5D%2C%22hb_bidder%22%3A%5B%22rubicon%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22rail_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22mt_article_two_column%22%5D%2C%22ctx_page_channel%22%3A%5B%22security%22%5D%2C%22ctx_page_sub_channel%22%3A%5B%22cyberattacks-and-hacks%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.32.25%22%5D%2C%22ctx_page_slug%22%3A%5B%22dns-ddos-amplification-attack%22%5D%2C%22cnt_copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22cnt_platform%22%3A%5B%22verso%22%5D%2C%22cnt_tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cnt_cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%2C%22usr_bkt_eva%22%3A%5B%2260%22%5D%2C%22usr_bkt_ses%22%3A%5B%2264%22%5D%2C%22usr_bkt_pv%22%3A%5B%2212%22%5D%2C%22usr_pvc_bs%22%3A%5B%221%22%5D%2C%22usr_pvc_24hr%22%3A%5B%221%22%5D%2C%22usr_pvc_30d%22%3A%5B%221%22%5D%2C%22usr_svc_30d%22%3A%5B%221%22%5D%2C%22usr_auth%22%3A%5B%22false%22%5D%2C%22vnd_prx_segments%22%3A%5B%22131100%22%2C%22131118%22%2C%22121100%22%2C%22300003%22%2C%22210001%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22240018%22%2C%22240019%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22euwba9%22%2C%22ap05we%22%2C%2265f9pd%22%2C%22awpwvf%22%5D%2C%22usr_segments%22%3A%5B%22co.w2021%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_sg%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22domain%22%2C%22ddos%22%2C%22nxnsattack%22%2C%22cloudflare%22%2C%22google%22%2C%22dyn%22%2C%22dan_kaminsky%22%2C%22lior_shafir%22%2C%22tel_aviv_university%22%2C%22botnet%22%2C%22mirai%22%2C%22amazon%22%2C%22hacker%22%2C%22reddit%22%2C%22spotify%22%2C%22herzliya%22%2C%22head%22%2C%22phone%22%2C%22microsoft%22%2C%22anat_bremler-barr%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22domain%22%2C%22ddos%22%2C%22nxnsattack%22%2C%22cloudflare%22%2C%22google%22%2C%22dyn%22%2C%22dan_kaminsky%22%2C%22lior_shafir%22%2C%22tel_aviv_university%22%2C%22botnet%22%2C%22mirai%22%2C%22amazon%22%2C%22hacker%22%2C%22reddit%22%2C%22spotify%22%2C%22herzliya%22%2C%22head%22%2C%22phone%22%2C%22microsoft%22%2C%22anat_bremler-barr%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22server%22%2C%22dns%22%2C%22domain%22%2C%22ddos%22%2C%22researcher%22%2C%22amplification%22%2C%22nxnsattack%22%2C%22cloudflare%22%2C%22google%22%2C%22subdomain%22%2C%22request%22%2C%22dyn%22%2C%22dan_kaminsky%22%2C%22lior_shafir%22%2C%22internet%22%2C%22address%22%2C%22provider%22%2C%22tel_aviv_university%22%2C%22botnet%22%2C%22mirai%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_xid%22%3A%5B%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%5D%2C%22vnd_4d_sid%22%3A%5B%22029620a5-5c1e-4209-9229-5cfa3d766f3f%22%5D%2C%22vnd_4d_pid%22%3A%5B%224ace29e1-f455-4b7d-8b0c-b6f9ba75f604%22%5D%2C%22ctx_advertisers%22%3A%5B%22347421895%22%5D%2C%22ctx_line_items%22%3A%5B%225372985539%22%2C%225371845003%22%2C%225372985575%22%2C%225372986298%22%5D%2C%22ctx_creatives%22%3A%5B%22138311697852%22%2C%22138311697870%22%2C%22138312068593%22%2C%22138312068590%22%5D%7D&environment=prod&origin=wired&cKh=server%2Cdns%2Cdomain%2Cddos%2Cresearcher%2Camplification%2Cnxnsattack%2Ccloudflare%2Cgoogle%2Csubdomain%2Crequest%2Cdyn%2Cdan%20kaminsky%2Clior%20shafir%2Cinternet%2Caddress%2Cprovider%2Ctel%20aviv%20university
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:30 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
iabData.json
cdn.cookielaw.org/vendorlist/
94 KB
17 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/vendorlist/iabData.json
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.15.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:1cb7:261b:1f9c:2074:3c , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (frc/8FFC) /
Resource Hash
4dcb36bae5172d588d2fa60d658d4031c956e362569f3381f08b4ed18c6d026e

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Thu, 21 May 2020 15:44:30 GMT
content-encoding
gzip
content-md5
mGYjVpl+WOIXG9lDTd9cwQ==
age
507921
x-cache
HIT
status
200
content-length
17396
x-ms-lease-status
unlocked
last-modified
Sat, 09 May 2020 06:00:14 GMT
server
ECAcc (frc/8FFC)
etag
0x8D7F3DE3DCF9B4E
vary
Accept-Encoding
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
28b5e890-f01e-0043-10e8-2af20f000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=604800
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Thu, 21 May 2020 19:44:30 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame A898
0
54 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsun7yFHmLqKkvlXLx-kfA4hby5NnpyjtF3vqMIJ1a0IOdVcczWe3jKbjRUu7HO7rVHI6f8zRUgHAGSpVBnROKmBFDgFiqAyJOKL9tyV5rPYBbx8DnwrPAvjJ1NfvEzxgeIObUJEbj3AlpjXRj_9AaP4UuI0-HcI4UUmTGZr2NFHnNDYoGCEqd1eGmDHJGjNzT_oqK_D-ARlAvLSqgm_auIvGXKYSkQ9T0qFptRHUPdkqVsuOMwC0cl944IftjdxeIIj7kCGWgZ_U95-rw_suk6bueLkzQ3P9g&sai=AMfl-YSH2SVWbPAi7MwDDltQZfY3lF83zwioK3xeyBl6OQY7oscwVo56AUYdbSOYgPo4ptsbuKK7uErjeDY5y2uffGYI4iy5cie-c0r8Ukg0WC_8dRqqLS2MzO5LcP9SVKD4om6fGehZuaEA2MK6h01g&sig=Cg0ArKJSzIuv37E_6-moEAE&adurl=
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 21 May 2020 15:44:30 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
truncated
/ Frame A898
219 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4928053d3b4984fa397f7dd175c968cb11cc6079ea21707781fd54ccf515efab

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
wired_barrett-security-tk.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_wired.png,fl_progressive,g_face,h_450,q_80,w_800/v1493847109/ Frame 61B2
40 KB
41 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_wired.png,fl_progressive,g_face,h_450,q_80,w_800/v1493847109/wired_barrett-security-tk.jpg
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-49be74de237db7d6199d.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.157.216 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-157-216.fra53.r.cloudfront.net
Software
Cloudinary /
Resource Hash
6e56f067cb3ec81399d0925339a0ff254df9115a7e3ce5aed14f1ca1110ea624
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
Origin
https://www.wired.com

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 b74a7a3f7ddfd685212e870d027c332d.cloudfront.net (CloudFront)
ETag
"154c3b2f1716dde2e9219ac0238e94b0"
X-Amz-Cf-Pop
FRA53
X-Cache
Hit from cloudfront
Server-Timing
fastly;dur=1;cpu=0;start=2020-05-21T03:10:19.051Z;desc=hit,rtt;dur=1
Content-Length
40821
Last-Modified
Sun, 12 Nov 2017 00:10:21 GMT
Server
Cloudinary
Cache-Control
public, no-transform, max-age=300
Date
Thu, 21 May 2020 15:44:30 GMT
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,ETag,Server-Timing
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
Lvp4OozwzW4PiPhEqcxkRO8YU5z8qIqN8wco47y1JZ-8EE6FfViLAA==
wired_barrett-security-tk.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_wired.png,fl_progressive,g_face,h_450,q_80,w_800/v1493847109/ Frame 61B2
40 KB
41 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_wired.png,fl_progressive,g_face,h_450,q_80,w_800/v1493847109/wired_barrett-security-tk.jpg
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/condenastdfp9588492144/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.157.216 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-157-216.fra53.r.cloudfront.net
Software
Cloudinary /
Resource Hash
6e56f067cb3ec81399d0925339a0ff254df9115a7e3ce5aed14f1ca1110ea624
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 b7f7970e9c911e165d4cb9f70deac42a.cloudfront.net (CloudFront)
ETag
"154c3b2f1716dde2e9219ac0238e94b0"
X-Amz-Cf-Pop
FRA53
X-Cache
Hit from cloudfront
Server-Timing
fastly;dur=1;cpu=0;start=2020-05-21T03:10:19.051Z;desc=hit,rtt;dur=1
Content-Length
40821
Last-Modified
Sun, 12 Nov 2017 00:10:21 GMT
Server
Cloudinary
Cache-Control
public, no-transform, max-age=300
Date
Thu, 21 May 2020 15:44:30 GMT
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,ETag,Server-Timing
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
7_XWaCD4DFdrZ7K3lfGcycMphZ_gN1bYWoJrWc0fEJaFT7c1GjxI5A==
publishertag.prebid.js
static.criteo.net/js/ld/
67 KB
21 KB
XHR
General
Full URL
https://static.criteo.net/js/ld/publishertag.prebid.js
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.prebid.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:2638::3 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
nginx /
Resource Hash
fcc4bd2980862773a80339fe80f550c6f2a6f8cc0205bf01f287a00155f0aae2

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:30 GMT
content-encoding
gzip
last-modified
Thu, 23 Apr 2020 08:37:42 GMT
server
nginx
etag
W/"5ea153d6-10c8e"
status
200
content-type
text/javascript
access-control-allow-origin
*
cache-control
max-age=86400, public
timing-allow-origin
*
expires
Fri, 22 May 2020 15:44:30 GMT
1663130473914833
connect.facebook.net/signals/config/ Frame 61B2
517 KB
129 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/1663130473914833?v=2.9.18&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
7709aa6feeb125ef9ec245ffbcdeda3825f06f72399ba1dff65034bff2e36eb2
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-27=":443"; ma=3600
content-length
132327
x-xss-protection
0
pragma
public
x-fb-debug
1yOaHchK/fHabsoFRO6gEKVzcfJTzn4f3FXeA3jUFZ/Fq4pHAiikqPsJiSWiEf3KsgQkBY6miucnnMhRSXWmKA==
x-fb-trip-id
664085054
x-frame-options
DENY
date
Thu, 21 May 2020 15:44:30 GMT, Thu, 21 May 2020 15:44:30 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
e2c4b00f-d4c2-46ce-8485-a88f6bf41954file-1422k-128-48000-768.m3u8
dp8hsntg6do36.cloudfront.net/590a4a94fd2e610c45000008/ Frame 61B2
1 KB
841 B
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/590a4a94fd2e610c45000008/e2c4b00f-d4c2-46ce-8485-a88f6bf41954file-1422k-128-48000-768.m3u8?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-49be74de237db7d6199d.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.149.174 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-149-174.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
3c3f982896bb9ea1e2eb84bc78ca82828deb1abbea250e4f70e1fb6acc2e7a91

