URL: https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
Submission: On February 20 via api from JP — Scanned from JP

Summary

This website contacted 5 IPs in 3 countries across 4 domains to perform 20 HTTP transactions. The main IP is 2606:4700:20::681a:296, located in United States and belongs to CLOUDFLARENET, US. The main domain is thehackernews.com. The Cisco Umbrella rank of the primary domain is 177600.
TLS certificate: Issued by GTS CA 1P5 on February 14th 2024. Valid for: 3 months.
This is the only time thehackernews.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
6 2606:4700:20:... 13335 (CLOUDFLAR...)
12 2404:6800:400... 15169 (GOOGLE)
1 2404:6800:400... 15169 (GOOGLE)
1 2404:6800:400... 15169 (GOOGLE)
20 5
Apex Domain
Subdomains
Transfer
12 googleusercontent.com
blogger.googleusercontent.com — Cisco Umbrella Rank: 11252
212 KB
6 thehackernews.com
thehackernews.com — Cisco Umbrella Rank: 177600
98 KB
1 google.com
www.google.com — Cisco Umbrella Rank: 2
1 doubleclick.net
stats.g.doubleclick.net — Cisco Umbrella Rank: 113
255 B
20 4
Domain Requested by
12 blogger.googleusercontent.com thehackernews.com
6 thehackernews.com thehackernews.com
1 www.google.com thehackernews.com
1 stats.g.doubleclick.net thehackernews.com
20 4
Subject Issuer Validity Valid
thehackernews.com
GTS CA 1P5
2024-02-14 -
2024-05-15
3 months crt.sh
*.googleusercontent.com
GTS CA 1C3
2024-01-29 -
2024-04-22
3 months crt.sh
*.g.doubleclick.net
GTS CA 1C3
2024-01-29 -
2024-04-22
3 months crt.sh
www.google.com
GTS CA 1C3
2024-01-29 -
2024-04-22
3 months crt.sh

This page contains 1 frames:

Primary Page: https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
Frame ID: 23220E281C0129F68545B0FEFF26F903
Requests: 28 HTTP requests in this frame

Screenshot

Page Title

Ivanti Vulnerability Exploited to Install 'DSLog' Backdoor on 670+ IT Infrastructures

Page Statistics

20
Requests

100 %
HTTPS

100 %
IPv6

4
Domains

4
Subdomains

5
IPs

3
Countries

318 kB
Transfer

420 kB
Size

8
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

20 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request ivanti-vulnerability-exploited-to.html
thehackernews.com/2024/02/
131 KB
43 KB
Document
General
Full URL
https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::681a:296 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / Google Frontend
Resource Hash
0b24469dd300f0a386392f40fec2945f8a9b885f559a168dca3d43f09050a9d5
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36
accept-language
jp-JP,jp;q=0.9

Response headers

age
14719
alt-svc
h3=":443"; ma=86400
cache-control
public, s-maxage=604800, max-age=0
cf-cache-status
HIT
cf-ray
8587096f0b5b686c-NRT
content-encoding
br
content-security-policy
upgrade-insecure-requests
content-type
text/html; charset=UTF-8
date
Tue, 20 Feb 2024 13:18:40 GMT
expires
Tue, 20 Feb 2024 09:13:21 GMT
last-modified
Tue, 20 Feb 2024 09:09:34 GMT
referrer-policy
no-referrer-when-downgrade
server
cloudflare
strict-transport-security
max-age=15552000; includeSubDomains; preload
vary
Accept-Encoding
x-content-type-options
nosniff
x-forwarded-for
2001:ac8:40:1e::2e
x-frame-options
SAMEORIGIN
x-powered-by
Google Frontend
x-xss-protection
1; mode=block
BB_Emblem_200x200px.png
blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhw8IWcpN53z0xqZLQAgXd3AtMXkDtBv6W68H48ZcV0tUEU1apYSPNE5MDNaMTMFjxCAKC3LsSNO_0cVtmoVHQ9B08mrxZa8pc3YU0dKoI_dIVkwPX1x6wWBSPBMT9dZuZlzMW9RwBhloPBeW6C...
2 KB
2 KB
Image
General
Full URL
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhw8IWcpN53z0xqZLQAgXd3AtMXkDtBv6W68H48ZcV0tUEU1apYSPNE5MDNaMTMFjxCAKC3LsSNO_0cVtmoVHQ9B08mrxZa8pc3YU0dKoI_dIVkwPX1x6wWBSPBMT9dZuZlzMW9RwBhloPBeW6Cq4qcOnloZu6FTZmXfH_WRfzeIcBg9Jkn1VbL9bZAEp6v/s100-rw-e365/BB_Emblem_200x200px.png
Requested by
Host: thehackernews.com
URL: https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2404:6800:4004:823::2001 , Australia, ASN15169 (GOOGLE, US),
Reverse DNS
Software
fife /
Resource Hash
fc00aaab93e93aacd116a8275ca491f5b97dc3468f29a3624113b82a287b1898
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

