Submitted URL: http://links.ismgcorp.com/ljXSN000pUSTeI0d30k051Z
Effective URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_...
Submission: On February 20 via api from IT

Summary

This website contacted 32 IPs in 7 countries across 32 domains to perform 209 HTTP transactions. The main IP is 50.56.167.254, located in San Antonio, United States and belongs to RMH-14, US. The main domain is www.databreachtoday.com.
TLS certificate: Issued by Go Daddy Secure Certificate Authority... on August 5th 2019. Valid for: 2 years.
This is the only time www.databreachtoday.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 199.15.215.8 53580 (MARKETO)
30 50.56.167.254 33070 (RMH-14)
1 2a00:1450:400... 15169 (GOOGLE)
2 23.210.248.44 16625 (AKAMAI-AS)
81 23.210.249.12 16625 (AKAMAI-AS)
5 2a00:1450:400... 15169 (GOOGLE)
1 104.130.251.6 33070 (RMH-14)
1 2a00:1450:400... 15169 (GOOGLE)
2 95.101.176.176 16625 (AKAMAI-AS)
1 2a00:1450:400... 15169 (GOOGLE)
1 23.210.250.213 16625 (AKAMAI-AS)
1 151.101.12.134 54113 (FASTLY)
1 4 2a00:1450:400... 15169 (GOOGLE)
1 7 52.215.103.126 16509 (AMAZON-02)
1 2a02:26f0:f1:... 20940 (AKAMAI-ASN1)
1 6 104.20.4.43 13335 (CLOUDFLAR...)
5 2606:2800:134... 15133 (EDGECAST)
2 2a00:1450:400... 15169 (GOOGLE)
9 172.217.22.2 15169 (GOOGLE)
1 2 2a05:f500:11:... 14413 (LINKEDIN)
1 1 2a05:f500:11:... 14413 (LINKEDIN)
1 2a00:1450:400... 15169 (GOOGLE)
2 192.28.147.68 53580 (MARKETO)
14 2a00:1450:400... 15169 (GOOGLE)
5 2606:4700::68... 13335 (CLOUDFLAR...)
2 151.101.192.134 54113 (FASTLY)
13 2a00:1450:400... 15169 (GOOGLE)
4 2a00:1450:400... 15169 (GOOGLE)
1 34.206.149.41 14618 (AMAZON-AES)
1 1 23.45.237.36 20940 (AKAMAI-ASN1)
2 2 35.190.72.21 15169 (GOOGLE)
2 2 52.49.13.31 16509 (AMAZON-02)
2 2 52.19.221.77 16509 (AMAZON-02)
1 3.121.27.153 16509 (AMAZON-02)
5 2a00:1450:400... 15169 (GOOGLE)
1 2 66.155.71.25 13768 (COGECO-PEER1)
209 32
81    23.210.249.12 (Netherlands)
ASN16625 (AKAMAI-AS, US)
PTR: a23-210-249-12.deploy.static.akamaitechnologies.com
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
Apex Domain
Subdomains
Transfer
81 rackcdn.com
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
9 MB
30 databreachtoday.com
www.databreachtoday.com
462 KB
19 googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
329 KB
13 ampproject.org
cdn.ampproject.org
499 KB
10 doubleclick.net
securepubads.g.doubleclick.net
stats.g.doubleclick.net
101 KB
8 ml314.com
ml314.com
in.ml314.com
16 KB
6 comm100.com
chatserver.comm100.com
vue.comm100.com
chatserver3.comm100.com
249 KB
5 disquscdn.com
c.disquscdn.com
219 KB
5 google.com
adservice.google.com
www.google.com
171 B
5 twimg.com
pbs.twimg.com
12 KB
5 gstatic.com
fonts.gstatic.com
45 KB
4 google-analytics.com
www.google-analytics.com
18 KB
3 linkedin.com
px.ads.linkedin.com
www.linkedin.com
3 KB
3 disqus.com
bankinfosecurity.disqus.com
disqus.com
28 KB
2 crwdcntrl.net
sync.crwdcntrl.net
1 KB
2 adsrvr.org
match.adsrvr.org
930 B
2 rlcdn.com
idsync.rlcdn.com
846 B
2 mktoresp.com
051-zxi-237.mktoresp.com
606 B
2 marketo.net
munchkin.marketo.net
6 KB
2 ismgcorp.com
links.ismgcorp.com
worker.ismgcorp.com
1 KB
1 sitescout.com
pixel.sitescout.com
248 B
1 basis.net
pixel-a.basis.net
113 B
1 eyeota.net
ps.eyeota.net
344 B
1 bluekai.com
tags.bluekai.com
856 B
1 google.de
adservice.google.de
171 B
1 addthisedge.com
v1.addthisedge.com
207 B
1 bizographics.com
sjs.bizographics.com
2 KB
1 moatads.com
z.moatads.com
1 KB
1 googletagmanager.com
www.googletagmanager.com
20 KB
1 googletagservices.com
www.googletagservices.com
14 KB
1 addthis.com
s7.addthis.com
113 KB
1 googleapis.com
fonts.googleapis.com
1 KB
209 32
Domain Requested by
30 www.databreachtoday.com links.ismgcorp.com
www.databreachtoday.com
20 130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com www.databreachtoday.com
14 tpc.googlesyndication.com securepubads.g.doubleclick.net
www.databreachtoday.com
cdn.ampproject.org
tpc.googlesyndication.com
13 cdn.ampproject.org securepubads.g.doubleclick.net
13 dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com www.databreachtoday.com
12 0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com www.databreachtoday.com
10 75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com www.databreachtoday.com
9 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
www.databreachtoday.com
7 ml314.com 1 redirects www.databreachtoday.com
ml314.com
6 752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com www.databreachtoday.com
6 6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com www.databreachtoday.com
5 pagead2.googlesyndication.com www.databreachtoday.com
securepubads.g.doubleclick.net
5 c.disquscdn.com bankinfosecurity.disqus.com
5 pbs.twimg.com www.databreachtoday.com
5 fonts.gstatic.com www.databreachtoday.com
4 www.google.com www.databreachtoday.com
4 www.google-analytics.com 1 redirects www.databreachtoday.com
4 21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com www.databreachtoday.com
4 fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com www.databreachtoday.com
4 4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com www.databreachtoday.com
3 chatserver3.comm100.com vue.comm100.com
2 sync.crwdcntrl.net 2 redirects
2 match.adsrvr.org 2 redirects
2 idsync.rlcdn.com 2 redirects
2 disqus.com bankinfosecurity.disqus.com
2 051-zxi-237.mktoresp.com munchkin.marketo.net
2 px.ads.linkedin.com 1 redirects www.databreachtoday.com
2 vue.comm100.com www.databreachtoday.com
vue.comm100.com
2 munchkin.marketo.net www.databreachtoday.com
munchkin.marketo.net
2 f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com www.databreachtoday.com
1 pixel.sitescout.com
1 pixel-a.basis.net 1 redirects
1 ps.eyeota.net www.databreachtoday.com
1 tags.bluekai.com 1 redirects
1 in.ml314.com ml314.com
1 stats.g.doubleclick.net www.databreachtoday.com
1 www.linkedin.com 1 redirects
1 adservice.google.com www.googletagservices.com
1 adservice.google.de www.googletagservices.com
1 v1.addthisedge.com s7.addthis.com
1 chatserver.comm100.com 1 redirects
1 sjs.bizographics.com www.databreachtoday.com
1 bankinfosecurity.disqus.com www.databreachtoday.com
1 z.moatads.com s7.addthis.com
1 www.googletagmanager.com www.databreachtoday.com
1 www.googletagservices.com www.databreachtoday.com
1 worker.ismgcorp.com www.databreachtoday.com
1 s7.addthis.com www.databreachtoday.com
1 fonts.googleapis.com www.databreachtoday.com
1 links.ismgcorp.com
209 50
Subject Issuer Validity Valid
ismg.io
Go Daddy Secure Certificate Authority - G2
2019-08-05 -
2021-07-26
2 years crt.sh
*.storage.googleapis.com
GTS CA 1O1
2020-01-29 -
2020-04-22
3 months crt.sh
odc-prod-01.oracle.com
DigiCert SHA2 Secure Server CA
2019-10-10 -
2020-09-04
a year crt.sh
*.ssl.cf1.rackcdn.com
DigiCert SHA2 Secure Server CA
2019-03-20 -
2020-06-18
a year crt.sh
*.google.com
GTS CA 1O1
2020-01-29 -
2020-04-22
3 months crt.sh
worker.ismgcorp.com
Go Daddy Secure Certificate Authority - G2
2019-10-21 -
2020-04-13
6 months crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-01-29 -
2020-04-22
3 months crt.sh
*.marketo.net
DigiCert SHA2 Secure Server CA
2018-12-24 -
2020-03-24
a year crt.sh
*.google-analytics.com
GTS CA 1O1
2020-01-29 -
2020-04-22
3 months crt.sh
moatads.com
DigiCert SHA2 Secure Server CA
2020-01-17 -
2021-03-17
a year crt.sh
*.disqus.com
DigiCert SHA2 Secure Server CA
2018-03-28 -
2020-04-27
2 years crt.sh
*.ml314.com
Amazon
2020-02-17 -
2021-03-17
a year crt.sh
js.bizographics.com
DigiCert SHA2 Secure Server CA
2018-04-13 -
2020-04-17
2 years crt.sh
*.comm100.com
DigiCert SHA2 Secure Server CA
2020-02-12 -
2022-04-15
2 years crt.sh
*.twimg.com
DigiCert SHA2 High Assurance Server CA
2019-11-12 -
2020-11-18
a year crt.sh
px.ads.linkedin.com
DigiCert SHA2 Secure Server CA
2019-05-29 -
2021-06-29
2 years crt.sh
*.mktoresp.com
DigiCert SHA2 Secure Server CA
2020-01-17 -
2022-01-21
2 years crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2020-01-29 -
2020-04-22
3 months crt.sh
ssl565697.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2020-02-02 -
2020-08-10
6 months crt.sh
misc-sni.google.com
GTS CA 1O1
2020-01-29 -
2020-04-22
3 months crt.sh
www.google.com
GTS CA 1O1
2020-01-29 -
2020-04-22
3 months crt.sh
*.eyeota.net
Let's Encrypt Authority X3
2020-02-10 -
2020-05-10
3 months crt.sh
*.sitescout.com
RapidSSL RSA CA 2018
2020-01-15 -
2022-02-02
2 years crt.sh