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 11:52:56 GMT
Content-Encoding
gzip
Vary
Accept-Encoding,Origin
Age
13895
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Access-Control-Allow-Origin
*
Last-Modified
Wed, 03 May 2017 21:29:18 GMT
Server
AmazonS3
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Via
1.1 b7f7970e9c911e165d4cb9f70deac42a.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA53
X-Amz-Cf-Id
4h89WVzh6tpEQkRWV9AAi4Y0yt9HUzX5T9VrhRaTj6Jhykh8t1-3eA==
iab
api.skimlinks.mgr.consensu.org/
772 B
633 B
XHR
General
Full URL
https://api.skimlinks.mgr.consensu.org/iab?nocache=1590075870425
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100099X1555751.skimlinks.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
35.190.40.172 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
172.40.190.35.bc.googleusercontent.com
Software
nginx/1.14.0 /
Resource Hash
4898c2b9f8c2f931ef6a819d36e0019867931d9519af933ab4bd5edce724b2a8
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
nginx/1.14.0
access-control-allow-headers
*
status
200
vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, DELETE, OPTIONS
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://www.wired.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google
page
t.skimresources.com/api/v2/
22 B
339 B
XHR
General
Full URL
https://t.skimresources.com/api/v2/page
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100099X1555751.skimlinks.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
text/plain

Response headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:30 GMT
via
1.1 google
x-content-type-options
nosniff
server
Python/3.7 aiohttp/3.5.4
access-control-allow-headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
status
200
access-control-allow-methods
GET, POST, OPTIONS
content-type
text/plain; charset=utf-8, application/javascript
access-control-allow-origin
https://www.wired.com
cache-control
no-store, no-cache, must-revalidate
access-control-allow-credentials
true
alt-svc
clear
content-length
22
view
securepubads.g.doubleclick.net/pcs/ Frame 6438
0
54 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjst17Qlo9_-ARKJRFOYyzNk2xvpB5kD9Q6BY2Wv2fQW8UVB9BlW7eAMueAS_VammgA7Bpy9Bv76cjcL0DkVUF0A9JGNhjCIjpI8tIBppRD61zg5FqUYBwisxRwoXtJYaqZ3IuF2QDG9N9XWeayzBFpVg4agmV7XT5-VaU5TOeC3siuMhZHHd2DyR0OoJ7Btg4UYKnv-0G-7t2WGVOurlmGutxuRi7KUxP3SIU4zz-Jv9v95NTAPgxc3J6pLifJJpnucMkVZq91XsndtuRFS2uP8rhNzzX1LUiwgWGw&sai=AMfl-YT0ZNdUn-hjGESngH84XYR-2ktz77wOLzkZw-94dsCsBir-m5wwmlOIXqcugRRcNgB8WWbg5oz6kNJJ0E7VJLXzVWBJ3owqvZw2B08aPG84togEKGGWEh7_2xTPiXRdsUwo9N8fu8SlK2nnb-Ux&sig=Cg0ArKJSzGrwP4-xFLU_EAE&urlfix=1&adurl=
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 21 May 2020 15:44:30 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
truncated
/ Frame 6438
220 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
8d92b5a3672e79a3a1964f28c633fc18e4f33f036abc3078f073cc5a94fdd76d

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
idsv2
mid.rkdms.com/
0
0

rid
match.adsrvr.org/track/
109 B
541 B
XHR
General
Full URL
https://match.adsrvr.org/track/rid?ttd_pid=casale&fmt=json&p=183973
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-93942139695505.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.49.73.64 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-49-73-64.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
1c31b97f6460c9ca71ca8041803b98becbe5883af37dd2bd044188f675235cfc

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Thu, 21 May 2020 15:44:30 GMT
x-aspnet-version
4.0.30319
status
200
vary
Origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.wired.com
cache-control
private
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Content-Length, Content-Encoding, Vary, Cache-Control, Accept
content-length
109
expires
Sat, 20 Jun 2020 15:44:30 GMT
identity
api.rlcdn.com/api/
0
233 B
XHR
General
Full URL
https://api.rlcdn.com/api/identity?pid=2&rt=envelope&cv=BOzwlKxOzwlKxAcABBENDJAAAAAviAAA&ct=1
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-93942139695505.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
35.244.174.68 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
68.174.244.35.bc.googleusercontent.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Thu, 21 May 2020 15:44:30 GMT
via
1.1 google
access-control-allow-headers
Cookie, Accept, Origin, Authorization, Content-Type
status
204
access-control-allow-methods
GET, OPTIONS
access-control-allow-origin
https://www.wired.com
cache-control
no-cache, no-store
access-control-allow-credentials
true
timing-allow-origin
*
alt-svc
clear
truncated
/
817 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
db311174b0e3c340727b63c055cfb5b317808e909503e1bda11cc58af444f12b

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml
BreveText-Bold.275792c807f35aee965993e70d42143a96a44df1.woff2
www.wired.com/verso/static/wired/assets/fonts/
31 KB
32 KB
Font
General
Full URL
https://www.wired.com/verso/static/wired/assets/fonts/BreveText-Bold.275792c807f35aee965993e70d42143a96a44df1.woff2
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.15.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.194 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx/1.15.8 /
Resource Hash
767871aa475827ab3c2b3925443e57685a379b5757da8c41da8dbd0e20ca07eb
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
Strict-Transport-Security max-age=31536000; preload

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/verso/static/wired/styles.min.49931209c89a0ba91548fe5430ca117638b86c6d.css
Origin
https://www.wired.com

Response headers

date
Thu, 21 May 2020 15:44:30 GMT
via
1.1 varnish
age
2598
x-cache
HIT
status
200
x-ua-device
desktop
apple-news-services-parsed-url
/verso/static/wired/assets/fonts/BreveText-Bold.275792c807f35aee965993e70d42143a96a44df1.woff2
last-modified
Thu, 21 May 2020 14:42:49 GMT
strict-transport-security
max-age=31536000; preload
content-length
31400
x-amz-id-2
pG2PVGclSlrGHZiJLL65oPOvjHGAfSn8P9ZaEIlKGfuvrpLJ4GgZDkRXfMUSYuJS0DZPhl+CsbM=
x-served-by
cache-fra19180-FRA
apple-news-services-handled
false
server
nginx/1.15.8
x-timer
S1590075871.602945,VS0,VE0
apple-news-services-request-url
/verso/static/wired/assets/fonts/BreveText-Bold.275792c807f35aee965993e70d42143a96a44df1.woff2
etag
"39fe42796608bd215aa36e3e726b2e00"
vary
accept-encoding
x-amz-request-id
8C10D0EC4B4547D6
access-control-allow-origin
https://www.wired.com
expires
Fri, 21 May 2021 15:01:12 GMT
cache-control
max-age=31536000, immutable
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
accept-ranges
bytes
content-type
binary/octet-stream
apple-news-services-host
verso-prod.conde.io
x-cache-hits
3
b25b7e1d-c523-48fd-8d28-b3a51df2ec7b
https://www.wired.com/ Frame 61B2
64 KB
0
Other
General
Full URL
blob:https://www.wired.com/b25b7e1d-c523-48fd-8d28-b3a51df2ec7b
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-49be74de237db7d6199d.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4b188a568fa90fa61d4bbe76dd6cf523abe65787e0ac3dc6b5c44db5e823685b

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
65790
Content-Type
application/javascript
e2c4b00f-d4c2-46ce-8485-a88f6bf41954file-1422k-128-48000-768-00001.ts
dp8hsntg6do36.cloudfront.net/590a4a94fd2e610c45000008/ Frame 61B2
640 KB
630 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/590a4a94fd2e610c45000008/e2c4b00f-d4c2-46ce-8485-a88f6bf41954file-1422k-128-48000-768-00001.ts?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-49be74de237db7d6199d.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.149.174 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-222-149-174.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
256b238911d47d466144d3eb8678214c8df48c23f3a5787b46739262be8bc89a