date
Tue, 20 Feb 2024 13:18:40 GMT
x-content-type-options
nosniff
server
fife
etag
"vef0b"
vary
Origin
content-type
image/webp
access-control-expose-headers
Content-Length
cache-control
public, max-age=7776000, no-transform
content-disposition
inline;filename="BB_Emblem_200x200px.webp"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
1758
x-xss-protection
0
expires
Mon, 20 May 2024 13:18:40 GMT
rocket-loader.min.js
thehackernews.com/cdn-cgi/scripts/7d0fa10a/cloudflare-static/
12 KB
4 KB
Script
General
Full URL
https://thehackernews.com/cdn-cgi/scripts/7d0fa10a/cloudflare-static/rocket-loader.min.js
Requested by
Host: thehackernews.com
URL: https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::681a:296 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
ccf00d1923b0131a10e0c6d26f95e5dee6ebf8621a27e83c5a2f68a2e0093142
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

date
Tue, 20 Feb 2024 13:18:40 GMT
strict-transport-security
max-age=15552000; includeSubDomains; preload
x-content-type-options
nosniff
last-modified
Tue, 13 Feb 2024 18:14:53 GMT
server
cloudflare
content-encoding
gzip
etag
W/"65cbb19d-302c"
vary
Accept-Encoding
x-frame-options
DENY
content-type
application/javascript
cache-control
max-age=172800, public
cf-ray
8587096fec44686c-NRT
expires
Thu, 22 Feb 2024 13:18:40 GMT
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c6a9d65e5bd6eb2447ea57e398e1d30f3c6e2d022ecf195933d161ffed964690

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
423 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0f0d757d0f4ac62f3f2dfb357eae1b5e57af2cd146dbb00b56b49d2147cead76

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
68 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
2de33ca2d2cfb7f437aa190ecdd4b3991ff2879604c0e24aaf02849ae1f360b3

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
294 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
e665cc707d8e4644e9aec1bca418d595f28050b970bbf473df7e9915d1cc9faa

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
288 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
dbf4fa73ce4f2bd113dde31b7f7eff7bfd3a1271f30ababad320f07033408f06

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
294 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
fed35af77c7998b274f7c2e65cc1cfa37bb2dd363d6bcd98546428ce134aa6bc

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

Content-Type
image/svg+xml
s.js
thehackernews.com/cdn-cgi/zaraz/
6 KB
4 KB
Script
General
Full URL
https://thehackernews.com/cdn-cgi/zaraz/s.js?z=JTdCJTIyZXhlY3V0ZWQlMjIlM0ElNUIlNUQlMkMlMjJ0JTIyJTNBJTIySXZhbnRpJTIwVnVsbmVyYWJpbGl0eSUyMEV4cGxvaXRlZCUyMHRvJTIwSW5zdGFsbCUyMCdEU0xvZyclMjBCYWNrZG9vciUyMG9uJTIwNjcwJTJCJTIwSVQlMjBJbmZyYXN0cnVjdHVyZXMlMjIlMkMlMjJ4JTIyJTNBMC43NTI2NDUyMDkyMTc4NjIyJTJDJTIydyUyMiUzQTE2MDAlMkMlMjJoJTIyJTNBMTIwMCUyQyUyMmolMjIlM0ExMjAwJTJDJTIyZSUyMiUzQTE2MDAlMkMlMjJsJTIyJTNBJTIyaHR0cHMlM0ElMkYlMkZ0aGVoYWNrZXJuZXdzLmNvbSUyRjIwMjQlMkYwMiUyRml2YW50aS12dWxuZXJhYmlsaXR5LWV4cGxvaXRlZC10by5odG1sJTIyJTJDJTIyciUyMiUzQSUyMiUyMiUyQyUyMmslMjIlM0EyNCUyQyUyMm4lMjIlM0ElMjJVVEYtOCUyMiUyQyUyMm8lMjIlM0EtNTQwJTJDJTIycSUyMiUzQSU1QiU1RCU3RA==
Requested by
Host: thehackernews.com
URL: https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:20::681a:296 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7091eec2853ee4c7c5cd70cb5a6e8920d8acd287bddbcb5d1b5692300dc8f0e3
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://thehackernews.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