This page contains 12 frames:

Primary Page: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Frame ID: 843DBCDF4115737443FDBA27E442A7B5
Requests: 165 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/012002112037430/amp4ads-v0.js
Frame ID: ED38827DFA668367F0FB288645D4B4D9
Requests: 7 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/012002112037430/amp4ads-v0.js
Frame ID: 18A5059F5D52B21A8F62EF6515038CB4
Requests: 7 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/012002112037430/amp4ads-v0.js
Frame ID: 66AA3EA3FAD6043F4B66E1D8B2507B37
Requests: 7 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/012002112037430/amp4ads-v0.js
Frame ID: 9F89F486D84E6065784420E226DEF254
Requests: 7 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/012002112037430/amp4ads-v0.js
Frame ID: B65A6F0DE211009DCA1A75F9DF762D6A
Requests: 7 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/012002112037430/amp4ads-v0.js
Frame ID: AB9AE7118F45F621DA2D369C52822AC8
Requests: 7 HTTP requests in this frame

Frame: https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2Fhmh-lawsuit-a-13736&t_d=Hacked%20Off%3A%20Patients%20Sue%20Ransom-Paying%20Hospital%20Group&t_t=Hacked%20Off%3A%20Patients%20Sue%20Ransom-Paying%20Hospital%20Group&s_o=default
Frame ID: B725C50E4D664563152804AC8BE7E704
Requests: 1 HTTP requests in this frame

Frame: https://c.disquscdn.com/next/embed/styles/realtime.af77184dec69e96e69aff958ae2bb738.css
Frame ID: CF495AF2D9E6A6DD0AC33C3D6AF79224
Requests: 1 HTTP requests in this frame

Frame: https://c.disquscdn.com/next/embed/styles/realtime.af77184dec69e96e69aff958ae2bb738.css
Frame ID: AF02497A642453AF460429267FC72860
Requests: 1 HTTP requests in this frame

Frame: https://vue.comm100.com/js/bundle.099e61e16efedea507ca37360f78f15f.js
Frame ID: 13C63ABB816F8832BBAB3B24D9F2E4A2
Requests: 4 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/206/runner.html
Frame ID: 7CC78845775E2AC3A299568C1A197AB6
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://links.ismgcorp.com/ljXSN000pUSTeI0d30k051Z Page URL
  2. https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_E... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • script /\/tiny_?mce(?:\.min)?\.js/i

Overall confidence: 100%
Detected patterns
  • script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • script /addthis\.com\/js\//i

Overall confidence: 100%
Detected patterns
  • script /googletagservices\.com\/tag\/js\/gpt(?:_mobile)?\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Overall confidence: 100%
Detected patterns
  • script /w\.sharethis\.com\//i

Overall confidence: 100%
Detected patterns
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
  • script /jquery-ui.*\.js/i
  • html /(?:<link [^>]*href="[^"]*prettyPhoto(?:\.min)?\.css|<a [^>]*rel="prettyPhoto)/i

Overall confidence: 100%
Detected patterns
  • script /jquery-ui.*\.js/i

Overall confidence: 100%
Detected patterns
  • html /(?:<link [^>]*href="[^"]*prettyPhoto(?:\.min)?\.css|<a [^>]*rel="prettyPhoto)/i

Page Statistics

209
Requests

99 %
HTTPS

44 %
IPv6

32
Domains

50
Subdomains

32
IPs

7
Countries

11502 kB
Transfer

18582 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://links.ismgcorp.com/ljXSN000pUSTeI0d30k051Z Page URL
  2. https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 123
  • https://chatserver.comm100.com/livechat.ashx?siteId=92035 HTTP 301
  • https://vue.comm100.com/livechat.ashx?siteId=92035
Request Chain 136
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749&url=https%3A%2F%2Fwww.databreachtoday.com%2Fhacked-off-patients-sue-ransom-paying-hospital-group-a-13736%3Frf%3D2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736%26mkt_tok%3DeyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9&time=1582186597341 HTTP 302
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D749%26url%3Dhttps%253A%252F%252Fwww.databreachtoday.com%252Fhacked-off-patients-sue-ransom-paying-hospital-group-a-13736%253Frf%253D2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736%2526mkt_tok%253DeyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9%26time%3D1582186597341%26liSync%3Dtrue HTTP 302
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749&url=https%3A%2F%2Fwww.databreachtoday.com%2Fhacked-off-patients-sue-ransom-paying-hospital-group-a-13736%3Frf%3D2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736%26mkt_tok%3DeyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9&time=1582186597341&liSync=true
Request Chain 138
  • https://www.google-analytics.com/r/collect?v=1&_v=j81&a=1503417176&t=pageview&_s=1&dl=https%3A%2F%2Fwww.databreachtoday.com%2Fhacked-off-patients-sue-ransom-paying-hospital-group-a-13736%3Frf%3D2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736%26mkt_tok%3DeyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9&dr=http%3A%2F%2Flinks.ismgcorp.com%2FljXSN000pUSTeI0d30k051Z&ul=en-us&de=UTF-8&dt=Hacked%20Off%3A%20Patients%20Sue%20Ransom-Paying%20Hospital%20Group&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=IEDAAEAB~&jid=604140437&gjid=480235538&cid=42732745.1582186597&tid=UA-212197-36&_gid=1999976102.1582186597&_r=1&z=13733292 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-212197-36&cid=42732745.1582186597&jid=604140437&_gid=1999976102.1582186597&gjid=480235538&_v=j81&z=13733292
Request Chain 195
  • https://tags.bluekai.com/site/20486?limit=0&id=3608314821413437496&redir=https://ml314.com/csync.ashx%3Ffp=$_BK_UUID%26person_id=3608314821413437496%26eid=50056 HTTP 302
  • https://ml314.com/csync.ashx?fp=rkLeBx9999OQWW8K&person_id=3608314821413437496&eid=50056
Request Chain 196
  • https://idsync.rlcdn.com/395886.gif?partner_uid=3608314821413437496 HTTP 307
  • https://idsync.rlcdn.com/1000.gif?memo=CO6UGBIeChoIARCuXxoTMzYwODMxNDgyMTQxMzQzNzQ5NhAAGg0I5oC58gUSBQjoBxAAQgBKAA HTTP 307
  • https://ml314.com/csync.ashx?fp=e3eec1cee059ea288258cd88947ae7f3ff707e636d07d469b3bfad46a36d6d19f4cb09cee1a4f8eb&person_id=3608314821413437496&eid=50082
Request Chain 197
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=d0tro1j&ttd_tpi=1 HTTP 302
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=d0tro1j&ttd_tpi=1 HTTP 302
  • https://ml314.com/utsync.ashx?eid=53819&et=0&fp=3d4f7bb0-1836-4903-aa07-77b4694508f4 HTTP 302
  • https://ml314.com/csync.ashx?fp=3d4f7bb0-1836-4903-aa07-77b4694508f4&person_id=3608314821413437496&eid=53819
Request Chain 198
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3608314821413437496 HTTP 302
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3608314821413437496 HTTP 302
  • https://ml314.com/csync.ashx?fp=394d68cbb2b5f374ec2a2305fd43a134&eid=50146&person_id=3608314821413437496
Request Chain 207
  • https://pixel-a.basis.net/iap/64ead273d1f41aa7 HTTP 301
  • https://pixel.sitescout.com/iap/64ead273d1f41aa7