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 21 May 2020 11:52:57 GMT
Content-Encoding
gzip
Vary
Accept-Encoding,Origin
Age
13894
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Access-Control-Allow-Origin
*
Last-Modified
Wed, 03 May 2017 21:29:19 GMT
Server
AmazonS3
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Via
1.1 b7f7970e9c911e165d4cb9f70deac42a.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA53
X-Amz-Cf-Id
DSsLA1InNcGQEh5cnn9IG2xroH5DWKsLH38MZd9hZ2wS6xBQa4CDQQ==
sodar
pagead2.googlesyndication.com/getconfig/
7 KB
5 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=2020050602&st=env
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
c888018587375a72f4bc9b2ecd1c8226f8d86325cc9548681f2ed58dd8c9f8bb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 21 May 2020 15:44:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
5518
x-xss-protection
0
headerstats
as-sec.casalemedia.com/
0
337 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=383250&u=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-93942139695505.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.98 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-225-98.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Thu, 21 May 2020 15:44:30 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://www.wired.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Thu, 21 May 2020 15:44:30 GMT
sodar2.js
tpc.googlesyndication.com/sodar/
14 KB
5 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020050602.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a47f17d6ebbf4621d8fe87ab790d8d8fb5c3086629194d9ff2d64faaa6e46ab6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1582746470043195"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5456
x-xss-protection
0
expires
Thu, 21 May 2020 15:44:30 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/209/ Frame 0558
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/209/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.wired.com/story/dns-ddos-amplification-attack/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/story/dns-ddos-amplification-attack/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
5727
date
Thu, 21 May 2020 14:41:47 GMT
expires
Fri, 21 May 2021 14:41:47 GMT
last-modified
Tue, 25 Feb 2020 17:32:01 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
3763
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A30.970Z&_t=slot_impression_viewable&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035&cEnt=domain%2C%20ddos%2C%20nxnsattack%2C%20cloudflare%2C%20google%2C%20dyn%2C%20dan%20kaminsky%2C%20lior%20shafir%2C%20tel%20aviv%20university%2C%20botnet%2C%20mirai%2C%20amazon%2C%20hacker%2C%20reddit%2C%20spotify%2C%20herzliya%2C%20head%2C%20phone%2C%20microsoft%2C%20anat%20bremler-barr&cEnw=0.8771759765780737%2C%200.8338062589064815%2C%200.7648210431735492%2C%200.7514458020584966%2C%200.7317869554836482%2C%200.6880327132394504%2C%200.6459096081084209%2C%200.6452865510103766%2C%200.621896185053759%2C%200.5989079930460709%2C%200.5942368447904924%2C%200.5410839432213714%2C%200.5033271113253491%2C%200.46697963005128895%2C%200.4657578192440538%2C%200.4278893088937706%2C%200.4267021729964771%2C%200.41944985438039595%2C%200.4069384737931213%2C%200.374782232092937&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&cPd=2020-05-19T10%3A00%3A00.000Z&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=7400&pSw=1600&pSh=1200&uID=3e451649-3bfa-4913-ae30-cbfdfcad151f&sID=42229899-76d0-4b27-8d6e-0a164ce0d0ab&pID=cf3c874e-d299-41c3-af8e-2a69712b1f32&uDt=desktop&_o=wired&_c=cns_ads&xID=74c407ba-cc71-4c85-94c2-5a307e44f09c&dim1=%7B%22channel%22%3A%22security%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22subChannel%22%3A%22cyberattacks-and-hacks%22%2C%22template%22%3A%22mt_article_two_column%22%2C%22version%22%3A%226.32.25%22%7D&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.wired.cm%2Fnav-cta%2Fsecurity%2Farticle%2F1%22%2C%22advertiserId%22%3A347421895%2C%22campaignId%22%3A2695337190%2C%22creativeId%22%3A138311697852%2C%22elementId%22%3A%22nav_cta_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Atrue%2C%22isFirstImpressionViewable%22%3Atrue%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Afalse%2C%22isFirstMoneyImpressionViewable%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22platform%22%3A%5B%22verso%22%5D%2C%22tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%7D%2C%22lineItemId%22%3A5372985539%2C%22name%22%3A%22nav_cta_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%2280x40%22%2C%22slug%22%3A%22dns-ddos-amplification-attack%22%7D&dim3=%7B%22footerStart%22%3A1590075866631%2C%22headerStart%22%3A1590075866350%2C%22navigationStart%22%3A1590075865794%2C%22injected%22%3A1590075868335%2C%22viewable%22%3A1590075870970%2C%22viewport%22%3A%22%22%2C%22impression%22%3A1590075869220%7D&dim4=%7B%22pos%22%3A%5B%22nav-cta%22%5D%2C%22ctx_slot_type%22%3A%5B%22nav_cta%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22nav_cta_0%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22amznbid%22%3A%5B%220%22%5D%2C%22amznp%22%3A%5B%220%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22mt_article_two_column%22%5D%2C%22ctx_page_channel%22%3A%5B%22security%22%5D%2C%22ctx_page_sub_channel%22%3A%5B%22cyberattacks-and-hacks%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.32.25%22%5D%2C%22ctx_page_slug%22%3A%5B%22dns-ddos-amplification-attack%22%5D%2C%22cnt_copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22cnt_platform%22%3A%5B%22verso%22%5D%2C%22cnt_tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cnt_cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%2C%22usr_bkt_eva%22%3A%5B%2260%22%5D%2C%22usr_bkt_ses%22%3A%5B%2264%22%5D%2C%22usr_bkt_pv%22%3A%5B%2212%22%5D%2C%22usr_pvc_bs%22%3A%5B%221%22%5D%2C%22usr_pvc_24hr%22%3A%5B%221%22%5D%2C%22usr_pvc_30d%22%3A%5B%221%22%5D%2C%22usr_svc_30d%22%3A%5B%221%22%5D%2C%22usr_auth%22%3A%5B%22false%22%5D%2C%22vnd_prx_segments%22%3A%5B%22131100%22%2C%22131118%22%2C%22121100%22%2C%22300003%22%2C%22210001%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22240018%22%2C%22240019%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22euwba9%22%2C%22ap05we%22%2C%2265f9pd%22%2C%22awpwvf%22%5D%2C%22usr_segments%22%3A%5B%22co.w2021%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_sg%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_xid%22%3A%5B%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%5D%2C%22vnd_4d_sid%22%3A%5B%2215b269ad-904b-49b9-bc56-cc387f5f5e9d%22%5D%2C%22vnd_4d_pid%22%3A%5B%22159ae3bc-90df-41b6-b3a4-64b5b8fe9857%22%5D%7D&environment=prod&origin=wired&cKh=server%2Cdns%2Cdomain%2Cddos%2Cresearcher%2Camplification%2Cnxnsattack%2Ccloudflare%2Cgoogle%2Csubdomain%2Crequest%2Cdyn%2Cdan%20kaminsky%2Clior%20shafir%2Cinternet%2Caddress%2Cprovider%2Ctel%20aviv%20university
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:31 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A30.982Z&_t=slot_impression_viewable&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035&cEnt=domain%2C%20ddos%2C%20nxnsattack%2C%20cloudflare%2C%20google%2C%20dyn%2C%20dan%20kaminsky%2C%20lior%20shafir%2C%20tel%20aviv%20university%2C%20botnet%2C%20mirai%2C%20amazon%2C%20hacker%2C%20reddit%2C%20spotify%2C%20herzliya%2C%20head%2C%20phone%2C%20microsoft%2C%20anat%20bremler-barr&cEnw=0.8771759765780737%2C%200.8338062589064815%2C%200.7648210431735492%2C%200.7514458020584966%2C%200.7317869554836482%2C%200.6880327132394504%2C%200.6459096081084209%2C%200.6452865510103766%2C%200.621896185053759%2C%200.5989079930460709%2C%200.5942368447904924%2C%200.5410839432213714%2C%200.5033271113253491%2C%200.46697963005128895%2C%200.4657578192440538%2C%200.4278893088937706%2C%200.4267021729964771%2C%200.41944985438039595%2C%200.4069384737931213%2C%200.374782232092937&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&cPd=2020-05-19T10%3A00%3A00.000Z&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=7400&pSw=1600&pSh=1200&uID=3e451649-3bfa-4913-ae30-cbfdfcad151f&sID=42229899-76d0-4b27-8d6e-0a164ce0d0ab&pID=cf3c874e-d299-41c3-af8e-2a69712b1f32&uDt=desktop&_o=wired&_c=cns_ads&xID=74c407ba-cc71-4c85-94c2-5a307e44f09c&dim1=%7B%22channel%22%3A%22security%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22subChannel%22%3A%22cyberattacks-and-hacks%22%2C%22template%22%3A%22mt_article_two_column%22%2C%22version%22%3A%226.32.25%22%7D&dim2=%7B%22adUnitPath%22%3A%223379%2Fwiredcom.cm%2Fsecurity%2Fcyberattacks-and-hacks%22%2C%22advertiserId%22%3A347421895%2C%22campaignId%22%3A2695337190%2C%22creativeId%22%3A138311697870%2C%22elementId%22%3A%22cm_paywall_bar_call_to_action_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Afalse%2C%22isFirstImpressionViewable%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Afalse%2C%22isFirstMoneyImpressionViewable%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22platform%22%3A%5B%22verso%22%5D%2C%22tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%7D%2C%22lineItemId%22%3A5371845003%2C%22name%22%3A%22cm_paywall_bar_call_to_action_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%221280x300%22%2C%22slug%22%3A%22dns-ddos-amplification-attack%22%7D&dim3=%7B%22footerStart%22%3A1590075866631%2C%22headerStart%22%3A1590075866350%2C%22navigationStart%22%3A1590075865794%2C%22injected%22%3A1590075868602%2C%22viewable%22%3A1590075870982%2C%22viewport%22%3A%22%22%2C%22impression%22%3A1590075869393%7D&dim4=%7B%22pos%22%3A%5B%22cm%22%5D%2C%22ctx_slot_type%22%3A%5B%22cm_paywall_bar_call_to_action%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22cm_paywall_bar_call_to_action_0%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22amznbid%22%3A%5B%220%22%5D%2C%22amznp%22%3A%5B%220%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22mt_article_two_column%22%5D%2C%22ctx_page_channel%22%3A%5B%22security%22%5D%2C%22ctx_page_sub_channel%22%3A%5B%22cyberattacks-and-hacks%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.32.25%22%5D%2C%22ctx_page_slug%22%3A%5B%22dns-ddos-amplification-attack%22%5D%2C%22cnt_copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22cnt_platform%22%3A%5B%22verso%22%5D%2C%22cnt_tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cnt_cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%2C%22usr_bkt_eva%22%3A%5B%2260%22%5D%2C%22usr_bkt_ses%22%3A%5B%2264%22%5D%2C%22usr_bkt_pv%22%3A%5B%2212%22%5D%2C%22usr_pvc_bs%22%3A%5B%221%22%5D%2C%22usr_pvc_24hr%22%3A%5B%221%22%5D%2C%22usr_pvc_30d%22%3A%5B%221%22%5D%2C%22usr_svc_30d%22%3A%5B%221%22%5D%2C%22usr_auth%22%3A%5B%22false%22%5D%2C%22vnd_prx_segments%22%3A%5B%22131100%22%2C%22131118%22%2C%22121100%22%2C%22300003%22%2C%22210001%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22240018%22%2C%22240019%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22euwba9%22%2C%22ap05we%22%2C%2265f9pd%22%2C%22awpwvf%22%5D%2C%22usr_segments%22%3A%5B%22co.w2021%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_sg%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_xid%22%3A%5B%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%5D%2C%22vnd_4d_sid%22%3A%5B%2215b269ad-904b-49b9-bc56-cc387f5f5e9d%22%5D%2C%22vnd_4d_pid%22%3A%5B%22159ae3bc-90df-41b6-b3a4-64b5b8fe9857%22%5D%7D&environment=prod&origin=wired&cKh=server%2Cdns%2Cdomain%2Cddos%2Cresearcher%2Camplification%2Cnxnsattack%2Ccloudflare%2Cgoogle%2Csubdomain%2Crequest%2Cdyn%2Cdan%20kaminsky%2Clior%20shafir%2Cinternet%2Caddress%2Cprovider%2Ctel%20aviv%20university
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:31 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A30.987Z&_t=slot_impression_viewable&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035&cEnt=domain%2C%20ddos%2C%20nxnsattack%2C%20cloudflare%2C%20google%2C%20dyn%2C%20dan%20kaminsky%2C%20lior%20shafir%2C%20tel%20aviv%20university%2C%20botnet%2C%20mirai%2C%20amazon%2C%20hacker%2C%20reddit%2C%20spotify%2C%20herzliya%2C%20head%2C%20phone%2C%20microsoft%2C%20anat%20bremler-barr&cEnw=0.8771759765780737%2C%200.8338062589064815%2C%200.7648210431735492%2C%200.7514458020584966%2C%200.7317869554836482%2C%200.6880327132394504%2C%200.6459096081084209%2C%200.6452865510103766%2C%200.621896185053759%2C%200.5989079930460709%2C%200.5942368447904924%2C%200.5410839432213714%2C%200.5033271113253491%2C%200.46697963005128895%2C%200.4657578192440538%2C%200.4278893088937706%2C%200.4267021729964771%2C%200.41944985438039595%2C%200.4069384737931213%2C%200.374782232092937&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&cPd=2020-05-19T10%3A00%3A00.000Z&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=7400&pSw=1600&pSh=1200&uID=3e451649-3bfa-4913-ae30-cbfdfcad151f&sID=42229899-76d0-4b27-8d6e-0a164ce0d0ab&pID=cf3c874e-d299-41c3-af8e-2a69712b1f32&uDt=desktop&_o=wired&_c=cns_ads&xID=74c407ba-cc71-4c85-94c2-5a307e44f09c&dim1=%7B%22channel%22%3A%22security%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22subChannel%22%3A%22cyberattacks-and-hacks%22%2C%22template%22%3A%22mt_article_two_column%22%2C%22version%22%3A%226.32.25%22%7D&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.wired.cm%2Fnav-rollover%2Fsecurity%2Farticle%2F1%22%2C%22advertiserId%22%3A347421895%2C%22campaignId%22%3A2695337190%2C%22creativeId%22%3A138312068593%2C%22elementId%22%3A%22nav_rollover_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Afalse%2C%22isFirstImpressionViewable%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Afalse%2C%22isFirstMoneyImpressionViewable%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22platform%22%3A%5B%22verso%22%5D%2C%22tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%7D%2C%22lineItemId%22%3A5372985575%2C%22name%22%3A%22nav_rollover_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x200%22%2C%22slug%22%3A%22dns-ddos-amplification-attack%22%7D&dim3=%7B%22footerStart%22%3A1590075866631%2C%22headerStart%22%3A1590075866350%2C%22navigationStart%22%3A1590075865794%2C%22injected%22%3A1590075868905%2C%22viewable%22%3A1590075870987%2C%22viewport%22%3A%22%22%2C%22impression%22%3A1590075869280%7D&dim4=%7B%22pos%22%3A%5B%22nav-rollover%22%5D%2C%22ctx_slot_type%22%3A%5B%22nav_rollover%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22nav_rollover_0%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22mt_article_two_column%22%5D%2C%22ctx_page_channel%22%3A%5B%22security%22%5D%2C%22ctx_page_sub_channel%22%3A%5B%22cyberattacks-and-hacks%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.32.25%22%5D%2C%22ctx_page_slug%22%3A%5B%22dns-ddos-amplification-attack%22%5D%2C%22cnt_copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22cnt_platform%22%3A%5B%22verso%22%5D%2C%22cnt_tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cnt_cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%2C%22usr_bkt_eva%22%3A%5B%2260%22%5D%2C%22usr_bkt_ses%22%3A%5B%2264%22%5D%2C%22usr_bkt_pv%22%3A%5B%2212%22%5D%2C%22usr_pvc_bs%22%3A%5B%221%22%5D%2C%22usr_pvc_24hr%22%3A%5B%221%22%5D%2C%22usr_pvc_30d%22%3A%5B%221%22%5D%2C%22usr_svc_30d%22%3A%5B%221%22%5D%2C%22usr_auth%22%3A%5B%22false%22%5D%2C%22vnd_prx_segments%22%3A%5B%22131100%22%2C%22131118%22%2C%22121100%22%2C%22300003%22%2C%22210001%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22240018%22%2C%22240019%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22euwba9%22%2C%22ap05we%22%2C%2265f9pd%22%2C%22awpwvf%22%5D%2C%22usr_segments%22%3A%5B%22co.w2021%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_sg%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_xid%22%3A%5B%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%5D%2C%22vnd_4d_sid%22%3A%5B%2215b269ad-904b-49b9-bc56-cc387f5f5e9d%22%5D%2C%22vnd_4d_pid%22%3A%5B%22159ae3bc-90df-41b6-b3a4-64b5b8fe9857%22%5D%7D&environment=prod&origin=wired&cKh=server%2Cdns%2Cdomain%2Cddos%2Cresearcher%2Camplification%2Cnxnsattack%2Ccloudflare%2Cgoogle%2Csubdomain%2Crequest%2Cdyn%2Cdan%20kaminsky%2Clior%20shafir%2Cinternet%2Caddress%2Cprovider%2Ctel%20aviv%20university
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:31 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
activeview
pagead2.googlesyndication.com/pcs/ Frame EFBF
42 B