date
Tue, 20 Feb 2024 13:18:40 GMT
strict-transport-security
max-age=15552000; includeSubDomains; preload
x-content-type-options
nosniff
content-encoding
br
server
cloudflare
access-control-max-age
600
vary
Origin, Accept-Encoding
access-control-allow-methods
GET, HEAD, POST, OPTIONS
access-control-allow-origin
https://thehackernews.com
content-type
text/javascript; charset=utf-8
access-control-allow-credentials
true
x-robots-tag
none
access-control-allow-headers
Content-Type, Set-Cookie, Cache-Control
alt-svc
h3=":443"; ma=86400
cf-ray
858709701f6d80f6-NRT
truncated
/
194 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f88754ecdaeedbf69845f3cb4015909beff31f92b173185c075ff8ab40ae3d02

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

Content-Type
image/png
normal.woff2
thehackernews.com/cf-fonts/s/roboto/5.0.11/latin/900/
15 KB
16 KB
Font
General
Full URL
https://thehackernews.com/cf-fonts/s/roboto/5.0.11/latin/900/normal.woff2
Requested by
Host: thehackernews.com
URL: https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:20::681a:296 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
701f948695b86b2cc030e69f09aa0ff60eb9c0980dabcc997c35c42993bae2fd
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
Origin
https://thehackernews.com
accept-language
jp-JP,jp;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

date
Tue, 20 Feb 2024 13:18:40 GMT
strict-transport-security
max-age=15552000; includeSubDomains; preload
x-content-type-options
nosniff
cf-cache-status
HIT
server
cloudflare
vary
Accept-Encoding
cache-control
public, max-age=31536000, immutable
cf-ray
858709702f7880f6-NRT
alt-svc
h3=":443"; ma=86400
content-length
15752
truncated
/
7 KB
7 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a71328300f380217ae0abf7f805052a10a0c196cb241eb97adf9b905e4a48c8a

Request headers

Referer
Origin
https://thehackernews.com
accept-language
jp-JP,jp;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

Content-Type
application/font-woff
normal.woff2
thehackernews.com/cf-fonts/s/roboto/5.0.11/latin/500/
16 KB
16 KB
Font
General
Full URL
https://thehackernews.com/cf-fonts/s/roboto/5.0.11/latin/500/normal.woff2
Requested by
Host: thehackernews.com
URL: https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:20::681a:296 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7bc37c98295b08006e612be6c569f3cec05d794c9baa73e80c80c1a65c66432f
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
Origin
https://thehackernews.com
accept-language
jp-JP,jp;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

date
Tue, 20 Feb 2024 13:18:40 GMT
strict-transport-security
max-age=15552000; includeSubDomains; preload
x-content-type-options
nosniff
cf-cache-status
HIT
server
cloudflare
vary
Accept-Encoding
cache-control
public, max-age=31536000, immutable
cf-ray
858709702f7a80f6-NRT
alt-svc
h3=":443"; ma=86400
content-length
15920
normal.woff2
thehackernews.com/cf-fonts/s/roboto/5.0.11/latin/400/
15 KB
16 KB
Font
General
Full URL
https://thehackernews.com/cf-fonts/s/roboto/5.0.11/latin/400/normal.woff2
Requested by
Host: thehackernews.com
URL: https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:20::681a:296 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
8ce893c505f39dd4648a663903cc54acb53706282331c26552ed55ccef0c127f
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
Origin
https://thehackernews.com
accept-language
jp-JP,jp;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