209 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Cookie set ljXSN000pUSTeI0d30k051Z
links.ismgcorp.com/
697 B
984 B
Document
General
Full URL
http://links.ismgcorp.com/ljXSN000pUSTeI0d30k051Z
Protocol
HTTP/1.1
Server
199.15.215.8 , United States, ASN53580 (MARKETO, US),
Reverse DNS
Software
Apache /
Resource Hash
fafff2357bd67696758573eb090f3bc4a0f2e49e8e1072612346030597cdb3f0
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Host
links.ismgcorp.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 20 Feb 2020 08:16:34 GMT
Server
Apache
Cache-Control
private, no-cache, no-store, max-age=0
Connection
close
X-Content-Type-Options
nosniff
Vary
Accept-Encoding
Content-Encoding
gzip
Transfer-Encoding
chunked
Content-Type
text/html
Set-Cookie
BIGipServersj_mailtracking_http=!b2GuU8zzmoczn4bInuzRy4alk/3R/pQs/CB1PdoWMuK0lmPTbixDjAGeNIz/Z9qxyO8sfURr4IidTKY=; path=/; Httponly
Primary Request Cookie set hacked-off-patients-sue-ransom-paying-hospital-group-a-13736
www.databreachtoday.com/
372 KB
54 KB
Document
General
Full URL
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Requested by
Host: links.ismgcorp.com
URL: http://links.ismgcorp.com/ljXSN000pUSTeI0d30k051Z
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
b7a2febf3b8d4be6cc260a26ebe42217977735e2a799e0e33d108746534f5d35

Request headers

Host
www.databreachtoday.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Referer
http://links.ismgcorp.com/ljXSN000pUSTeI0d30k051Z
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document
Referer
http://links.ismgcorp.com/ljXSN000pUSTeI0d30k051Z

Response headers

Date
Thu, 20 Feb 2020 08:16:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Content-Encoding
gzip
Vary
Accept-Encoding
Set-Cookie
PHPSESSID=9r7gea4mpma0crqn1brcd21613; expires=Thu, 20-Feb-2020 12:16:35 GMT; Max-Age=14400; path=/ _advert=false; expires=Fri, 21-Feb-2020 08:16:35 GMT; Max-Age=86400; path=/
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
jquery-ui.min.css
www.databreachtoday.com/css-responsive/vendor/
25 KB
5 KB
Stylesheet
General
Full URL
https://www.databreachtoday.com/css-responsive/vendor/jquery-ui.min.css
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
fc54c09a7a71615ec35a22ed20afa4034588986ed88c3fc184b2c0bc637c33fb

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Thu, 20 Feb 2020 08:16:35 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
4896
mediaelementplayer-updated.css
www.databreachtoday.com/css-responsive/vendor/
11 KB
3 KB
Stylesheet
General
Full URL
https://www.databreachtoday.com/css-responsive/vendor/mediaelementplayer-updated.css
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
1a0bbdba57f90a60fef89419fc940d8eae55c5b0d12ecbadde2beaef32ab2d90

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Thu, 20 Feb 2020 08:16:35 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
2622
css
fonts.googleapis.com/
25 KB
1 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
d3fb385aad2757e720c0e49ca0b807172ff255ad2dc2bf4b1998e632297800a9
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
x-xss-protection
0
last-modified
Thu, 20 Feb 2020 08:16:35 GMT
server
ESF
date
Thu, 20 Feb 2020 08:16:35 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Thu, 20 Feb 2020 08:16:35 GMT
main.css
www.databreachtoday.com/css-responsive/
231 KB
42 KB
Stylesheet
General
Full URL
https://www.databreachtoday.com/css-responsive/main.css
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
3d6601f455d1861307f2e2266ac347f8dffe2e109e153f228024becd258b2784

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Thu, 20 Feb 2020 08:16:35 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
42778
prettyPhoto.css
www.databreachtoday.com/css-responsive/
21 KB
3 KB
Stylesheet
General
Full URL
https://www.databreachtoday.com/css-responsive/prettyPhoto.css
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
7d0bada0d9b66aa1ca8eb906bb9736ca96e3859e9c05287a8f0cf5ffa9ff8760

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Thu, 20 Feb 2020 08:16:35 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
2840
bis-hdr.desktop.r2.css
www.databreachtoday.com/css-responsive/vendor/
8 KB
2 KB
Stylesheet
General
Full URL
https://www.databreachtoday.com/css-responsive/vendor/bis-hdr.desktop.r2.css
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
eefc2533a82b69fab9b19b9e316bb606e70d17d61b57f9ea841b26c59624bc20

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Thu, 20 Feb 2020 08:16:35 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
1956
bis-hdr.mobile.r2.css
www.databreachtoday.com/css-responsive/vendor/
9 KB
2 KB
Stylesheet
General
Full URL
https://www.databreachtoday.com/css-responsive/vendor/bis-hdr.mobile.r2.css
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
77c36fad51d04a56e55d1d454094c4312c3b11443f42b456c3f5082d66696be1

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Thu, 20 Feb 2020 08:16:35 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
2133
font-awesome.min.css
www.databreachtoday.com/css-responsive/vendor/
22 KB
5 KB
Stylesheet
General
Full URL
https://www.databreachtoday.com/css-responsive/vendor/font-awesome.min.css
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
93f466f6b1a81c848140e51c839a5372034ab22182601e86dd86947ad3a7fe94

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Thu, 20 Feb 2020 08:16:35 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
5049
jquery.min.js
www.databreachtoday.com/javascripts-responsive/vendor/
91 KB
33 KB
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/vendor/jquery.min.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
eccabf5cc7613433c3ddc71ff34391ae850d304d3aceb5666868c4947134f3b5

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 20 Feb 2020 08:16:35 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
33094
modernizr.j
www.databreachtoday.com/javascripts-responsive/vendor/
11 KB
11 KB
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/vendor/modernizr.j
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
7e1e8c883fd8fb0cafdc1636bb195f28a7d8cfb3bf865ab40af470634d2f62ba

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Wed, 19 Feb 2020 19:59:48 GMT
Server
Apache
ETag
"2b4c-59ef33b07d037"
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
11084
bootstrap.min.js
www.databreachtoday.com/javascripts-responsive/vendor/
35 KB
9 KB
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/vendor/bootstrap.min.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
3fede2d0c0a8c93b0c5d0ab0c38289a5743bb88720255b8298c520d2e3d90939

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
9328
jquery.validate.min.js
www.databreachtoday.com/javascripts-responsive/vendor/
21 KB
7 KB
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/vendor/jquery.validate.min.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
e51831d751ef667b1f703a47bb05802b681e6a30816f5cce0d56c3552a4eaa31

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
6689
mediaelement-and-player-updated.min.js
www.databreachtoday.com/javascripts-responsive/vendor/
154 KB
38 KB
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/vendor/mediaelement-and-player-updated.min.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
4e7304371ef9bcaea396e8928a9647f8306c296b9195c8763848d70c7f6f1390

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
38476
tinymce.min.js
www.databreachtoday.com/javascripts-responsive/vendor/
295 KB
101 KB
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/vendor/tinymce.min.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
247d04c4d14c60a79c16245a74a792a662f9e7adf784d68edd4520a35ec90251

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Transfer-Encoding
chunked
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
jquery.validate.bootstrap.popover.js
www.databreachtoday.com/javascripts-responsive/vendor/
2 KB
1 KB
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/vendor/jquery.validate.bootstrap.popover.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
04d304d7ee49ac157f146382a46f02a666279bd7f29074f50e863b88f2affae9

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
926
jquery.placeholder.js
www.databreachtoday.com/javascripts-responsive/vendor/
2 KB
1 KB
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/vendor/jquery.placeholder.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
256a489beea4a14eca458f6e5436758f1fcb8dd34034d3c36dd21b22a5841f3b

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
922
jquery-ui.min.js
www.databreachtoday.com/javascripts-responsive/vendor/
222 KB
60 KB
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/vendor/jquery-ui.min.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
78cf63898c91ce3b95e37bc53e07adba5c2ee705ff28c2dd1dd784173c264ad1

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
61345
crypt_des.js
www.databreachtoday.com/javascripts-responsive/vendor/
9 KB
3 KB
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/vendor/crypt_des.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
aed1d71b7280c09f06dc1f8e87795f9d89f7a1a8ab1af32ff8c92037ddeed6ee

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
2857
addthis_widget.js
s7.addthis.com/js/250/
349 KB
113 KB
Script
General
Full URL
https://s7.addthis.com/js/250/addthis_widget.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.248.44 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-248-44.deploy.static.akamaitechnologies.com
Software
nginx/1.15.8 /
Resource Hash
ab8ceea757a634f5ce5a9ed6f6b4bcdd555869b385d315854e16914a2f5a3bc7
Security Headers
Name Value
Strict-Transport-Security max-age=15724800; includeSubDomains