112 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsuhoUgbVd3lNM9i8UEnCUhyN1Mg2QPuzC1aA52tTYTPx2sHQGYkGV-b8t5-3-954BFO8is2ftdeCiCTcRfZ8q2FmQJaRdqgah-YPr-Li8I&sig=Cg0ArKJSzMaQutA5BfGdEAE&adk=1058725820&tt=-1&bs=1600%2C1200&mtos=1027,1027,1027,1027,1027&tos=1027,0,0,0,0&p=900,0,1200,1600&mcvt=1027&rs=0&ht=0&tfs=1091&tls=2015&mc=1&lte=0&bas=0&bac=0&met=ie&la=1&avms=nio&exg=1&md=2&btr=0&lm=2&rst=1590075868600&dlt&rpt=793&isd=0&msd=0&ext&xdi=0&ps=1600%2C7363&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-10-8-9-9-0-0-0&tvt=2009&is=1600%2C300&iframe_loc=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&r=v&id=osdim&vs=4&uc=10&upc=1&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=0x0&itpl=19&v=20200520
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:31 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 8562
42 B
107 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsvEdNZPnRPE50Kq_fwswoNuWw-1Omb-s6egKeWME4duERDE4omFO9IyLwJAlyAqzFrcWltr-UGRCbeOCl_H7KpTBe85Tf1Xujh796IxnaA&sig=Cg0ArKJSzEYWH0IBS5ZiEAE&adk=2667067849&tt=-1&bs=1600%2C1200&mtos=1026,1026,1026,1026,1026&tos=1026,0,0,0,0&p=5,1434,45,1514&mcvt=1026&rs=0&ht=0&tfs=1073&tls=1997&mc=1&lte=0&bas=0&bac=0&met=ce&avms=nio&exg=1&md=2&btr=0&lm=2&rst=1590075868300&dlt&rpt=1084&isd=0&msd=0&ext&xdi=0&ps=1600%2C7363&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-10-3-9-9-0-0-0&tvt=1996&is=80%2C40&iframe_loc=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&r=v&id=osdim&vs=4&uc=10&upc=1&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=0x0&itpl=19&v=20200520
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:31 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 265B
42 B
107 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjssHqTESqT6g3Iu8rrU8raDq6I-cH9sMySv9GLx99MOHJY9f0mpXjrjlKCC6qrirb6SeCfXlIbVv7fA0PmAecbak_yBB7Vh2MvtPhbHcXcQ&sig=Cg0ArKJSzBnAgCvUmTxgEAE&adk=3527217923&tt=-1&bs=1600%2C1200&mtos=1079,1079,1079,1079,1079&tos=1079,0,0,0,0&p=38,1205,232,1505&mcvt=1079&rs=0&ht=0&tfs=856&tls=1939&mc=1&lte=0&bas=0&bac=0&met=mue&avms=nio&exg=1&md=2&btr=0&lm=2&rst=1590075868853&dlt&rpt=526&isd=0&msd=0&ext&xdi=0&ps=1600%2C7363&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-10-5-9-9-0-0-0&tvt=1936&is=300%2C200&invis=1&iframe_loc=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&r=v&id=osdim&vs=4&uc=10&upc=1&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=0x0&itpl=19&v=20200520
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:31 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
gen_204
pagead2.googlesyndication.com/pagead/
0
55 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=209&t=2&li=gpt_2020050602&jk=4403451964970526&bg=!2tml2cFYWERRQ2OUOGsCAAAAvVIAAAAVmQF1gUf95AbMplEO94OdYDyqiVddGhKsD5p2w43rZP2Vd1rDUomQVLtcqyMYpGWqgtVSsL692O2qhgdQkmGw0m-BgE8dXo1jSEkihU3J1ddc2GZjovIpPTk0CrUrjngdGYpHpIlDGxqXtGHLxfiiaYqLRcp6DhTgXuRcFyaWuNIOwLHzPdw9ZQBEHo8PLPpqa0iUj_wVipNot6GsEYvwodBKuH1-qxs7Ta3lge3VM2wQERFwebhHuBquopGhKfgN6t4JNgysOhJrJ96laCYuh2OWkihrteT7FlLSPHWTWW8qLVftp6Oc69Kydek4xucOLiesB7UijwPqVwpJ3qmVu38YvV03UeGfn3MqmlE4eybuSIVUDyWL8UspoMLnxDH7pwHHv-bUOvBNHg7hB1SiFM_7Eo5-f6RQON_n4T38mC2tTDp_0CJHC4HoxodCJ-xiUcLvU716YFuYvOmVTvX3IDmkG1uBDsjtdw0x2mFSiSK5rg9fnPPdXw
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:31 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
events
wren.condenastdigital.com/1.0/conde/
0
730 B
Other
General
Full URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.0.16.6 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-0-16-6.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Date
Thu, 21 May 2020 15:44:32 GMT
x-content-type-options
nosniff
Server
nginx/1.15.8
x-frame-options
DENY
x-download-options
noopen
vary
origin
Connection
keep-alive
Content-Type
image/gif
access-control-allow-origin
https://www.wired.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
strict-transport-security
max-age=15768000; preload
x-xss-protection
1; mode=block
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A32.439Z&_t=slot_impression_viewable&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035&cEnt=domain%2C%20ddos%2C%20nxnsattack%2C%20cloudflare%2C%20google%2C%20dyn%2C%20dan%20kaminsky%2C%20lior%20shafir%2C%20tel%20aviv%20university%2C%20botnet%2C%20mirai%2C%20amazon%2C%20hacker%2C%20reddit%2C%20spotify%2C%20herzliya%2C%20head%2C%20phone%2C%20microsoft%2C%20anat%20bremler-barr&cEnw=0.8771759765780737%2C%200.8338062589064815%2C%200.7648210431735492%2C%200.7514458020584966%2C%200.7317869554836482%2C%200.6880327132394504%2C%200.6459096081084209%2C%200.6452865510103766%2C%200.621896185053759%2C%200.5989079930460709%2C%200.5942368447904924%2C%200.5410839432213714%2C%200.5033271113253491%2C%200.46697963005128895%2C%200.4657578192440538%2C%200.4278893088937706%2C%200.4267021729964771%2C%200.41944985438039595%2C%200.4069384737931213%2C%200.374782232092937&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&cPd=2020-05-19T10%3A00%3A00.000Z&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=7400&pSw=1600&pSh=1200&uID=9ad658ca-4b6d-45ee-bd6c-b6fb66d38187&uNw=1&uUq=1&pID=a11b4cc3-ea24-4ed7-a139-6009dc6f3837&uDt=desktop&_o=wired&_c=cns_ads&xID=74c407ba-cc71-4c85-94c2-5a307e44f09c&dim1=%7B%22channel%22%3A%22security%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22subChannel%22%3A%22cyberattacks-and-hacks%22%2C%22template%22%3A%22mt_article_two_column%22%2C%22version%22%3A%226.32.25%22%7D&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.wired%2Fhero%2Fsecurity%2Farticle%2F1%22%2C%22advertiserId%22%3A4552798968%2C%22campaignId%22%3A2691565179%2C%22creativeId%22%3A138310817832%2C%22elementId%22%3A%22hero_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Afalse%2C%22isFirstImpressionViewable%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Atrue%2C%22isFirstMoneyImpressionViewable%22%3Atrue%2C%22isFirstMoneyRequested%22%3Atrue%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22platform%22%3A%5B%22verso%22%5D%2C%22tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%7D%2C%22lineItemId%22%3A5365161014%2C%22name%22%3A%22hero_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22728x90%22%2C%22slug%22%3A%22dns-ddos-amplification-attack%22%7D&dim3=%7B%22footerStart%22%3A1590075866631%2C%22headerStart%22%3A1590075866350%2C%22navigationStart%22%3A1590075865794%2C%22injected%22%3A1590075869885%2C%22viewable%22%3A1590075872439%2C%22viewport%22%3A%22%22%2C%22impression%22%3A1590075870415%7D&dim4=%7B%22pos%22%3A%5B%22hero%22%5D%2C%22ctx_slot_type%22%3A%5B%22hero%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22hero_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22mt_article_two_column%22%5D%2C%22ctx_page_channel%22%3A%5B%22security%22%5D%2C%22ctx_page_sub_channel%22%3A%5B%22cyberattacks-and-hacks%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.32.25%22%5D%2C%22ctx_page_slug%22%3A%5B%22dns-ddos-amplification-attack%22%5D%2C%22cnt_copilotid%22%3A%5B%225ec1e85cd58e99fafced8096%22%5D%2C%22cnt_platform%22%3A%5B%22verso%22%5D%2C%22cnt_tags%22%3A%5B%22dns%22%2C%22ddos%22%2C%22internet%22%2C%22cybersecurity%22%2C%22security%22%2C%22cyberattacks-and-hacks%22%5D%2C%22cnt_cm%22%3A%5B%22cm_pay_ent_sample%22%2C%22cm_pay_scope_none%22%2C%22cm_pay_ent_sample_cnt_1%22%2C%22cm_pay_ent_sample_max_4%22%5D%2C%22usr_bkt_eva%22%3A%5B%2260%22%5D%2C%22usr_bkt_ses%22%3A%5B%2264%22%5D%2C%22usr_bkt_pv%22%3A%5B%2212%22%5D%2C%22usr_pvc_bs%22%3A%5B%221%22%5D%2C%22usr_pvc_24hr%22%3A%5B%221%22%5D%2C%22usr_pvc_30d%22%3A%5B%221%22%5D%2C%22usr_svc_30d%22%3A%5B%221%22%5D%2C%22usr_auth%22%3A%5B%22false%22%5D%2C%22vnd_prx_segments%22%3A%5B%22131100%22%2C%22131118%22%2C%22121100%22%2C%22300003%22%2C%22210001%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22240018%22%2C%22240019%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22euwba9%22%2C%22ap05we%22%2C%2265f9pd%22%2C%22awpwvf%22%5D%2C%22usr_segments%22%3A%5B%22co.w2021%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_sg%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22domain%22%2C%22ddos%22%2C%22nxnsattack%22%2C%22cloudflare%22%2C%22google%22%2C%22dyn%22%2C%22dan_kaminsky%22%2C%22lior_shafir%22%2C%22tel_aviv_university%22%2C%22botnet%22%2C%22mirai%22%2C%22amazon%22%2C%22hacker%22%2C%22reddit%22%2C%22spotify%22%2C%22herzliya%22%2C%22head%22%2C%22phone%22%2C%22microsoft%22%2C%22anat_bremler-barr%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22domain%22%2C%22ddos%22%2C%22nxnsattack%22%2C%22cloudflare%22%2C%22google%22%2C%22dyn%22%2C%22dan_kaminsky%22%2C%22lior_shafir%22%2C%22tel_aviv_university%22%2C%22botnet%22%2C%22mirai%22%2C%22amazon%22%2C%22hacker%22%2C%22reddit%22%2C%22spotify%22%2C%22herzliya%22%2C%22head%22%2C%22phone%22%2C%22microsoft%22%2C%22anat_bremler-barr%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22server%22%2C%22dns%22%2C%22domain%22%2C%22ddos%22%2C%22researcher%22%2C%22amplification%22%2C%22nxnsattack%22%2C%22cloudflare%22%2C%22google%22%2C%22subdomain%22%2C%22request%22%2C%22dyn%22%2C%22dan_kaminsky%22%2C%22lior_shafir%22%2C%22internet%22%2C%22address%22%2C%22provider%22%2C%22tel_aviv_university%22%2C%22botnet%22%2C%22mirai%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_xid%22%3A%5B%2274c407ba-cc71-4c85-94c2-5a307e44f09c%22%5D%2C%22vnd_4d_sid%22%3A%5B%22029620a5-5c1e-4209-9229-5cfa3d766f3f%22%5D%2C%22vnd_4d_pid%22%3A%5B%224ace29e1-f455-4b7d-8b0c-b6f9ba75f604%22%5D%2C%22ctx_advertisers%22%3A%5B%22347421895%22%5D%2C%22ctx_line_items%22%3A%5B%225372985539%22%2C%225371845003%22%2C%225372985575%22%2C%225372986298%22%5D%2C%22ctx_creatives%22%3A%5B%22138311697852%22%2C%22138311697870%22%2C%22138312068593%22%2C%22138312068590%22%5D%7D&environment=prod&origin=wired&cKh=server%2Cdns%2Cdomain%2Cddos%2Cresearcher%2Camplification%2Cnxnsattack%2Ccloudflare%2Cgoogle%2Csubdomain%2Crequest%2Cdyn%2Cdan%20kaminsky%2Clior%20shafir%2Cinternet%2Caddress%2Cprovider%2Ctel%20aviv%20university
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:32 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
activeview
pagead2.googlesyndication.com/pcs/ Frame A898
42 B
107 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjssrmaCfavgMJ6mSMxtFsfeTUFIsOqrmj3yNClGbeFC_H-JOmegQSnyIr6bdJcqGN4mmTibAxfTC0RcVPIX_-4ug3M8IHHYx69G7gIu71qs&sig=Cg0ArKJSzMLJ3taxQbIAEAE&adk=2032318971&tt=-1&bs=1600%2C1200&mtos=1027,1131,1131,1236,1236&tos=1027,104,0,105,0&p=4,436,94,1164&mcvt=1131&rs=0&ht=0&tfs=1139&tls=2373&mc=1&lte=0&bas=0&bac=0&met=mue&avms=nio&exg=1&md=2&btr=0&lm=2&rst=1590075869880&dlt&rpt=392&isd=0&msd=0&ext&xdi=0&ps=1600%2C7363&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-20-2-19-19-0-0-0&tvt=2372&is=728%2C90&iframe_loc=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&r=v&id=osdim&vs=4&uc=20&upc=1&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=728x90&itpl=3&v=20200520
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:32 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
pubads.g.doubleclick.net/gampad/ Frame 61B2
3 KB
2 KB
XHR
General
Full URL
https://pubads.g.doubleclick.net/gampad/ads?sz=640x480|480x70&iu=/3379/conde.wired/player/security/article&ciu_szs=300x60&gdfp_req=1&env=vp&output=vmap&unviewed_position_start=1&cust_params=m_data%3D1%26m_safety%3Dsafe%26m_categories%3Dmoat_safe%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26env_device_type%3Ddesktop%26ctx_template%3Dmt_article_two_column%26ctx_page_channel%3Dsecurity%26ctx_page_sub_channel%3Dcyberattacks-and-hacks%26env_server%3Dproduction%26ctx_cns_version%3D6.32.25%26ctx_page_slug%3Ddns-ddos-amplification-attack%26cnt_copilotid%3D5ec1e85cd58e99fafced8096%26cnt_platform%3Dverso%26cnt_tags%3Ddns%252Cddos%252Cinternet%252Ccybersecurity%252Csecurity%252Ccyberattacks-and-hacks%26cnt_cm%3Dcm_pay_ent_sample%252Ccm_pay_scope_none%252Ccm_pay_ent_sample_cnt_1%252Ccm_pay_ent_sample_max_4%26usr_bkt_eva%3D60%26usr_bkt_ses%3D64%26usr_bkt_pv%3D12%26usr_pvc_bs%3D1%26usr_pvc_24hr%3D1%26usr_pvc_30d%3D1%26usr_svc_30d%3D1%26usr_auth%3Dfalse%26vnd_prx_segments%3D131100%252C131118%252C121100%252C300003%252C210001%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252C240018%252C240019%252Cqx7745%252Cwmhp4i%252Ceuwba9%252Cap05we%252C65f9pd%252Cawpwvf%26usr_segments%3Dco.w2021%26vnd_4d_cached%3D0%26vnd_4d_ctx_sg%3D%26vnd_4d_ctx_topics%3Ddomain%252Cddos%252Cnxnsattack%252Ccloudflare%252Cgoogle%252Cdyn%252Cdan_kaminsky%252Clior_shafir%252Ctel_aviv_university%252Cbotnet%252Cmirai%252Camazon%252Chacker%252Creddit%252Cspotify%252Cherzliya%252Chead%252Cphone%252Cmicrosoft%252Canat_bremler-barr%26vnd_4d_ctx_entities%3Ddomain%252Cddos%252Cnxnsattack%252Ccloudflare%252Cgoogle%252Cdyn%252Cdan_kaminsky%252Clior_shafir%252Ctel_aviv_university%252Cbotnet%252Cmirai%252Camazon%252Chacker%252Creddit%252Cspotify%252Cherzliya%252Chead%252Cphone%252Cmicrosoft%252Canat_bremler-barr%26vnd_4d_ctx_keywords%3Dserver%252Cdns%252Cdomain%252Cddos%252Cresearcher%252Camplification%252Cnxnsattack%252Ccloudflare%252Cgoogle%252Csubdomain%252Crequest%252Cdyn%252Cdan_kaminsky%252Clior_shafir%252Cinternet%252Caddress%252Cprovider%252Ctel_aviv_university%252Cbotnet%252Cmirai%26vnd_4d_usr_topics%3D%26vnd_4d_xid%3D74c407ba-cc71-4c85-94c2-5a307e44f09c%26vnd_4d_sid%3D029620a5-5c1e-4209-9229-5cfa3d766f3f%26vnd_4d_pid%3D4ace29e1-f455-4b7d-8b0c-b6f9ba75f604%26ctx_advertisers%3D347421895%26ctx_line_items%3D5372985539%252C5371845003%252C5372985575%252C5372986298%26ctx_creatives%3D138311697852%252C138311697870%252C138312068593%252C138312068590%26height%3D403%26muted%3D1%26right_rail%3D0%26sensitive%3D0%26width%3D717&correlator=4439504434337096&description_url=https%3A%2F%2Fwww.wired.com%2Fvideo%2Fwatch%2Fwhat-is-a-ddos-hack-and-how-do-you-avoid-them&vid=590a4a94fd2e610c45000008&cmsid=1495&ppid=9879a434e18a4397b002909fcb1df868
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-49be74de237db7d6199d.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
cafe /
Resource Hash
572f10364ab0ddd10a57ca0733a8ec8191445327d263a3b58f78223de9727972
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:32 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1435
x-xss-protection
0
google-lineitem-id
0
pragma
no-cache
server
cafe
google-creative-id
0
content-type
text/xml; charset=UTF-8
access-control-allow-origin
https://www.wired.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
track
capture.condenastdigital.com/ Frame 61B2
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2020-05-21T15%3A44%3A32.650Z&_c=timedOut&_t=gptData&sID=029620a5-5c1e-4209-9229-5cfa3d766f3f&pID=4ace29e1-f455-4b7d-8b0c-b6f9ba75f604&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&dim1=%7B%22adBlocked%22%3Afalse%2C%22adUnits%22%3A%5B%223379%2Fconde.wired%2Finterstitial%2Fsecurity%2Farticle%2F1%22%2C%223379%2Fconde.wired%2Fhero%2Fsecurity%2Farticle%2F1%22%2C%223379%2Fconde.wired%2Frail%2Fsecurity%2Farticle%2F1%22%2C%223379%2Fconde.wired%2Frail%2Fsecurity%2Farticle%2F2%22%2C%223379%2Fconde.wired%2Fmid-content%2Fsecurity%2Farticle%2F1%22%2C%223379%2Fconde.wired%2Ffooter%2Fsecurity%2Farticle%2F1%22%2C%223379%2Fconde.wired.native%2Fin-content%2Fsecurity%2Farticle%2F1%22%2C%223379%2Fwiredcom.cm%2Fsecurity%2Fcyberattacks-and-hacks%22%2C%223379%2Fwiredcom.cm%2Fsecurity%2Fcyberattacks-and-hacks%22%2C%223379%2Fconde.wired.cm%2Fnav-cta%2Fsecurity%2Farticle%2F1%22%2C%223379%2Fconde.wired.cm%2Fnav-rollover%2Fsecurity%2Farticle%2F1%22%2C%223379%2Fconde.wired.cm%2Fin-content%2Fsecurity%2Farticle%2F2%22%2C%223379%2Fconde.wired.cm%2Fcm-footer%2Fsecurity%2Farticle%2F1%22%2C%223379%2Fconde.wired.native%2Faside%2Fsecurity%2Farticle%2F1%22%5D%2C%22embedLocation%22%3A%22wired%22%2C%22error%22%3A%22%22%2C%22lineItems%22%3A%5B%225372985539%22%2C%225371845003%22%2C%225372985575%22%2C%225372986298%22%5D%2C%22publicaEnabled%22%3Afalse%2C%22videoId%22%3A%22590a4a94fd2e610c45000008%22%7D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:32 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
collect
www.google-analytics.com/r/
35 B
108 B
Other
General
Full URL
https://www.google-analytics.com/r/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:32 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
image/gif
access-control-allow-origin
https://www.wired.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
moatvideo.js
z.moatads.com/condenastjsvideocontent160527792519/ Frame 61B2
295 KB
99 KB
Script
General
Full URL
https://z.moatads.com/condenastjsvideocontent160527792519/moatvideo.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-49be74de237db7d6199d.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
72.247.226.64 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-226-64.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
c0a4ba9dec3497b70e884b0d0907db4e065f1a57bbdd229ac9c5b356e24bb2dc