date
Tue, 20 Feb 2024 13:18:40 GMT
strict-transport-security
max-age=15552000; includeSubDomains; preload
x-content-type-options
nosniff
cf-cache-status
HIT
server
cloudflare
vary
Accept-Encoding
cache-control
public, max-age=31536000, immutable
cf-ray
858709702f7c80f6-NRT
alt-svc
h3=":443"; ma=86400
content-length
15744
collect
stats.g.doubleclick.net/g/
0
255 B
XHR
General
Full URL
https://stats.g.doubleclick.net/g/collect?t=dc&aip=1&_r=3&v=1&_v=j86&tid=G-ZDZCZPGJ7N&cid=2fe0be4e-33d7-48c3-941a-514beb888a4d&_u=KGDAAEADQAAAAC%7E&z=1297387010
Requested by
Host: thehackernews.com
URL: https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2404:6800:4008:c03::9a Taipei, Taiwan, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 20 Feb 2024 13:18:40 GMT
server
Golfe2
content-type
text/plain
access-control-allow-origin
https://thehackernews.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.com/ads/
42 B
0
Fetch
General
Full URL
https://www.google.com/ads/ga-audiences?t=sr&aip=1&_r=4&v=1&_v=j86&tid=G-ZDZCZPGJ7N&cid=2fe0be4e-33d7-48c3-941a-514beb888a4d&_u=KGDAAEADQAAAAC%7E&z=1297387010&slf_rd=1
Requested by
Host: thehackernews.com
URL: https://thehackernews.com/cdn-cgi/zaraz/s.js?z=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
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2404:6800:4004:80f::2004 , Australia, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 20 Feb 2024 13:18:40 GMT
x-content-type-options
nosniff
server
cafe
content-type
image/gif
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
https://thehackernews.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
att11.jpg
blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixQNRWZxSBCecuPARlaINAS3EYIsdFqPRLoZWb6wwwSqAA1m0MXy8GCW0lCnlCHy95qR3W9QQhJE0k0TdPLWYeYYTV-GGuFcgpp64p9GCAqOgs3UCBlIfGivNO6MFrLtaeZN3aS-fSv6Jr3HE3...
36 KB
36 KB
Image
General
Full URL
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixQNRWZxSBCecuPARlaINAS3EYIsdFqPRLoZWb6wwwSqAA1m0MXy8GCW0lCnlCHy95qR3W9QQhJE0k0TdPLWYeYYTV-GGuFcgpp64p9GCAqOgs3UCBlIfGivNO6MFrLtaeZN3aS-fSv6Jr3HE3DUVtZ1qS-0lb3O46Iu7AWqC8-PzFSdc0NyIPXkeOVRCn/s300-e365/att11.jpg
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2404:6800:4004:823::2001 , Australia, ASN15169 (GOOGLE, US),
Reverse DNS
Software
fife /
Resource Hash
744d86d7b2b4ef10da5e564b91ad65d5967e764b9e78682c2ac6636867d45836
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

date
Tue, 20 Feb 2024 13:18:41 GMT
x-content-type-options
nosniff
server
fife
etag
"veeb4"
vary
Origin
content-type
image/jpeg
access-control-expose-headers
Content-Length
cache-control
public, max-age=7776000, no-transform
content-disposition
inline;filename="att11.jpg"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
36741
x-xss-protection
0
expires
Mon, 20 May 2024 13:18:41 GMT
wiz-728.png
blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEib5eapjn7fwVmDl3xHk6iaum1lXMOq3U6inDDotvVSVnhQZxPRUS2NnBGoyGwwwgivbLaADhVfe58NIoqfxJUhCHkH01ZJc0s0ilnsJe41h2kYaFDdkqkXLaEWgpps2BK8zJmMZSC73JxFWYCL...
40 KB
40 KB
Image
General
Full URL
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEib5eapjn7fwVmDl3xHk6iaum1lXMOq3U6inDDotvVSVnhQZxPRUS2NnBGoyGwwwgivbLaADhVfe58NIoqfxJUhCHkH01ZJc0s0ilnsJe41h2kYaFDdkqkXLaEWgpps2BK8zJmMZSC73JxFWYCLJlI7qeVbDmoCPJF8r263Pa6CRV8hWWRYFzzB53to3gmC/s728-e365/wiz-728.png
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2404:6800:4004:823::2001 , Australia, ASN15169 (GOOGLE, US),
Reverse DNS
Software
fife /
Resource Hash
bbe63287c3c30656ab4f5d8820c13ba794c4c22ebe33b9189fd27ed89297d2c9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

date
Tue, 20 Feb 2024 13:18:41 GMT
x-content-type-options
nosniff
server
fife
etag
"vee99"
vary
Origin
content-type
image/png
access-control-expose-headers
Content-Length
cache-control
public, max-age=7776000, no-transform
content-disposition
inline;filename="wiz-728.png"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
40761
x-xss-protection
0
expires
Mon, 20 May 2024 13:18:41 GMT
backdoor.jpg
blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKwbubA33YjqagkIUAHniBBWyS0C_ikzPePxRUWzlDIDBC6EkoZgbbwcymh7bPScsLqn_SDnytHygd8OcV6AbEj8pRBhP4DEhGBuCpMMXPM8C2ddum7tW_9ZjwhRVAGPGbuBf8P4rmbYfkfj7q...
49 KB
50 KB
Image
General
Full URL
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKwbubA33YjqagkIUAHniBBWyS0C_ikzPePxRUWzlDIDBC6EkoZgbbwcymh7bPScsLqn_SDnytHygd8OcV6AbEj8pRBhP4DEhGBuCpMMXPM8C2ddum7tW_9ZjwhRVAGPGbuBf8P4rmbYfkfj7qwnEQpg9tD-Iil_pHdPEYhiqqF0Bo4sPvP8oVi-5TpRRv/s728-rw-e365/backdoor.jpg
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2404:6800:4004:823::2001 , Australia, ASN15169 (GOOGLE, US),
Reverse DNS
Software
fife /
Resource Hash
b88062fb4d6bbad06f9c2fdeeaca6d1ed618cc8d1cbf2924aa8f1c4598735145
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