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

strict-transport-security
max-age=15724800; includeSubDomains
content-encoding
gzip
last-modified
Tue, 21 Jan 2020 20:57:37 GMT
server
nginx/1.15.8
etag
"5e2765c1-57446"
vary
Accept-Encoding
x-distribution
99
content-type
application/javascript
status
200
cache-control
public, max-age=600
date
Thu, 20 Feb 2020 08:16:35 GMT
x-host
s7.addthis.com
content-length
114924
headerlogo-dbt.png
www.databreachtoday.com/images-responsive/logos/
6 KB
7 KB
Image
General
Full URL
https://www.databreachtoday.com/images-responsive/logos/headerlogo-dbt.png
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
11f8708cbc1a8d4570bdaafc5838a0fa583962e093540b5474546250da667ae9

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
6453
webinar-ot-bridge-too-far-showcase_image-6-a-13701.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
162 KB
162 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/webinar-ot-bridge-too-far-showcase_image-6-a-13701.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
9feeed66685386bf0fd5264e20aeeb4d7dfaf280f067c48cdc1739a64e13b7a7

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:35 GMT
Last-Modified
Fri, 07 Feb 2020 18:21:42 GMT
ETag
c283a7d925018b0eb584dfc8dbaf3a17
Content-Type
image/jpeg
X-Timestamp
1581099701.85037
Cache-Control
public, max-age=50484
Content-Length
165745
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx439920ab5b1e47f19ba15-005e4db41ddfw1
Expires
Thu, 20 Feb 2020 22:17:59 GMT
phishing-campaigns-tied-to-coronavirus-persist-showcase_image-3-a-13741.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
283 KB
283 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/phishing-campaigns-tied-to-coronavirus-persist-showcase_image-3-a-13741.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
cb117090da3ea740ff352b500a2d2231d60a9502ebb986faabe133bfd1270fdc

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Wed, 19 Feb 2020 18:45:14 GMT
ETag
5bfd3a6b84badca2880347a21b35c82e
Content-Type
image/jpeg
X-Timestamp
1582137913.60110
Cache-Control
public, max-age=41501
Content-Length
289555
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txdadc522cdff74a5c936fc-005e4d90ebdfw1
Expires
Thu, 20 Feb 2020 19:48:17 GMT
ransomware-attack-hit-us-natural-gas-facility-showcase_image-7-a-13740.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
227 KB
228 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/ransomware-attack-hit-us-natural-gas-facility-showcase_image-7-a-13740.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
79a340e7778f8323bbf7f0d07a6d7adf6f738eda803bf0a53de39164382421bf

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Wed, 19 Feb 2020 16:25:14 GMT
ETag
73f1df8d0bb6bbc40e58bc1bcb40b5cc
Content-Type
image/jpeg
X-Timestamp
1582129513.32611
Cache-Control
public, max-age=32504
Content-Length
232939
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx09824b5b50b44477b00bc-005e4d6de7dfw1
Expires
Thu, 20 Feb 2020 17:18:20 GMT
amazons-ring-to-enforce-mandatory-two-step-codes-showcase_image-9-a-13738.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
39 KB
39 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/amazons-ring-to-enforce-mandatory-two-step-codes-showcase_image-9-a-13738.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e358caef2496f4f5df052aaf353542eae1dd07e7987a5a85a72da9b572d75d7b

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Wed, 19 Feb 2020 04:02:22 GMT
ETag
2034e4bdd999851ef3fba23b1a9cc66d
Content-Type
image/jpeg
X-Timestamp
1582084941.93675
Cache-Control
public, max-age=22665
Content-Length
39476
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txd72f1652f83445dfb20bf-005e4d4745dfw1
Expires
Thu, 20 Feb 2020 14:34:21 GMT
coronavirus-update-tips-for-travel-showcase_image-6-i-4600.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
53 KB
53 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/coronavirus-update-tips-for-travel-showcase_image-6-i-4600.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
961cae7c129fa75c5f3e4cb08d5007460a9c9e8cbe3cce04dc2fa41f4a0c8554

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Wed, 19 Feb 2020 11:07:18 GMT
ETag
4b2630bcfaa3212660ee443bc2210d94
Content-Type
image/jpeg
X-Timestamp
1582110437.32525
Cache-Control
public, max-age=18248
Content-Length
53895
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx827ce4aa5d9d47acaa8ec-005e4d3637dfw1
Expires
Thu, 20 Feb 2020 13:20:44 GMT
rsa-conference-2020-preview-showcase_image-4-i-4598.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
26 KB
26 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/rsa-conference-2020-preview-showcase_image-4-i-4598.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d3c6febc8b0f5b833e19397194a0f67ffe0a91ab71760c3f429afeb86d56d232

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Tue, 18 Feb 2020 18:30:03 GMT
ETag
b1c429cee60766e7b698c0c0e8f43be4
Content-Type
image/jpeg
X-Timestamp
1582050602.12751
Cache-Control
public, max-age=30103
Content-Length
26199
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx2f61453cd2ab4a52b0e62-005e4c3407dfw1
Expires
Thu, 20 Feb 2020 16:38:19 GMT
analysis-indictments-in-equifax-hack-showcase_image-8-i-4595.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
114 KB
114 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-indictments-in-equifax-hack-showcase_image-8-i-4595.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
0deebc03acc3e4e139d5ed72d91bf97a3333c32394bce4e7caebc1a5aa4aba1c

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Thu, 13 Feb 2020 20:13:34 GMT
ETag
45908923504d0c37876e7491f91cc4c7
Content-Type
image/jpeg
X-Timestamp
1581624813.93450
Cache-Control
public, max-age=39467
Content-Length
116594
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txc3ae1c8749204b188f88e-005e465c7cdfw1
Expires
Thu, 20 Feb 2020 19:14:23 GMT
nist-privacy-framework-implementation-challenges-showcase_image-1-i-4594.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
50 KB
50 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/nist-privacy-framework-implementation-challenges-showcase_image-1-i-4594.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3e60a2ac4e68d4afdfbb288e6507d0bfa6491483602a90720591f48c78829943

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Tue, 11 Feb 2020 10:39:33 GMT
ETag
fd32e2a6d4fef67bcabf4733176fca07
Content-Type
image/jpeg
X-Timestamp
1581417572.94483
Cache-Control
public, max-age=40901
Content-Length
50895
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx598ca3b07d3648f08dbbb-005e42afb3dfw1
Expires
Thu, 20 Feb 2020 19:38:17 GMT
preview-12-hot-keynote-sessions-at-rsa-conference-2020-showcase_image-4-p-2874.jpg
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/
257 KB
257 KB
Image
General
Full URL
https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/preview-12-hot-keynote-sessions-at-rsa-conference-2020-showcase_image-4-p-2874.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
cfc80d9df97c96944da6b56435b603165a589a32775e039542c1b407c26f6922

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Wed, 19 Feb 2020 17:40:26 GMT
ETag
ec0b7f6590e0095667699f049a96683f
Content-Type
image/jpeg
X-Timestamp
1582134025.40840
Cache-Control
public, max-age=43777
Content-Length
263110
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txb29f122d0b494b338eef4-005e4d99e5dfw1
Expires
Thu, 20 Feb 2020 20:26:13 GMT
ibm-exits-rsa-conference-2020-over-coronavirus-worries-showcase_image-9-p-2873.jpg
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/
187 KB
188 KB
Image
General
Full URL
https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/ibm-exits-rsa-conference-2020-over-coronavirus-worries-showcase_image-9-p-2873.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6839015171c1f662cb2a4d1e5fab9995d80cbbd63d3c8ad3531c487e12b36491

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Tue, 18 Feb 2020 17:00:01 GMT
ETag
fbe1f6b0bf81ee331492c4f82e5a4e25
Content-Type
image/jpeg
X-Timestamp
1582045200.65345
Cache-Control
public, max-age=23483
Content-Length
191700
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx72b66fc6912c4c5ca1350-005e4c1924dfw1
Expires
Thu, 20 Feb 2020 14:47:59 GMT
rsa-conference-2020-ismg-spotlights-security-leaders-showcase_image-10-p-2872.jpg
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/
92 KB
93 KB
Image
General
Full URL
https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/rsa-conference-2020-ismg-spotlights-security-leaders-showcase_image-10-p-2872.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b62866c1f92cf92fa69bd0ac04b43683d71902d52e7561ecb24dca9250e99e80

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Fri, 14 Feb 2020 20:44:32 GMT
ETag
b74f28d43a7e91a811b2fda3be376085
Content-Type
image/jpeg
X-Timestamp
1581713071.86668
Cache-Control
public, max-age=82340
Content-Length
94357
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txdf27db3f491d45328664f-005e470a85dfw1
Expires
Fri, 21 Feb 2020 07:08:56 GMT
learn-from-how-others-get-breached-equifax-edition-showcase_image-2-p-2870.jpg
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/
126 KB
126 KB
Image
General
Full URL
https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/learn-from-how-others-get-breached-equifax-edition-showcase_image-2-p-2870.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
8478daa33fdd1d92b6482c033fb3d12d59801d8d7e20f45f82b85f1429f197b3