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 May 2020 15:44:32 GMT
content-encoding
gzip
last-modified
Tue, 19 May 2020 21:13:42 GMT
server
AmazonS3
x-amz-request-id
261A7E30B04C6BE6
etag
"d0dfd7fdd83fa601c8ba8196e68e07b9"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=29669
accept-ranges
bytes
content-length
101058
x-amz-id-2
SAY71Fd6LEQd6ac5GwJgh2I/4720arxd0AIedgYCBZvetqfy7AsqaObBwxl72IRMQopmDxexYZ8=
track
capture.condenastdigital.com/ Frame 61B2
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2020-05-21T15%3A44%3A32.870Z&_c=Video%20Ad&_t=Ad%20Call%20Made&app=playerservice&cBr=wired&cCh=videos%2Fshow&cCu=https%3A%2F%2Fwww.wired.com%2Fvideo%2Fwatch%2Fwhat-is-a-ddos-hack-and-how-do-you-avoid-them&cId=590a4a94fd2e610c45000008&cKe=how%20to&cPd=2017-05-05T10%3A00%3A00%2B00%3A00&cTi=What%20is%20a%20DDoS%20Hack%20and%20How%20Do%20You%20Avoid%20Them%3F&cTy=%2F3379%2Fconde.wired%2Fplayer%2Fsecurity%2Farticle&mDu=91&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pID=4ace29e1-f455-4b7d-8b0c-b6f9ba75f604&pWw=717&pWh=403.3125&sID=029620a5-5c1e-4209-9229-5cfa3d766f3f&uId=2a36347c-3e6d-48d2-be9f-8311e276647d&xid=9879a434-e18a-4397-b002-909fcb1df868&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22gitBranch%22%3A%22master%22%2C%22gitSha%22%3A%22af51319%22%2C%22guid%22%3A%22f2e73bab-161c-8cd3-6876-2b27e6f0cf2b%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Atrue%2C%22initialPlayerStartType%22%3A%22autoplay%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A5885.125%2C%22playerType%22%3A%22video-continuous%22%2C%22playsOnPage%22%3A0%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22isRightRail%22%3Afalse%2C%22tabStatus%22%3A%22active%22%2C%22versoPageType%22%3A%22article%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3A%22OUT_OF_VIEWPORT%22%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%2C%22podIndex%22%3A%22%22%7D&videoViews=1&adId=&org_id=2d59f602-617b-401b-b6c3-3e7c535e02f4&org_app_id=a61a3c7a-01d9-4175-8ab8-7171949de605&pageType=article
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:32 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CONDEVIDEOCONTENT1&hp=1&wf=1&vb=14&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=8&f=0&j=&t=1590075872949&de=296608886787&m=0&ar=31f9dba90d-clean&iw=48d5178&q=9&cb=0&ym=0&cu=1590075872949&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=What%20is%20a%20DDoS%20Hack%20and%20How%20Do%20You%20Avoid%20Them%3F%3A%2F3379%2Fconde.wired%2Fplayer%2Fsecurity%2Farticle%3Aundefined%3Aundefined&zMoatVideoId=590a4a94fd2e610c45000008&zMoatAP=true&gu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&id=1&zMoatDomain=wired.com&zMoatSubdomain=wired.com&gw=condenastjsvideocontent160527792519&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A819%3A819%3A4982%3A1197&fs=180167&na=1009176120&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
72.247.226.64 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-226-64.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:32 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 21 May 2020 15:44:32 GMT
events
wren.condenastdigital.com/1.0/conde/
0
730 B
Other
General
Full URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.0.16.6 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-0-16-6.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Date
Thu, 21 May 2020 15:44:33 GMT
x-content-type-options
nosniff
Server
nginx/1.15.8
x-frame-options
DENY
x-download-options
noopen
vary
origin
Connection
keep-alive
Content-Type
image/gif
access-control-allow-origin
https://www.wired.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
strict-transport-security
max-age=15768000; preload
x-xss-protection
1; mode=block
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-05-21T15%3A44%3A34.213Z&_t=timespent&cBr=Wired&cKe=security%7Ccyberattacks%20and%20hacks%7Cdns%7Cddos%7Cinternet%7Ccybersecurity&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Web%20Giants%20Scrambled%20to%20Head%20Off%20a%20Dangerous%20DDoS%20Technique&cTy=article&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3989536149192608%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035%2C%200.3941265119197035&cEnt=domain%2C%20ddos%2C%20nxnsattack%2C%20cloudflare%2C%20google%2C%20dyn%2C%20dan%20kaminsky%2C%20lior%20shafir%2C%20tel%20aviv%20university%2C%20botnet%2C%20mirai%2C%20amazon%2C%20hacker%2C%20reddit%2C%20spotify%2C%20herzliya%2C%20head%2C%20phone%2C%20microsoft%2C%20anat%20bremler-barr&cEnw=0.8771759765780737%2C%200.8338062589064815%2C%200.7648210431735492%2C%200.7514458020584966%2C%200.7317869554836482%2C%200.6880327132394504%2C%200.6459096081084209%2C%200.6452865510103766%2C%200.621896185053759%2C%200.5989079930460709%2C%200.5942368447904924%2C%200.5410839432213714%2C%200.5033271113253491%2C%200.46697963005128895%2C%200.4657578192440538%2C%200.4278893088937706%2C%200.4267021729964771%2C%200.41944985438039595%2C%200.4069384737931213%2C%200.374782232092937&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5ec1e85cd58e99fafced8096&cPd=2020-05-19T10%3A00%3A00.000Z&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack&pRt=referral&pHp=%2Fstory%2Fdns-ddos-amplification-attack%2F&pRr=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&pWw=1600&pWh=1200&pPw=1600&pPh=7400&pSw=1600&pSh=1200&uID=9ad658ca-4b6d-45ee-bd6c-b6fb66d38187&sID=166dc42b-dbe2-4870-9ff3-0d22620bb513&pID=a11b4cc3-ea24-4ed7-a139-6009dc6f3837&uDt=desktop&_o=wired&_c=general&xID=74c407ba-cc71-4c85-94c2-5a307e44f09c&_v=5000&environment=prod&origin=wired&cKh=server%2Cdns%2Cdomain%2Cddos%2Cresearcher%2Camplification%2Cnxnsattack%2Ccloudflare%2Cgoogle%2Csubdomain%2Crequest%2Cdyn%2Cdan%20kaminsky%2Clior%20shafir%2Cinternet%2Caddress%2Cprovider%2Ctel%20aviv%20university
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.88.188 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-88-188.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 21 May 2020 15:44:34 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
rid
match.adsrvr.org/track/
109 B
542 B
XHR
General
Full URL
https://match.adsrvr.org/track/rid?ttd_pid=3egfyfq&fmt=json
Requested by
Host: www.wired.com
URL: https://www.wired.com/hotzones/esi/wired/prebid.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.49.73.64 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-49-73-64.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
70182db6b6d3ca8ccafd8ba2ac1b4dd6e5e0a0fd77f169148d62c936f718639b