date
Tue, 20 Feb 2024 13:18:41 GMT
x-content-type-options
nosniff
server
fife
etag
"va1f"
vary
Origin
content-type
image/webp
access-control-expose-headers
Content-Length
cache-control
public, max-age=7776000, no-transform
content-disposition
inline;filename="backdoor.webp"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
50660
x-xss-protection
0
expires
Mon, 20 May 2024 13:18:41 GMT
boundaries728.jpg
blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8jfOSH2bKOt2gBs66HZ2g8-Sa4GLfLVJj4v6n095wW7K5LxBTme0I4_WtuOxVN06o-2_Q9_HJguxYNEnyh8Lj71pveVGNVcdIoSR_eslblYptSfYyZKM-s8kRRBzoHyh1luk9Ts8f_2D3sEdO...
13 KB
13 KB
Image
General
Full URL
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8jfOSH2bKOt2gBs66HZ2g8-Sa4GLfLVJj4v6n095wW7K5LxBTme0I4_WtuOxVN06o-2_Q9_HJguxYNEnyh8Lj71pveVGNVcdIoSR_eslblYptSfYyZKM-s8kRRBzoHyh1luk9Ts8f_2D3sEdOd-0w3DGzFnrBvFTHdnvmchCiaJ886H6kSZG0DkfAncqF/s728-rw-e365/boundaries728.jpg
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2404:6800:4004:823::2001 , Australia, ASN15169 (GOOGLE, US),
Reverse DNS
Software
fife /
Resource Hash
8c72bbce942f4ea15dede06a81f91dc049e3e80b9bd7a6fbd2ed585e7c7f5d72
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

date
Tue, 20 Feb 2024 13:18:41 GMT
x-content-type-options
nosniff
server
fife
etag
"veef5"
vary
Origin
content-type
image/webp
access-control-expose-headers
Content-Length
cache-control
public, max-age=7776000, no-transform
content-disposition
inline;filename="boundaries728.webp"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
13198
x-xss-protection
0
expires
Mon, 20 May 2024 13:18:41 GMT
orange.jpg
blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJgzbaM_tG_ZyWFY0OVbLA1Ollu-hNelxQOIOPIXywoSLfW3daAQ8UA84XnOd1EM6RVqPSL65NEcyLGlVmKzJDhA4L4c553tqwF7NfBC2xotVvcac9-Yq-SW6rWpHgPcB1cCDBCqvr3nkuCJlX...
31 KB
32 KB
Image
General
Full URL
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJgzbaM_tG_ZyWFY0OVbLA1Ollu-hNelxQOIOPIXywoSLfW3daAQ8UA84XnOd1EM6RVqPSL65NEcyLGlVmKzJDhA4L4c553tqwF7NfBC2xotVvcac9-Yq-SW6rWpHgPcB1cCDBCqvr3nkuCJlXInYZu51e_yo4rJCJWz19nAz5u1f-pgpcR2T1KBdLNozV/s728-rw-e365/orange.jpg
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2404:6800:4004:823::2001 , Australia, ASN15169 (GOOGLE, US),
Reverse DNS
Software
fife /
Resource Hash
f1cb91c4383ab645108346c08ed278d83fdb1d2dbeef61c0749105a290328162
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