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Wed, 12 Feb 2020 14:43:20 GMT
ETag
c34933edf9231b637706803daa5e7d5f
Content-Type
image/jpeg
X-Timestamp
1581518599.81125
Cache-Control
public, max-age=54256
Content-Length
128571
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txbf29d1bf0a2a42ad9045b-005e441066dfw1
Expires
Thu, 20 Feb 2020 23:20:52 GMT
ingredients-incident-response-playbook-showcase_image-6-a-13552.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
235 KB
235 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/ingredients-incident-response-playbook-showcase_image-6-a-13552.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6de854b6aa18423832207ade53631260e0a758a3331907ebae09c3b410462526

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Thu, 26 Dec 2019 05:43:11 GMT
ETag
b6e344d99e6803204ba9ae468e173e03
Content-Type
image/jpeg
X-Timestamp
1577338990.22618
Cache-Control
public, max-age=80582
Content-Length
240483
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx8e3949bddf3a43bbbe447-005e04e694dfw1
Expires
Fri, 21 Feb 2020 06:39:38 GMT
making-developers-responsible-for-vulnerabilities-showcase_image-6-a-13553.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
184 KB
185 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/making-developers-responsible-for-vulnerabilities-showcase_image-6-a-13553.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
5fb18a20cdc9e6bf1d73b4157687373715b0b9bea35cb807f928fde9b4361233

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Thu, 26 Dec 2019 05:50:30 GMT
ETag
572527e2a7683b275668da0ad3243c70
Content-Type
image/jpeg
X-Timestamp
1577339429.33642
Cache-Control
public, max-age=80480
Content-Length
188575
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txa696a9cb815e41edbd920-005e04fd5fdfw1
Expires
Fri, 21 Feb 2020 06:37:56 GMT
managing-third-party-risks-showcase_image-7-a-13555.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
218 KB
218 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/managing-third-party-risks-showcase_image-7-a-13555.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d3a56a926967f9778c7395c44c2bd718498b0844203b9bfb69e81ad9ca8e5003

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Thu, 26 Dec 2019 06:06:47 GMT
ETag
c317b1dc3e4ce9d906640dd0bc320593
Content-Type
image/jpeg
X-Timestamp
1577340406.11777
Cache-Control
public, max-age=19683
Content-Length
222953
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txbc80f8fa81e043d998f38-005e04ff32dfw1
Expires
Thu, 20 Feb 2020 13:44:39 GMT
cybercrime-support-victory-for-midmarket-showcase_image-7-a-13543.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
87 KB
88 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/cybercrime-support-victory-for-midmarket-showcase_image-7-a-13543.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b6623fd99a5b7eab92b6b4f8d7f5c54daa9fa3367caf64cb075194bda30b914f

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Mon, 23 Dec 2019 18:23:03 GMT
ETag
806df442a3bf7ce64f74e73e4eeead5e
Content-Type
image/jpeg
X-Timestamp
1577125382.33447
Cache-Control
public, max-age=79338
Content-Length
89457
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txdf949db5c7a046e1a1b0d-005e022b0ddfw1
Expires
Fri, 21 Feb 2020 06:18:54 GMT
live-webinar-how-to-address-fraud-through-use-risk-analytics-showcase_image-10-w-2320.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
250 KB
251 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-how-to-address-fraud-through-use-risk-analytics-showcase_image-10-w-2320.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a5c9fc6b5f1bbbf19c75a4afc7d98e8ad9ab9dcb6af824bcb2644fcfe1e44d9e

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Wed, 19 Feb 2020 20:06:43 GMT
ETag
807663d8691b512979bb65d27cdfa8a9
Content-Type
image/jpeg
X-Timestamp
1582142802.39128
Cache-Control
public, max-age=44190
Content-Length
256419
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx48faf42f74784db4a5dd8-005e4d9b82dfw1
Expires
Thu, 20 Feb 2020 20:33:06 GMT
live-webinar-taking-your-third-party-security-program-to-next-level-showcase_image-10-w-2315.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
64 KB
65 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-taking-your-third-party-security-program-to-next-level-showcase_image-10-w-2315.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
be10d55828c80f354156af1909585d82d1efe09347f4d4040edba03316534379

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Tue, 18 Feb 2020 21:27:48 GMT
ETag
05c0245b83a7a752bf5e4616ca6c6b1f
Content-Type
image/jpeg
X-Timestamp
1582061267.20876
Cache-Control
public, max-age=42811
Content-Length
65841
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txbe500decda9e4b64acce1-005e4c62d7dfw1
Expires
Thu, 20 Feb 2020 20:10:07 GMT
live-webinar-how-msps-fight-ransomware-grow-revenue-cyber-protection-services-showcase_image-3-w-2308.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
55 KB
55 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-how-msps-fight-ransomware-grow-revenue-cyber-protection-services-showcase_image-3-w-2308.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
56528cada6f7ebdedbbcd782dd1a23a03f6d67d2792378b4efcb150b6372af18

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Thu, 13 Feb 2020 16:36:46 GMT
ETag
d03d9de9713742bf4e27fa97102b9ee0
Content-Type
image/jpeg
X-Timestamp
1581611805.69222
Cache-Control
public, max-age=78480
Content-Length
55878
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txd4f87f3d7581449f86a5a-005e45b232dfw1
Expires
Fri, 21 Feb 2020 06:04:36 GMT
live-webinar-risk-exchanges-key-to-vendor-risk-management-efficiency-showcase_image-6-w-2303.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
80 KB
80 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-risk-exchanges-key-to-vendor-risk-management-efficiency-showcase_image-6-w-2303.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
0aff4785c538f64ca061c5c326ab00913bcaaceea4f968c943e7dd82a3e03428

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Tue, 04 Feb 2020 20:31:16 GMT
ETag
8095084f44f6d650066671aa49dd29fb
Content-Type
image/jpeg
X-Timestamp
1580848275.82523
Cache-Control
public, max-age=17406
Content-Length
82030
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx6649cc600a4e4146b6d4c-005e3c2bdbdfw1
Expires
Thu, 20 Feb 2020 13:06:42 GMT
live-webinar-application-security-for-modern-dev-showcase_image-8-w-2295.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
41 KB
41 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-application-security-for-modern-dev-showcase_image-8-w-2295.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
fd96d16fd55d190e0b56cee8981aebd5db293752c565097d24470b7244a3718b

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Mon, 20 Jan 2020 17:29:14 GMT
ETag
96b06518e2e2a4f7c1eb517ebb69d51a
Content-Type
image/jpeg
X-Timestamp
1579541353.23944
Cache-Control
public, max-age=23993
Content-Length
41710
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx49190547817d4b84a23d4-005e2a106ddfw1
Expires
Thu, 20 Feb 2020 14:56:29 GMT
live-webinar-connected-intelligence-future-fraud-defense-showcase_image-3-w-2302.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
28 KB
29 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-connected-intelligence-future-fraud-defense-showcase_image-3-w-2302.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
8fe5d319b0ee5a46cd2f4cba3ac8da572dec747aa805997e216b3bd46c8f3e60

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Mon, 27 Jan 2020 17:41:41 GMT
ETag
b64f73cfd691a077d56f9a5b626c2482
Content-Type
image/jpeg
X-Timestamp
1580146900.25362
Cache-Control
public, max-age=60349
Content-Length
29075
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx452afcd5b8024a72af7a2-005e31b07cdfw1
Expires
Fri, 21 Feb 2020 01:02:25 GMT
mike-daugherty-largeImage-1-a-1575.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
50 KB
50 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/mike-daugherty-largeImage-1-a-1575.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
5a30e5e0ea6f99a5ab9ab859720631dac90b27275fc2ade3b009c8a3fb9bfe7a

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Thu, 31 Mar 2016 14:53:47 GMT
ETag
122c0645feb1efb32c67cf1d3a1decd6
Content-Type
image/jpeg
X-Timestamp
1459436026.89043
Cache-Control
public, max-age=55771
Content-Length
51079
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx740bc202f25240e3aa9e4-005e43b612dfw1
Expires
Thu, 20 Feb 2020 23:46:07 GMT
avivah-litan-largeImage-7-a-531.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
103 KB
103 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/avivah-litan-largeImage-7-a-531.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
f92d2ae45734ea5702a735694d4c25ba2a7d96f8de7d2b65c404f7695c2f9aca