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Thu, 21 May 2020 15:44:34 GMT
x-aspnet-version
4.0.30319
status
200
vary
Origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.wired.com
cache-control
private
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Content-Length, Content-Encoding, Vary, Cache-Control, Accept
content-length
109
expires
Sat, 20 Jun 2020 15:44:34 GMT
pd
eu-u.openx.net/w/1.0/ Frame BEE8
Redirect Chain
  • https://eu-u.openx.net/w/1.0/pd?plm=6&ph=92a42b2b-081a-4be8-96bc-8a959e4a3060&gdpr=1&us_privacy=1---
  • https://eu-u.openx.net/w/1.0/pd?cc=1&plm=6&ph=92a42b2b-081a-4be8-96bc-8a959e4a3060&gdpr=1&us_privacy=1---
0
0
Document
General
Full URL
https://eu-u.openx.net/w/1.0/pd?cc=1&plm=6&ph=92a42b2b-081a-4be8-96bc-8a959e4a3060&gdpr=1&us_privacy=1---
Requested by
Host: www.wired.com
URL: https://www.wired.com/hotzones/esi/wired/prebid.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.186.1 /
Resource Hash

Request headers

:method
GET
:authority
eu-u.openx.net
:scheme
https
:path
/w/1.0/pd?cc=1&plm=6&ph=92a42b2b-081a-4be8-96bc-8a959e4a3060&gdpr=1&us_privacy=1---
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.wired.com/story/dns-ddos-amplification-attack/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
i=56a4c8af-6977-0d6a-0b70-c9e9c5172fb6|1590075874
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/story/dns-ddos-amplification-attack/

Response headers

status
200
vary
Accept, Accept-Encoding
set-cookie
i=56a4c8af-6977-0d6a-0b70-c9e9c5172fb6|1590075874; Version=1; Expires=Fri, 21-May-2021 15:44:34 GMT; Max-Age=31536000; Secure; Domain=.openx.net; Path=/; SameSite=None pd=v2|1590075874|mOgikimWiygu; Version=1; Expires=Fri, 05-Jun-2020 15:44:34 GMT; Max-Age=1296000; Secure; Domain=.openx.net; Path=/; SameSite=None
server
OXGW/16.186.1
p3p
CP="CUR ADM OUR NOR STA NID"
date
Thu, 21 May 2020 15:44:34 GMT
content-type
text/html
content-length
374
content-encoding
gzip
via
1.1 google
alt-svc
clear