date
Tue, 20 Feb 2024 13:18:41 GMT
x-content-type-options
nosniff
server
fife
etag
"va1d"
vary
Origin
content-type
image/webp
access-control-expose-headers
Content-Length
cache-control
public, max-age=7776000, no-transform
content-disposition
inline;filename="orange.webp"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
32144
x-xss-protection
0
expires
Mon, 20 May 2024 13:18:41 GMT
vanta.jpg
blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFkerT829amXoMECHx6lfeURexYC1Ur37J9nvHOz1fk92x-_Fs2dD8v3DD-JIvSul98KdZSU8GBINzCJjI4-GAKje4Y-JfPGFMXUjUNHRDgm_Lld3WxPt0xSgrSf9TRuP66cNl2zv4ZhnbT6tm...
24 KB
24 KB
Image
General
Full URL
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFkerT829amXoMECHx6lfeURexYC1Ur37J9nvHOz1fk92x-_Fs2dD8v3DD-JIvSul98KdZSU8GBINzCJjI4-GAKje4Y-JfPGFMXUjUNHRDgm_Lld3WxPt0xSgrSf9TRuP66cNl2zv4ZhnbT6tm_IBSO3-9NUzZSznAcT9GUblHnPQ19DWEEBjIYSW2bXxr/s300-e365/vanta.jpg
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2404:6800:4004:823::2001 , Australia, ASN15169 (GOOGLE, US),
Reverse DNS
Software
fife /
Resource Hash
3221cfe4338abfbf598728a1ce924623892b41893cf0b86c9429ee369985d238
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

date
Tue, 20 Feb 2024 13:18:41 GMT
x-content-type-options
nosniff
server
fife
etag
"veeb6"
vary
Origin
content-type
image/jpeg
access-control-expose-headers
Content-Length
cache-control
public, max-age=7776000, no-transform
content-disposition
inline;filename="vanta.jpg"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
24254
x-xss-protection
0
expires
Mon, 20 May 2024 13:18:41 GMT
lock.jpg
blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgc2WSwZk5dsXN4T1vBqab5c9yHRw1GzmDyK9e7CvxOvvLD6AbUolGHoWoITdPghnQtju4YYBXn3yTVes0zUJWgu7oJ_scastCzcCv4_5YrC0BL1wB4eIgPFnKDgab7t-cMgEHYjESMOy7f1_vM...
3 KB
4 KB
Image
General
Full URL
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgc2WSwZk5dsXN4T1vBqab5c9yHRw1GzmDyK9e7CvxOvvLD6AbUolGHoWoITdPghnQtju4YYBXn3yTVes0zUJWgu7oJ_scastCzcCv4_5YrC0BL1wB4eIgPFnKDgab7t-cMgEHYjESMOy7f1_vMoBB5jiIxuLYbhtCr65HyiGZRQnR06teo1C7QZbv0b9o/w72-h72-p-k-no-nu/lock.jpg
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2404:6800:4004:823::2001 , Australia, ASN15169 (GOOGLE, US),
Reverse DNS
Software
fife /
Resource Hash
aa4a657e575c2551eab6feecdf32342f3414706bd273bf29d5b6ac94c8e39061
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

date
Tue, 20 Feb 2024 13:18:41 GMT
x-content-type-options
nosniff
server
fife
etag
"v1120"
vary
Origin
content-type
image/jpeg
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
content-disposition
inline;filename="lock.jpg"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
3528
x-xss-protection
0
expires
Wed, 21 Feb 2024 13:18:41 GMT
malware.jpg
blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKllLdGwxkb7LzAZiKO4GrXvBg-008qZ13823zKivTyCym0hrLz2pxFq5tqAVgGhyphenhyphenRmFwoDQfrA_agxTxIlyXR31KZuXZHUmuyq7yW76JmYY_QFW7ZjCzjQOXY3o0G63YfY62Ya5...
3 KB
3 KB
Image
General
Full URL
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKllLdGwxkb7LzAZiKO4GrXvBg-008qZ13823zKivTyCym0hrLz2pxFq5tqAVgGhyphenhyphenRmFwoDQfrA_agxTxIlyXR31KZuXZHUmuyq7yW76JmYY_QFW7ZjCzjQOXY3o0G63YfY62Ya5yx_F-SbbwEq7njMhd2o7Jedo3ZaRF-NZn5vUqpz9RPMo8afof4DJ89/w72-h72-p-k-no-nu/malware.jpg
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2404:6800:4004:823::2001 , Australia, ASN15169 (GOOGLE, US),
Reverse DNS
Software
fife /
Resource Hash
ae982f69f2849d789159ee7d78c539f228fcb6011195539eb143bfe8980029d5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