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Tue, 16 Jan 2018 17:52:31 GMT
ETag
d1a9360a4c04f63b66f57b6c7a18f020
Content-Type
image/jpeg
X-Timestamp
1516125150.59148
Cache-Control
public, max-age=363
Content-Length
105118
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx34d3f3731f3b4465bd32c-005e3fe94cdfw1
Expires
Thu, 20 Feb 2020 08:22:39 GMT
david-szabo-largeImage-2-a-1278.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
34 KB
34 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/david-szabo-largeImage-2-a-1278.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
67168c3691081db5404eb568922b95c404176a9f02510d7c5bcff58ecc9c4aa4

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Wed, 27 May 2015 20:56:17 GMT
ETag
8c87142a963cae67b8974509e342eb04
Content-Type
image/jpeg
X-Timestamp
1432760176.94260
Cache-Control
public, max-age=29704
Content-Length
34436
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx3c37d27af1c34031b8418-005dacff31dfw1
Expires
Thu, 20 Feb 2020 16:31:40 GMT
elayne-starkey-largeImage-a-697.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
153 KB
153 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/elayne-starkey-largeImage-a-697.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
1778aa41c49b2fc664a99eaa4cdcec43732e55aaa3278e0cffd0658e724acb5a

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Tue, 29 Oct 2013 16:29:46 GMT
ETag
64f11b0e028c21d945400a650f66bfd9
Content-Type
image/jpeg
X-Timestamp
1383064185.67645
Cache-Control
public, max-age=74618
Content-Length
156260
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txcc97976879264e49949ae-005e458814dfw1
Expires
Fri, 21 Feb 2020 05:00:14 GMT
finding-access-solution-for-your-business-logo-7-w-5378.JPG
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
93 KB
94 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/finding-access-solution-for-your-business-logo-7-w-5378.JPG
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
0bd0200abd824d3ee72468b2d6e9080b55188fe58da9ba9de9176ae0a3d6f5d6

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Wed, 10 Jul 2019 20:10:33 GMT
ETag
4c7fdedfc50152975dc7182aaee63db4
Content-Type
image/jpeg
X-Timestamp
1562789432.21050
Cache-Control
public, max-age=53704
Content-Length
95567
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx245de0c738924f8ab8135-005e3b2a42dfw1
Expires
Thu, 20 Feb 2020 23:11:40 GMT
smbs-guide-to-modern-identity-logo-2-w-5844.JPG
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
74 KB
74 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/smbs-guide-to-modern-identity-logo-2-w-5844.JPG
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
ae1910fd0ebd3a3278258560121a4a61db5a58e9cfd7b8ac0cc190a2381479b1

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Mon, 17 Feb 2020 16:56:44 GMT
ETag
750d8e0fc087475e0fd3feca8ec96ae9
Content-Type
image/jpeg
X-Timestamp
1581958603.03670
Cache-Control
public, max-age=15014
Content-Length
75616
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx4aed9fd798934f5cb3694-005e4ac97adfw1
Expires
Thu, 20 Feb 2020 12:26:50 GMT
identity-101-for-smbs-logo-5-w-5845.JPG
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
94 KB
94 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/identity-101-for-smbs-logo-5-w-5845.JPG
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
9f4d34fd9fab02c769b948258255acdd3db631c92dddf0eb3a58c875f64c8abf

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Mon, 17 Feb 2020 17:13:56 GMT
ETag
4154ffcfd5b6e4ed6fb0e185b28fb54c
Content-Type
image/jpeg
X-Timestamp
1581959635.09000
Cache-Control
public, max-age=52270
Content-Length
96141
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx2983677af97a43c394663-005e4dbb66dfw1
Expires
Thu, 20 Feb 2020 22:47:46 GMT
guide-to-multifactor-authentication-logo-6-w-5380.JPG
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
76 KB
77 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/guide-to-multifactor-authentication-logo-6-w-5380.JPG
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7851f3be3522ae84b3514c818ed685a978367e4db2e5af90035aae73dded9f50

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Wed, 10 Jul 2019 20:22:15 GMT
ETag
7470a6f142e1a77d6b6610f655147ca8
Content-Type
image/jpeg
X-Timestamp
1562790134.26892
Cache-Control
public, max-age=63701
Content-Length
77952
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txb69f9323be304826a77b0-005e3b2a42dfw1
Expires
Fri, 21 Feb 2020 01:58:17 GMT
combatting-cybercrime-pdf-9-h-103.jpg
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/
358 KB
358 KB
Image
General
Full URL
https://fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/combatting-cybercrime-pdf-9-h-103.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7ff5b98c09ec9d2af43d4108160ea0455f91f415f83031cc79fbe24a3a765bb8

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Tue, 26 Nov 2019 19:37:47 GMT
ETag
11a3adb400c0ff282a505428b1d7be73
Content-Type
image/jpeg
X-Timestamp
1574797066.57975
Cache-Control
public, max-age=23473
Content-Length
366322
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx091764f894ab4dd9b45d7-005ddd7f92dfw1
Expires
Thu, 20 Feb 2020 14:47:49 GMT
top-canadian-cyber-threats-expected-in-2020-logo-9-h-102.jpg
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/
76 KB
77 KB
Image
General
Full URL
https://fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/top-canadian-cyber-threats-expected-in-2020-logo-9-h-102.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
eb9ec684a7198fded61e248eaff2d28d0c9f8a15dfee8d9afff66aa6ff200461

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Mon, 28 Oct 2019 13:57:45 GMT
ETag
69913c61181f1fc9d730d6c8298e55c4
Content-Type
image/jpeg
X-Timestamp
1572271064.63410
Cache-Control
public, max-age=29710
Content-Length
78320
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txf13a36244bb14850840ed-005db6f49bdfw1
Expires
Thu, 20 Feb 2020 16:31:46 GMT
leveraging-new-technologies-in-fraud-investigations-logo-7-h-101.jpg
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/
197 KB
198 KB
Image
General
Full URL
https://fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/leveraging-new-technologies-in-fraud-investigations-logo-7-h-101.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c70242480ad0a0ecc7c305d659f1fdb3a9cb1eb480927b46f8bd62d33ed0f8b2

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Tue, 15 Oct 2019 14:06:53 GMT
ETag
e3e068e355cdbfaa15e88b627d7ebc55
Content-Type
image/jpeg
X-Timestamp
1571148412.42493
Cache-Control
public, max-age=26537
Content-Length
202154
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx5c084b83eec44371abb2c-005da5d8dadfw1
Expires
Thu, 20 Feb 2020 15:38:53 GMT
collaboration-avoiding-operational-conflicts-taking-on-new-roles-logo-10-h-100.jpg
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/
87 KB
88 KB
Image
General
Full URL
https://fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/collaboration-avoiding-operational-conflicts-taking-on-new-roles-logo-10-h-100.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4c57a77761f2639985b760e69c5bbaffceb6100559dcf3296d3cc96ea6a0d305

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Wed, 02 Oct 2019 13:41:41 GMT
ETag
36c70127fa172aa8ce8cd235fddf4c97
Content-Type
image/jpeg
X-Timestamp
1570023700.81183
Cache-Control
public, max-age=37139
Content-Length
89481
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txbe1cc1828822497ebb759-005d94a9f7dfw1
Expires
Thu, 20 Feb 2020 18:35:35 GMT
2020-faces-fraud-survey-showcase_image-4-s-75.jpg
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/
82 KB
83 KB
Image
General
Full URL
https://21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/2020-faces-fraud-survey-showcase_image-4-s-75.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3d7510063e1b2e52048eb4de8e364e2d5516dcb3dfa3b30feab3e4c10d785726

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Thu, 21 Nov 2019 17:08:18 GMT
ETag
6435f83ec3a957ed676e16f2c26353cf
Content-Type
image/jpeg
X-Timestamp
1574356097.60397
Cache-Control
public, max-age=31176
Content-Length
84215
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txea1db6093401455abaac7-005dd6c91edfw1
Expires
Thu, 20 Feb 2020 16:56:12 GMT
digital-account-opening-security-study-showcase_image-5-s-74.jpg
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/
55 KB
55 KB
Image
General
Full URL
https://21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/digital-account-opening-security-study-showcase_image-5-s-74.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
015655f766994aff6aece9b79181a951d0364e27ef1d34275633e9c8aa906273

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Tue, 08 Oct 2019 15:53:23 GMT
ETag
00187fd51a6d1c6812a4691cd6507155
Content-Type
image/jpeg
X-Timestamp
1570550002.14407
Cache-Control
public, max-age=26880
Content-Length
56240
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txc870a64eddfb408c9e853-005da786b2dfw1
Expires
Thu, 20 Feb 2020 15:44:36 GMT
state-todays-app-security-showcase_image-6-s-76.jpg
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/
94 KB
94 KB
Image
General
Full URL
https://21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/state-todays-app-security-showcase_image-6-s-76.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
07f1864f676b80cef760836490eed2ed047b77a99fcc64e81f9d02986e6457bc