Redirect headers

status
302
set-cookie
i=56a4c8af-6977-0d6a-0b70-c9e9c5172fb6|1590075874; Version=1; Expires=Fri, 21-May-2021 15:44:34 GMT; Max-Age=31536000; Secure; Domain=.openx.net; Path=/; SameSite=None
server
OXGW/16.186.1
p3p
CP="CUR ADM OUR NOR STA NID"
location
https://eu-u.openx.net/w/1.0/pd?cc=1&plm=6&ph=92a42b2b-081a-4be8-96bc-8a959e4a3060&gdpr=1&us_privacy=1---
date
Thu, 21 May 2020 15:44:34 GMT
content-length
0
via
1.1 google
alt-svc
clear
async_usersync.html
acdn.adnxs.com/ib/static/usersync/v3/ Frame 284F
0
0
Document
General
Full URL
https://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
Requested by
Host: www.wired.com
URL: https://www.wired.com/hotzones/esi/wired/prebid.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.17 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-225-17.deploy.static.akamaitechnologies.com
Software
nginx/1.9.13 /
Resource Hash

Request headers

Host
acdn.adnxs.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/story/dns-ddos-amplification-attack/

Response headers

Last-Modified
Fri, 20 May 2016 02:07:09 GMT
ETag
"573e714d-3e3"
Server
nginx/1.9.13
Content-Type
text/html
Vary
Accept-Encoding
Access-Control-Allow-Origin
*
Content-Encoding
gzip
Content-Length
506
Cache-Control
max-age=31536000
Expires
Fri, 21 May 2021 15:44:34 GMT
Date
Thu, 21 May 2020 15:44:34 GMT
Connection
keep-alive
ixmatch.html
js-sec.indexww.com/um/ Frame AF31
0
0
Document
General
Full URL
https://js-sec.indexww.com/um/ixmatch.html
Requested by
Host: www.wired.com
URL: https://www.wired.com/hotzones/esi/wired/prebid.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.98 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-225-98.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Host
js-sec.indexww.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/story/dns-ddos-amplification-attack/

Response headers

Server
Apache
Last-Modified
Mon, 19 Jun 2017 19:18:19 GMT
ETag
"e20015-112-55254ff6a1972"
Accept-Ranges
bytes
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Content-Type
text/html; charset=UTF-8
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
211
Date
Thu, 21 May 2020 15:44:34 GMT
Connection
keep-alive
async_usersync.html
acdn.adnxs.com/ib/static/usersync/v3/ Frame E7CA
0
0
Document
General
Full URL
https://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
Requested by
Host: www.wired.com
URL: https://www.wired.com/hotzones/esi/wired/prebid.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.17 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-225-17.deploy.static.akamaitechnologies.com
Software
nginx/1.9.13 /
Resource Hash

Request headers

Host
acdn.adnxs.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/story/dns-ddos-amplification-attack/

Response headers

Last-Modified
Fri, 20 May 2016 02:07:09 GMT
ETag
"573e714d-3e3"
Server
nginx/1.9.13
Content-Type
text/html
Vary
Accept-Encoding
Access-Control-Allow-Origin
*
Content-Encoding
gzip
Content-Length
506
Cache-Control
max-age=31536000
Expires
Fri, 21 May 2021 15:44:34 GMT
Date
Thu, 21 May 2020 15:44:34 GMT
Connection
keep-alive
pd
eu-u.openx.net/w/1.0/ Frame D9A4
Redirect Chain
  • https://eu-u.openx.net/w/1.0/pd?plm=6&ph=92a42b2b-081a-4be8-96bc-8a959e4a3060&gdpr=1&us_privacy=1---
  • https://eu-u.openx.net/w/1.0/pd?cc=1&plm=6&ph=92a42b2b-081a-4be8-96bc-8a959e4a3060&gdpr=1&us_privacy=1---
0
0
Document
General
Full URL
https://eu-u.openx.net/w/1.0/pd?cc=1&plm=6&ph=92a42b2b-081a-4be8-96bc-8a959e4a3060&gdpr=1&us_privacy=1---
Requested by
Host: www.wired.com
URL: https://www.wired.com/hotzones/esi/wired/prebid.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.186.1 /
Resource Hash

Request headers

:method
GET
:authority
eu-u.openx.net
:scheme
https
:path
/w/1.0/pd?cc=1&plm=6&ph=92a42b2b-081a-4be8-96bc-8a959e4a3060&gdpr=1&us_privacy=1---
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.wired.com/story/dns-ddos-amplification-attack/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
i=39e87a55-c940-08cd-25ac-58bc728cb742|1590075874
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/story/dns-ddos-amplification-attack/

Response headers

status
200
vary
Accept, Accept-Encoding
set-cookie
i=39e87a55-c940-08cd-25ac-58bc728cb742|1590075874; Version=1; Expires=Fri, 21-May-2021 15:44:34 GMT; Max-Age=31536000; Secure; Domain=.openx.net; Path=/; SameSite=None pd=v2|1590075874|mOgikimWiygu; Version=1; Expires=Fri, 05-Jun-2020 15:44:34 GMT; Max-Age=1296000; Secure; Domain=.openx.net; Path=/; SameSite=None
server
OXGW/16.186.1
p3p
CP="CUR ADM OUR NOR STA NID"
date
Thu, 21 May 2020 15:44:34 GMT
content-type
text/html
content-length
374
content-encoding
gzip
via
1.1 google
alt-svc
clear

Redirect headers

status
302
set-cookie
i=39e87a55-c940-08cd-25ac-58bc728cb742|1590075874; Version=1; Expires=Fri, 21-May-2021 15:44:34 GMT; Max-Age=31536000; Secure; Domain=.openx.net; Path=/; SameSite=None
server
OXGW/16.186.1
p3p
CP="CUR ADM OUR NOR STA NID"
location
https://eu-u.openx.net/w/1.0/pd?cc=1&plm=6&ph=92a42b2b-081a-4be8-96bc-8a959e4a3060&gdpr=1&us_privacy=1---
date
Thu, 21 May 2020 15:44:34 GMT
content-length
0
via
1.1 google
alt-svc
clear
ixmatch.html
js-sec.indexww.com/um/ Frame 9A73
0
0
Document
General
Full URL
https://js-sec.indexww.com/um/ixmatch.html
Requested by
Host: www.wired.com
URL: https://www.wired.com/hotzones/esi/wired/prebid.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.98 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-225-98.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Host
js-sec.indexww.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/story/dns-ddos-amplification-attack/

Response headers

Server
Apache
Last-Modified
Mon, 19 Jun 2017 19:18:19 GMT
ETag
"e20015-112-55254ff6a1972"
Accept-Ranges
bytes
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Content-Type
text/html; charset=UTF-8
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
211
Date
Thu, 21 May 2020 15:44:34 GMT
Connection
keep-alive
usync.html
eus.rubiconproject.com/ Frame 0D57
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html?us_privacy=1---
Requested by
Host: www.wired.com
URL: https://www.wired.com/hotzones/esi/wired/prebid.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.wired.com/story/dns-ddos-amplification-attack/

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Wed, 13 May 2020 23:08:00 GMT
Content-Encoding
gzip
Content-Length
9162
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=10974
Expires
Thu, 21 May 2020 18:47:28 GMT
Date
Thu, 21 May 2020 15:44:34 GMT
Connection
keep-alive
Vary
Accept-Encoding
events
wren.condenastdigital.com/1.0/conde/
0
730 B
Other
General
Full URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Requested by
Host: www.wired.com
URL: https://www.wired.com/story/dns-ddos-amplification-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.0.16.6 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-0-16-6.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Date
Thu, 21 May 2020 15:44:35 GMT
x-content-type-options
nosniff
Server
nginx/1.15.8
x-frame-options
DENY
x-download-options
noopen
vary
origin
Connection
keep-alive
Content-Type
image/gif
access-control-allow-origin
https://www.wired.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
strict-transport-security
max-age=15768000; preload
x-xss-protection
1; mode=block
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=25&q=2&hp=1&wf=1&vb=14&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=0&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F9778312539477072520&i=CONDECW3&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&th=3321063859&tf=nMzjG---CSa7H-XSSptC-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbjBC4ehueB57NG9aJeRzBqEKiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-120&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=0&g=7&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&id=1&cm=0&f=0&j=&t=1590075870187&de=277864569393&cu=1590075870187&m=11136&ar=31f9dba90d-clean&iw=eab6199&cb=0&ym=0&ll=2&lm=0&ln=1&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=7363&le=1&gm=1&io=1&ch=1&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A819%3A819%3A0%3A1197&as=1&ag=10005&an=5147&gi=1&gf=9801&gg=4943&ix=9801&ic=9801&ez=1&ck=1116&kw=2033&aj=0&pg=100&pf=100&ib=0&cc=1&bw=10005&bx=5147&ci=1116&jz=2033&dj=0&aa=1&ad=10005&cn=5147&gn=1&gk=9801&gl=4943&ik=9801&co=1116&cp=2033&cq=0&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=10921&cd=6064&ah=10921&am=6064&rf=0&re=1&ft=6670&fv=5147&fw=306&wb=2&cl=0&at=0&d=4552798968%3A2691565179%3A5365161014%3A138310817832&zMoatPlacID=21698576758&bo=21698049779&bp=21698576758&bd=Undefined&zMoatPT=mt_article_two_column&zMoatST=hero&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatRFSH=Refresh%20Not%20Defined&zMoatNoRFSH=true&dfp=0%2C1&la=21698576758&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&gw=condenastdfp9588492144&zMoatOrigSlicer1=21698049779&zMoatOrigSlicer2=21698576758&zMoatPS=hero_0&zMoatCNS=6.32.25&zMoatSZ=728x90&zMoatKWPos=Undefined&zMoatPlat=verso&zMoatMMV_MAX=na&dfpSlotId=hero_0&zMoatCURL=wired.com%2Fstory%2Fdns-ddos-amplification-attack&zMoatDev=Desktop&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tz=hero_0&iq=na&tt=na&tc=0&fs=180167&na=939405088&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
72.247.226.64 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-226-64.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.wired.com/story/dns-ddos-amplification-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 21 May 2020 15:44:41 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 21 May 2020 15:44:41 GMT

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
mid.rkdms.com
URL
https://mid.rkdms.com/idsv2?ptk=17c1789b-e660-493b-aa74-3c8fb990dc5f&pubid=CONDENAST