date
Tue, 20 Feb 2024 13:18:41 GMT
x-content-type-options
nosniff
server
fife
etag
"veefc"
vary
Origin
content-type
image/jpeg
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
content-disposition
inline;filename="malware.jpg"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
3054
x-xss-protection
0
expires
Wed, 21 Feb 2024 13:18:41 GMT
google.jpg
blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh59uBVhbm2zqj2CiMisNTZP1AUHlI0LJyu1o-H9K9veJZt3udPYrZTOASHoRD4WuHBK1J_tu3vjBT_x8Nt5HE10UW6p2ZdnoNY3sbXE49iSt1DsIwk4orugYaZliiD0H1YJ51_LLBt4IkawzBt...
2 KB
2 KB
Image
General
Full URL
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh59uBVhbm2zqj2CiMisNTZP1AUHlI0LJyu1o-H9K9veJZt3udPYrZTOASHoRD4WuHBK1J_tu3vjBT_x8Nt5HE10UW6p2ZdnoNY3sbXE49iSt1DsIwk4orugYaZliiD0H1YJ51_LLBt4IkawzBtKBkd_chBIVjnvUwMnt2QF0QnwVIwWxNxQ9TmbPtSf-EK/w72-h72-p-k-no-nu/google.jpg
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2404:6800:4004:823::2001 , Australia, ASN15169 (GOOGLE, US),
Reverse DNS
Software
fife /
Resource Hash
101b66e890cd20d08c858763bda38cd5336fd79e8f15be419125447f784058b6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

date
Tue, 20 Feb 2024 13:18:41 GMT
x-content-type-options
nosniff
server
fife
etag
"va5a"
vary
Origin
content-type
image/jpeg
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
content-disposition
inline;filename="google.jpg"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
1810
x-xss-protection
0
expires
Wed, 21 Feb 2024 13:18:41 GMT
akira-ransomware.jpg
blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSRb15AKqbDDxEVGaFm_qS9vAJq5V7CIjeOKL4hYoblxbETUyc3wSWqJp92-7Q0i_KqR2SpXiss3Z3nhuPqR7XfN4Sv6aPCaub5-UJDpt1Sf2M-Gjbp_UFhk99qf38GpzTEq8DX90nyx9ZSfqe...
5 KB
5 KB
Image
General
Full URL
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSRb15AKqbDDxEVGaFm_qS9vAJq5V7CIjeOKL4hYoblxbETUyc3wSWqJp92-7Q0i_KqR2SpXiss3Z3nhuPqR7XfN4Sv6aPCaub5-UJDpt1Sf2M-Gjbp_UFhk99qf38GpzTEq8DX90nyx9ZSfqejdXD0ytyjKZ7V73_8IRnhA8poFyBuzhphzGCMRzMA8rE/w72-h72-p-k-no-nu/akira-ransomware.jpg
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2404:6800:4004:823::2001 , Australia, ASN15169 (GOOGLE, US),
Reverse DNS
Software
fife /
Resource Hash
926f901a9066517f6f386fb2544592ecad923bea238e2a4854c2f747e899e779
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

date
Tue, 20 Feb 2024 13:18:41 GMT
x-content-type-options
nosniff
server
fife
etag
"va57"
vary
Origin
content-type
image/jpeg
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
content-disposition
inline;filename="akira-ransomware.jpg"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
4774
x-xss-protection
0
expires
Wed, 21 Feb 2024 13:18:41 GMT
email-hacking.jpg
blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv5SAH03ByPHtsexLk3p7YU4tQnOqLoEP6Kt217_WiK3fZE9cngB9OXfZB1HZhQz7ag8gm4VNWCQusKxkgv-cJg0PSw2O67OC0qH3pDqq5kscsH6UcovYK60F0KustYk8Y0jga8fkyMgWtftwJ...
3 KB
3 KB
Image
General
Full URL
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv5SAH03ByPHtsexLk3p7YU4tQnOqLoEP6Kt217_WiK3fZE9cngB9OXfZB1HZhQz7ag8gm4VNWCQusKxkgv-cJg0PSw2O67OC0qH3pDqq5kscsH6UcovYK60F0KustYk8Y0jga8fkyMgWtftwJJYCGVu4tSzBilZiSVvXZz1OT6nxgjYoLLc8w2a_-EqFr/w72-h72-p-k-no-nu/email-hacking.jpg
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2404:6800:4004:823::2001 , Australia, ASN15169 (GOOGLE, US),
Reverse DNS
Software
fife /
Resource Hash
2d2bb7d59c1169b63b501faeab02da09304493c4c3daeb6c1f7886b4783c2715
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://thehackernews.com/2024/02/ivanti-vulnerability-exploited-to.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36

Response headers

date
Tue, 20 Feb 2024 13:18:41 GMT
x-content-type-options
nosniff
server
fife
etag
"va37"
vary
Origin
content-type
image/jpeg
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
content-disposition
inline;filename="email-hacking.jpg"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
3147
x-xss-protection
0
expires
Wed, 21 Feb 2024 13:18:41 GMT