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Wed, 30 Oct 2019 21:07:05 GMT
ETag
1b69aac5850bf9a34703d01221b13651
Content-Type
image/jpeg
X-Timestamp
1572469624.30720
Cache-Control
public, max-age=72038
Content-Length
96031
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx4bd865c5b39048ab8a52a-005dc9a250dfw1
Expires
Fri, 21 Feb 2020 04:17:14 GMT
social-media-mobile-chat-collaboration-apps-survey-showcase_image-4-s-73.jpg
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/
63 KB
63 KB
Image
General
Full URL
https://21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/social-media-mobile-chat-collaboration-apps-survey-showcase_image-4-s-73.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4d66d6610ef7d70ac3e3e948d4833481073ecff83f492bdd19dd052b01d22bd6

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Thu, 21 Feb 2019 16:31:05 GMT
ETag
a060f8d0ca96dac8c570777c56aa6168
Content-Type
image/jpeg
X-Timestamp
1550766664.21837
Cache-Control
public, max-age=30276
Content-Length
64191
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx8cf5d9d94f664946821be-005c6f1a43dfw1
Expires
Thu, 20 Feb 2020 16:41:12 GMT
top-10-data-breach-influencers-showcase_image-2-a-8798.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
52 KB
53 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/top-10-data-breach-influencers-showcase_image-2-a-8798.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
cdedc2c99e5c35e35baa5bba15349f699ad8a849a71d0fe48bbfa4982f68ece5

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Fri, 15 Jan 2016 20:00:06 GMT
ETag
4a0fedb93b2aaad07c4fac27182588c0
Content-Type
image/jpeg
X-Timestamp
1452888005.28308
Cache-Control
public, max-age=23383
Content-Length
53534
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txa26a93c4afa24f4faaa02-0059da743ddfw1
Expires
Thu, 20 Feb 2020 14:46:19 GMT
top-10-influencers-in-government-infosec-showcase_image-7-a-8771.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
51 KB
52 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/top-10-influencers-in-government-infosec-showcase_image-7-a-8771.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
50e2744b11e9d912e71f7a7ecb6ed7bf0eb7c3e29b4de5e0639e79cf5d6835be

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Thu, 07 Jan 2016 15:36:22 GMT
ETag
b4bbe16cfaf8e2abe68aef9a20d34e29
Content-Type
image/jpeg
X-Timestamp
1452180981.46535
Cache-Control
public, max-age=65206
Content-Length
52483
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txae5c4d5a1929474587bcd-005a7e67bfdfw1
Expires
Fri, 21 Feb 2020 02:23:22 GMT
update-top-5-health-data-breaches-imageFile-8-a-7877.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
10 KB
10 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/update-top-5-health-data-breaches-imageFile-8-a-7877.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
441b44d1c8b0181d6502d5a94c3c27e8fa28c79dcaeefd1264bd3a8fe0616c60

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Thu, 05 Feb 2015 20:00:34 GMT
ETag
4fae4989cc5bb5ce45458e826b5134bb
Content-Type
image/jpeg
X-Timestamp
1423166433.76800
Cache-Control
public, max-age=74445
Content-Length
10211
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx5a0939b4514d44ac96f6d-005a9a0d54dfw1
Expires
Fri, 21 Feb 2020 04:57:21 GMT
infographic-payment-card-breach-lifecycle-imageFile-6-a-7812.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
13 KB
13 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/infographic-payment-card-breach-lifecycle-imageFile-6-a-7812.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3f076961a147d13e72263c5e22c312b276d23f7970465f87801cf8b0fb7d5de9

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Mon, 19 Jan 2015 21:19:02 GMT
ETag
997d7dd8d8abb923aea4d81ae500bb7c
Content-Type
image/jpeg
X-Timestamp
1421702341.62158
Cache-Control
public, max-age=66668
Content-Length
12854
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx430ffb3cb27f4e8bbddd6-005a990074dfw1
Expires
Fri, 21 Feb 2020 02:47:44 GMT
2020-fraud-summit-new-york-showcase_image-2-e-297.jpg
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/
81 KB
81 KB
Image
General
Full URL
https://752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/2020-fraud-summit-new-york-showcase_image-2-e-297.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
471d1b98d4dcda9bc6bafb244adf0e6a3f85c62dd219e0bc3d47256dd3c852d7

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Fri, 27 Sep 2019 20:18:25 GMT
ETag
e867c4b9925ec56a280f44919afe0d19
Content-Type
image/jpeg
X-Timestamp
1569615504.17856
Cache-Control
public, max-age=23536
Content-Length
82476
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx53a563c562b040be8d048-005dae800edfw1
Expires
Thu, 20 Feb 2020 14:48:53 GMT
2020-legal-compliance-summit-new-york-showcase_image-8-e-307.jpg
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/
81 KB
81 KB
Image
General
Full URL
https://752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/2020-legal-compliance-summit-new-york-showcase_image-8-e-307.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
471d1b98d4dcda9bc6bafb244adf0e6a3f85c62dd219e0bc3d47256dd3c852d7

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Fri, 22 Nov 2019 15:14:18 GMT
ETag
e867c4b9925ec56a280f44919afe0d19
Content-Type
image/jpeg
X-Timestamp
1574435657.34206
Cache-Control
public, max-age=47735
Content-Length
82476
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx6bcd158ead2240489f70a-005deab82fdfw1
Expires
Thu, 20 Feb 2020 21:32:12 GMT
cybersecurity-fraud-summit-chicago-showcase_image-5-e-298.jpg
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/
71 KB
71 KB
Image
General
Full URL
https://752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/cybersecurity-fraud-summit-chicago-showcase_image-5-e-298.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
f2e985539ac8a7c0fd8aec7d15494e8e56e5d16bbb58f4170eb773c5a5f32d58

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Fri, 27 Sep 2019 20:30:17 GMT
ETag
b4fd29a2fb7c17308d1ffaca8157f320
Content-Type
image/jpeg
X-Timestamp
1569616216.50427
Cache-Control
public, max-age=26486
Content-Length
72247
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txefef417bc1a44cc695dc9-005dc30201dfw1
Expires
Thu, 20 Feb 2020 15:38:03 GMT
2020-cybersecurity-fraud-summit-seattle-showcase_image-3-e-300.jpg
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/
111 KB
111 KB
Image
General
Full URL
https://752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/2020-cybersecurity-fraud-summit-seattle-showcase_image-3-e-300.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e631af6a9f1f8dfdd15b7441060b55d97bf2ee943cbdeaf455bac9ccd2a8b79c

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Fri, 27 Sep 2019 20:36:56 GMT
ETag
e71d3217af393f4d62cf9d0352bfbb4f
Content-Type
image/jpeg
X-Timestamp
1569616615.67236
Cache-Control
public, max-age=23341
Content-Length
113752
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txddd9a07e5840460dbcc67-005de5f560dfw1
Expires
Thu, 20 Feb 2020 14:45:38 GMT
2020-cybersecurity-summit-bengaluru-showcase_image-10-e-299.jpg
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/
56 KB
56 KB
Image
General
Full URL
https://752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/2020-cybersecurity-summit-bengaluru-showcase_image-10-e-299.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b5e9d7b83ee59fd4831ec4b6b4bb387abeaa6be304bb4071a7c09869c30569ff

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Fri, 27 Sep 2019 20:33:43 GMT
ETag
d7f1bf15d961ffe53e9c3a17b193b9d1
Content-Type
image/jpeg
X-Timestamp
1569616422.26815
Cache-Control
public, max-age=21650
Content-Length
57204
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx5a15ff519e3d40c1970bf-005dd627dbdfw1
Expires
Thu, 20 Feb 2020 14:17:27 GMT
2020-healthcare-security-summit-new-york-showcase_image-7-e-301.jpg
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/
81 KB
81 KB
Image
General
Full URL
https://752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/2020-healthcare-security-summit-new-york-showcase_image-7-e-301.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
471d1b98d4dcda9bc6bafb244adf0e6a3f85c62dd219e0bc3d47256dd3c852d7

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Fri, 27 Sep 2019 20:39:21 GMT
ETag
e867c4b9925ec56a280f44919afe0d19
Content-Type
image/jpeg
X-Timestamp
1569616760.64682
Cache-Control
public, max-age=52116
Content-Length
82476
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx7e8528d183b24132927e2-005dd8041edfw1
Expires
Thu, 20 Feb 2020 22:45:13 GMT
best-practices-for-implementing-comprehensive-identity-governance-solution-showcase_image-7-w-2126.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
158 KB
158 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/best-practices-for-implementing-comprehensive-identity-governance-solution-showcase_image-7-w-2126.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
9cfda57bf5032c33579ba5213ea3f6f04ae76eddf8169ccc03b65dad46387700

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Wed, 21 Aug 2019 16:07:31 GMT
ETag
ac5ec7485b98a4e425694526cac66c60
Content-Type
image/jpeg
X-Timestamp
1566403650.23177
Cache-Control
public, max-age=20205
Content-Length
161648
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx14bc1baa79fc46d3892d5-005dd85410dfw1
Expires
Thu, 20 Feb 2020 13:53:22 GMT
zero-trust-approach-for-healthcare-showcase_image-4-w-2071.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
135 KB
136 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/zero-trust-approach-for-healthcare-showcase_image-4-w-2071.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3c766722210633878a01a1266168f93abd804eb1d5b90539146ed55870822f1d