Verdicts & Comments Add Verdict or Comment

135 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| cns object| OneTrustStub string| OnetrustActiveGroups string| OptanonActiveGroups object| dataLayer function| OptanonWrapper object| googletag object| sparrowQueue object| cnBus function| moatYieldReady object| __PRELOADED_STATE__ object| PARSELY object| dl string| CN_STACK_TEMP object| _perfRefForUserTimingPolyfill object| __core-js_shared__ object| core object| fastdom object| BOOMR_mq object| regeneratorRuntime object| apstag object| pbjs function| jsonFeed object| gapi object| ___jsl object| PolarConde object| NATIVEADS object| NATIVEADS_QUEUE object| SUBSCRIPTIONS object| SWG object| UrlCache string| beaconHostname function| setOptions object| cookie function| ajax function| resetOurXid function| propagateXid function| pixel function| pbjsChunk object| _pbjsGlobals undefined| ct undefined| et undefined| hourElapsed undefined| msg undefined| pixelDomain undefined| isDomless undefined| documentReferrer undefined| isBeta undefined| viewHash undefined| pxSrc undefined| moat_px object| Moat#G26 object| MoatSuperV26 object| MoatNadoAllJsonpRequest_8068461 object| Moat#PML#26#1.2 boolean| Moat#EVA object| moatPrebidApi object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken boolean| apstagLOADED function| __cmp object| otStubData object| _cne function| onReady15900758672450 function| onIframeReady15900758672451 object| failsafeDataGateway object| journeyDataGateway object| SparrowConfigV2 object| experiments object| CN object| NATIVEADS_STORE object| headertag number| google_srt function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter undefined| google_measure_js_timing number| __google_ad_urls_id number| google_unique_id object| gaGlobal function| parselyStartCallback object| __twttrll object| twttr object| __twttr object| google_tag_manager function| postscribe object| SparrowCache function| Sparrow boolean| sparrowInitialize object| _4d object| sparrow string| queryString object| urlParams string| fullUrl object| myParam object| google_tag_data string| GoogleAnalyticsObject function| ga string| b number| h function| getVisitNumCustom number| d object| ampInaboxIframes object| ampInaboxPendingMessages object| __google_ad_urls boolean| google_osd_loaded boolean| google_onload_fired object| Criteo object| Optanon object| OneTrust object| gaplugins function| isAnExcludedLink function| get_real_link object| __SKIM_JS_GLOBAL__ object| skimlinksAPI function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| _google_rum_ns_ object| google_persistent_state_async number| google_global_correlator object| closure_lm_23524 object| google object| gaData object| otCMP object| otIabModule object| closure_lm_221657 object| criteo_pubtag object| GoogleGcLKhOms object| google_image_requests

14 Cookies

Domain/Path Name / Value
.wired.com/ Name: OptanonConsent
Value: isIABGlobal=false&datestamp=Thu+May+21+2020+17%3A44%3A30+GMT%2B0200+(Central+European+Summer+Time)&version=5.15.0&landingPath=https%3A%2F%2Fwww.wired.com%2Fstory%2Fdns-ddos-amplification-attack%2F&groups=C0003%3A0%2CC0002%3A0%2CC0004%3A0%2CC0005%3A0%2CC0001%3A1&hosts=xvr%3A0%2CH35%3A0%2Cbhq%3A0%2Cvrh%3A0%2CH132%3A0%2Czdh%3A0%2Cxik%3A0%2Cwbf%3A0%2Cmgm%3A0%2Cwuk%3A0%2Cots%3A0%2CH17%3A0%2Comt%3A0%2CH19%3A0%2Cqao%3A0%2CH99%3A0%2Cyla%3A0%2Cixz%3A0%2Cziw%3A0%2CH253%3A0%2Csto%3A0%2Crea%3A0%2Czci%3A0%2Cssq%3A0%2Cjjk%3A0%2Cnhq%3A0%2Ceuw%3A0%2CH25%3A0%2Cdwu%3A0%2Ceyl%3A0%2CH27%3A0%2CH28%3A0%2Cwul%3A0%2Cbup%3A0%2Czvz%3A0%2Cdce%3A0%2CH187%3A0%2CH30%3A0%2CH31%3A0%2Cppg%3A0%2Copx%3A0%2CH151%3A0%2Cpjw%3A0%2CH126%3A0%2Cjem%3A0%2Covl%3A0%2Cywk%3A0%2Cdkv%3A0%2CH41%3A0%2Cpzi%3A0%2Cdnm%3A0%2Cwjk%3A0%2Cxbw%3A0%2Chrl%3A0%2Cuuk%3A0%2Cudt%3A0%2Czgf%3A0%2Cayv%3A0%2Crai%3A0%2Cktz%3A0%2Cdfh%3A0%2Clck%3A0%2Chty%3A0%2Cbrf%3A0%2CH48%3A0%2Cszd%3A0%2CH52%3A0%2CH53%3A0%2CH209%3A0%2Cbax%3A0%2Cvrj%3A0%2Cwtc%3A0%2Cxbb%3A0%2Ciiz%3A0%2Crpr%3A0%2Cfkt%3A0%2Cjjg%3A0%2Chbz%3A0%2Cdui%3A0%2Cstj%3A0%2Caks%3A0%2Cnmc%3A0%2CH297%3A0%2Cyqw%3A0%2Ckmc%3A0%2Cddu%3A0%2Cmfc%3A0%2CH59%3A0%2CH60%3A0%2Cyze%3A0%2CH80%3A0%2Ctif%3A0%2Clny%3A0%2Cdvt%3A0%2Cpzk%3A0%2CH64%3A0%2Csjs%3A0%2Cviv%3A0%2CH67%3A0%2Cskb%3A0%2Ckgf%3A0%2Csqk%3A0%2Catx%3A0%2Caiy%3A0%2Cgor%3A0%2Clho%3A0%2CH69%3A0%2CH72%3A0%2Cvef%3A0%2Clhp%3A0%2Czhb%3A0%2CH74%3A0%2Crhh%3A0%2Cbro%3A0%2Capv%3A0%2Cdjx%3A0%2Cslt%3A0%2Cmlc%3A0%2Czsx%3A0%2Cous%3A0%2Ciqa%3A0%2CH155%3A0%2Cduq%3A0%2Cqih%3A0%2CH77%3A0%2Cgif%3A0%2Cvif%3A0%2CH32%3A0%2Cwjk%3A0%2CH37%3A1%2Cuuk%3A1%2Cwtu%3A1%2Chiz%3A1%2CH65%3A1%2CH68%3A1%2Czsx%3A1&legInt=
www.wired.com/ Name: CN_segments
Value: co.w2021
www.wired.com/ Name: xid1
Value: 1
www.wired.com/ Name: CN_xid
Value: 958d53ed-c733-4e88-b9f5-7886f6566991
www.wired.com/ Name: cneplayercount
Value: 1
.wired.com/ Name: _gat_UA-8293713-27
Value: 1
www.wired.com/story/dns-ddos-amplification-attack Name: crfgL0cSt0r
Value: true
.wired.com/ Name: _gid
Value: GA1.2.1889547380.1590075870
.wired.com/ Name: _ga
Value: GA1.2.425008880.1590075868
.wired.com/ Name: sID
Value: 42229899-76d0-4b27-8d6e-0a164ce0d0ab
.wired.com/ Name: _dc_gtm_UA-8293713-27
Value: 1
www.wired.com/ Name: pID
Value: cf3c874e-d299-41c3-af8e-2a69712b1f32
www.wired.com/ Name: CN_su
Value: 9a230bcf-8683-4cb7-bc55-5e2d4fc31e67
www.wired.com/ Name: CN_sp
Value: 3e451649-3bfa-4913-ae30-cbfdfcad151f

2 Console Messages

Source Level URL
Text
console-api log URL: https://news.google.com/swg/js/v1/swg.js(Line 29)
Message:
Subscriptions Runtime: 0.1.22.105
console-api warning URL: https://news.google.com/swg/js/v1/swg.js(Line 29)
Message:
[swg.js:setOnSubscribeResponse]: This method has been deprecated, please switch usages to 'setOnPaymentResponse'

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob: wss://*.hotjar.com; font-src https: data:; img-src https: blob: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests; report-uri https://capture.condenastdigital.com/csp/wired
Strict-Transport-Security max-age=31536000; preload

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

249a53b1e4be45e3e794333e4c2541ab.safeframe.googlesyndication.com
4d.condenastdigital.com
acdn.adnxs.com
adserver-us.adtech.advertising.com
adservice.google.com
adservice.google.ee
ampcid.google.com
ampcid.google.de
api.condenast.io
api.rlcdn.com
api.skimlinks.mgr.consensu.org
apis.google.com
as-sec.casalemedia.com
assoc-na.associates-amazon.com
bidder.criteo.com
c.amazon-adsystem.com
capture.condenastdigital.com
cdn.cookielaw.org
cdn.mediavoice.com
cdn.parsely.com
clients2.google.com
condenastus-d.openx.net
connect.facebook.net
d1z2jf7jlzjs58.cloudfront.net
d2c8v52ll5s99u.cloudfront.net
dp8hsntg6do36.cloudfront.net
dwgyu36up6iuz.cloudfront.net
eu-u.openx.net
eus.rubiconproject.com
fastlane.rubiconproject.com
geolocation.onetrust.com
ib.adnxs.com
imasdk.googleapis.com
infinityid.condenastdigital.com
journey-service-assets-prod.s3.amazonaws.com
js-sec.indexww.com
match.adsrvr.org
mb.moatads.com
media.wired.com
mid.rkdms.com
news.google.com
p.skimresources.com
pagead2.googlesyndication.com
pay.google.com
payments.google.com
pixel.condenastdigital.com
platform.twitter.com
player.cnevids.com
plugin.mediavoice.com
polarcdn-terrax.com
prebid.media.net
pubads.g.doubleclick.net
px.moatads.com
r.skimresources.com
s.skimresources.com
s0.2mdn.net
securepubads.g.doubleclick.net
segment-data.zqtk.net
srv-2020-05-21-15.pixel.parsely.com
static.criteo.net
stats.g.doubleclick.net
t.skimresources.com
tpc.googlesyndication.com
wren.condenastdigital.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
www.gstatic.com
www.wired.com
z-na.associates-amazon.com
z.moatads.com
mid.rkdms.com
104.111.230.142
151.101.112.239
151.101.12.239
151.101.14.194
151.139.128.11
172.217.16.130
172.217.22.66
178.250.2.152
192.229.233.25
2606:2800:233:1cb7:261b:1f9c:2074:3c
2606:2800:233:97b6:26be:138a:cba8:bb01
2606:4700:10::6814:b944
2606:4700::6811:4132
2606:4700::6813:d983
2a00:1450:4001:800::2008
2a00:1450:4001:801::2002
2a00:1450:4001:802::2006
2a00:1450:4001:808::200e
2a00:1450:4001:814::2001
2a00:1450:4001:816::2002
2a00:1450:4001:816::2003
2a00:1450:4001:816::2004
2a00:1450:4001:816::200e
2a00:1450:4001:818::200e
2a00:1450:4001:81a::2003
2a00:1450:4001:81b::2001
2a00:1450:4001:81d::200e
2a00:1450:4001:81f::2002
2a00:1450:4001:821::200a
2a00:1450:4001:821::200e
2a00:1450:400c:c00::5c
2a00:1450:400c:c00::9d
2a00:1450:400c:c06::5c
2a02:2638::3
2a03:2880:f01c:8012:face:b00c:0:3
3.11.4.3
34.200.125.126
34.231.184.25
34.238.88.188
34.95.120.147
35.190.40.172
35.190.59.101
35.190.91.160
35.201.67.47
35.244.174.68
37.252.173.62
52.0.16.6
52.19.1.241
52.216.171.171
52.222.148.222
52.222.149.174
52.222.149.47
52.222.153.129
52.222.153.170
52.222.157.216
52.222.157.230
52.222.157.237
52.49.73.64
52.86.193.219
69.173.144.143
72.21.195.65
72.247.224.27
72.247.225.17
72.247.225.98
72.247.226.64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