Verdicts & Comments Add Verdict or Comment

13 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| zarazData object| zaraz string| share_url string| share_title object| __cfQR object| dataLayer object| x boolean| __cfRLUnblockHandlers function| loadScriptAsync function| runAfterPageLoad undefined| texts undefined| randomIndex object| buttons

8 Cookies

Domain/Path Name / Value
.thehackernews.com/ Name: google-analytics_v4_yZRc__engagementDuration
Value: 0
.thehackernews.com/ Name: google-analytics_v4_yZRc__engagementStart
Value: 1708435120665
.thehackernews.com/ Name: google-analytics_v4_yZRc__counter
Value: 1
.thehackernews.com/ Name: google-analytics_v4_yZRc__ga4sid
Value: 390276954
.thehackernews.com/ Name: google-analytics_v4_yZRc__session_counter
Value: 1
.thehackernews.com/ Name: google-analytics_v4_yZRc__ga4
Value: 2fe0be4e-33d7-48c3-941a-514beb888a4d
.thehackernews.com/ Name: google-analytics_v4_yZRc___z_ga_audiences
Value: 2fe0be4e-33d7-48c3-941a-514beb888a4d
.thehackernews.com/ Name: google-analytics_v4_yZRc__let
Value: 1708435120665

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy upgrade-insecure-requests
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

blogger.googleusercontent.com
stats.g.doubleclick.net
thehackernews.com
www.google.com
2404:6800:4004:80f::2004
2404:6800:4004:823::2001
2404:6800:4008:c03::9a
2606:4700:20::681a:296
0b24469dd300f0a386392f40fec2945f8a9b885f559a168dca3d43f09050a9d5
0f0d757d0f4ac62f3f2dfb357eae1b5e57af2cd146dbb00b56b49d2147cead76
101b66e890cd20d08c858763bda38cd5336fd79e8f15be419125447f784058b6
2d2bb7d59c1169b63b501faeab02da09304493c4c3daeb6c1f7886b4783c2715
2de33ca2d2cfb7f437aa190ecdd4b3991ff2879604c0e24aaf02849ae1f360b3
3221cfe4338abfbf598728a1ce924623892b41893cf0b86c9429ee369985d238
701f948695b86b2cc030e69f09aa0ff60eb9c0980dabcc997c35c42993bae2fd
7091eec2853ee4c7c5cd70cb5a6e8920d8acd287bddbcb5d1b5692300dc8f0e3
744d86d7b2b4ef10da5e564b91ad65d5967e764b9e78682c2ac6636867d45836
7bc37c98295b08006e612be6c569f3cec05d794c9baa73e80c80c1a65c66432f
8c72bbce942f4ea15dede06a81f91dc049e3e80b9bd7a6fbd2ed585e7c7f5d72
8ce893c505f39dd4648a663903cc54acb53706282331c26552ed55ccef0c127f
926f901a9066517f6f386fb2544592ecad923bea238e2a4854c2f747e899e779
a71328300f380217ae0abf7f805052a10a0c196cb241eb97adf9b905e4a48c8a
aa4a657e575c2551eab6feecdf32342f3414706bd273bf29d5b6ac94c8e39061
ae982f69f2849d789159ee7d78c539f228fcb6011195539eb143bfe8980029d5
b88062fb4d6bbad06f9c2fdeeaca6d1ed618cc8d1cbf2924aa8f1c4598735145
bbe63287c3c30656ab4f5d8820c13ba794c4c22ebe33b9189fd27ed89297d2c9
c6a9d65e5bd6eb2447ea57e398e1d30f3c6e2d022ecf195933d161ffed964690
ccf00d1923b0131a10e0c6d26f95e5dee6ebf8621a27e83c5a2f68a2e0093142
dbf4fa73ce4f2bd113dde31b7f7eff7bfd3a1271f30ababad320f07033408f06
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e665cc707d8e4644e9aec1bca418d595f28050b970bbf473df7e9915d1cc9faa
f1cb91c4383ab645108346c08ed278d83fdb1d2dbeef61c0749105a290328162
f88754ecdaeedbf69845f3cb4015909beff31f92b173185c075ff8ab40ae3d02
fc00aaab93e93aacd116a8275ca491f5b97dc3468f29a3624113b82a287b1898
fed35af77c7998b274f7c2e65cc1cfa37bb2dd363d6bcd98546428ce134aa6bc