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Fri, 28 Jun 2019 20:21:33 GMT
ETag
dd5032aff4d05ed19b21dbe830b01316
Content-Type
image/jpeg
X-Timestamp
1561753292.90767
Cache-Control
public, max-age=30990
Content-Length
138422
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx8d12335559c949e286f17-005dd85774dfw1
Expires
Thu, 20 Feb 2020 16:53:07 GMT
reducing-risk-now-showcase_image-7-w-2052.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
134 KB
134 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/reducing-risk-now-showcase_image-7-w-2052.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
971f0c03a1e63271a19b7de81d084c6acf81e7506dae8b31a0c6587c6ddf6a34

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Fri, 28 Jun 2019 20:15:01 GMT
ETag
79f8120d6bfab756d31e5f38dbdd523c
Content-Type
image/jpeg
X-Timestamp
1561752900.06505
Cache-Control
public, max-age=63749
Content-Length
136753
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txd5ef3a7e94304cc688be4-005dd85773dfw1
Expires
Fri, 21 Feb 2020 01:59:06 GMT
cybersecurity-plan-for-2020-us-election-unveiled-showcase_image-7-a-13732.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
215 KB
215 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/cybersecurity-plan-for-2020-us-election-unveiled-showcase_image-7-a-13732.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
5b89da38e32418773ffa4d857ceca5e10f76762b9a97c2afb1187aa281218f6b

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Mon, 17 Feb 2020 19:09:40 GMT
ETag
dc2bbb801565688344b197550d7ab229
Content-Type
image/jpeg
X-Timestamp
1581966579.99382
Cache-Control
public, max-age=26501
Content-Length
219828
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx9e89d00419bd48258a986-005e4ae895dfw1
Expires
Thu, 20 Feb 2020 15:38:18 GMT
rsa-2020-show-must-go-on-showcase_image-4-a-13719.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
191 KB
192 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/rsa-2020-show-must-go-on-showcase_image-4-a-13719.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
95736640d1297becbfbcf72f6fab41822675f47d28a71f3ff6409ef04f4737ea

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Thu, 13 Feb 2020 19:19:12 GMT
ETag
199ed234cdb71d4f40a73b72603276f6
Content-Type
image/jpeg
X-Timestamp
1581621551.20395
Cache-Control
public, max-age=71839
Content-Length
195901
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txb576bbf872b34d58a454e-005e45a4bedfw1
Expires
Fri, 21 Feb 2020 04:13:56 GMT
infosec-europe-2019-compendium-imageFile-2-a-12739.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
89 KB
89 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/infosec-europe-2019-compendium-imageFile-2-a-12739.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4546d13ea9bae9935dcd23f61d215a528120a53479bf51e372de3420029ed535

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Fri, 05 Jul 2019 20:13:34 GMT
ETag
f9dab7917669551bb50361c2dcd43aa7
Content-Type
image/jpeg
X-Timestamp
1562357613.59432
Cache-Control
public, max-age=12091
Content-Length
91187
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx9a65f7a711cd41d185e31-005d1fb074dfw1
Expires
Thu, 20 Feb 2020 11:38:08 GMT
improving-iot-risk-management-showcase_image-10-a-12689.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
60 KB
61 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/improving-iot-risk-management-showcase_image-10-a-12689.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6ec9288103b5919c36e28909faf04364cdf19cf7687e234663d0d9daab65a3c0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Fri, 28 Jun 2019 14:04:32 GMT
ETag
7f5fdd9cf37f980ea13c12c231815e13
Content-Type
image/jpeg
X-Timestamp
1561730671.53151
Cache-Control
public, max-age=15735
Content-Length
61807
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx9cb7ab9427404656ad526-005d16294edfw1
Expires
Thu, 20 Feb 2020 12:38:52 GMT
gdpr-where-do-we-go-from-here-showcase_image-1-a-12681.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
62 KB
62 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/gdpr-where-do-we-go-from-here-showcase_image-1-a-12681.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
8bc7f122cae9e9efd75cd58076d06fb057d8f50abf07ffc1716e17d87682b9cf

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Tue, 25 Jun 2019 19:30:48 GMT
ETag
bba47bed092092a1c82b09a86a3a0e40
Content-Type
image/jpeg
X-Timestamp
1561491047.60933
Cache-Control
public, max-age=63715
Content-Length
63007
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txcda89b20c2cf487a8c903-005d1279e2dfw1
Expires
Fri, 21 Feb 2020 01:58:32 GMT
reinventing-application-security-showcase_image-10-a-12671.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
53 KB
53 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/reinventing-application-security-showcase_image-10-a-12671.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4179815331b1b050e45da1ccf1d1a8cb50904e1cbb92228b32d55d545d4aaf7c

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Tue, 25 Jun 2019 19:54:35 GMT
ETag
89521d60b07d7e85acabbf0301821f45
Content-Type
image/jpeg
X-Timestamp
1561492474.52472
Cache-Control
public, max-age=63673
Content-Length
54026
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx2cea77591d1f484b913f2-005d127e7fdfw1
Expires
Fri, 21 Feb 2020 01:57:50 GMT
hmh-lawsuit-showcase_image-8-a-13736.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
51 KB
51 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/hmh-lawsuit-showcase_image-8-a-13736.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
f81dcc8c29d2959b820fdd4c22a63103ce109968050c0f2e0839f59e58599ad1

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Tue, 18 Feb 2020 20:02:35 GMT
ETag
2e8dc4634d643276d1980a7c0315f3e3
Content-Type
image/jpeg
X-Timestamp
1582056154.12094
Cache-Control
public, max-age=47298
Content-Length
52315
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx96db9417c15141139d040-005e4c4cfcdfw1
Expires
Thu, 20 Feb 2020 21:24:54 GMT
marianne-kolbasuk-mcgee-largeImage-2-a-626.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
30 KB
30 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/marianne-kolbasuk-mcgee-largeImage-2-a-626.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
2426276025c24059804a410ec583ce9edbed6198f93e2175881d0d8e01e57b65

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Wed, 18 Jun 2014 21:27:53 GMT
ETag
a9437e99a47eaf4bc46bdbfac6124cf1
Content-Type
image/jpeg
X-Timestamp
1403126872.57507
Cache-Control
public, max-age=42838
Content-Length
30756
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txd58ba369fe4d408eb0762-005e4b2e7cdfw1
Expires
Thu, 20 Feb 2020 20:10:35 GMT
preparing-for-3-d-secure-next-generation-showcase_image-2-i-4052.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
45 KB
46 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/preparing-for-3-d-secure-next-generation-showcase_image-2-i-4052.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3dba5ccc14501c1f18b91c5a4b8667486df51bcd607f264411ffb10a09e913f3

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Thu, 19 Jul 2018 20:36:23 GMT
ETag
06a767e4c9eed1b5f06fd62489b7bc2e
Content-Type
image/jpeg
X-Timestamp
1532032582.03129
Cache-Control
public, max-age=34373
Content-Length
46585
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txb88af51f8e2e4159920c2-005e3b25c8dfw1
Expires
Thu, 20 Feb 2020 17:49:30 GMT
maintaining-continuous-compliance-gdpr-logo-7-w-5367.PNG
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
123 KB
124 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/maintaining-continuous-compliance-gdpr-logo-7-w-5367.PNG
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
1a987206ec0029dbc1a7c56105930942832a540061deaead045fe3c87f750adb

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Wed, 03 Jul 2019 14:49:35 GMT
ETag
5064387d02a7c3377bb7c398103779a5
Content-Type
image/png
X-Timestamp
1562165374.37788
Cache-Control
public, max-age=75089
Content-Length
126387
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txed13e9cdab68468298f14-005e375d38dfw1
Expires
Fri, 21 Feb 2020 05:08:06 GMT
security-as-catalyst-for-digital-transformation-showcase_image-9-i-4388.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
36 KB
37 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-as-catalyst-for-digital-transformation-showcase_image-9-i-4388.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7bf3a8954b552ff989533004ebf31d50dfe41cf2f9cc1fe795dca7598fc623ac

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Wed, 17 Jul 2019 18:11:28 GMT
ETag
d7efcbbbec894bc553ce8ef08e5aed97
Content-Type
image/jpeg
X-Timestamp
1563387087.04296
Cache-Control
public, max-age=43884
Content-Length
37100
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx720ba5f518484cd796b1b-005e372998dfw1
Expires
Thu, 20 Feb 2020 20:28:01 GMT
respond-to-business-risks-in-real-time-integrated-risk-management-logo-4-w-5808.JPG
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
59 KB
59 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/respond-to-business-risks-in-real-time-integrated-risk-management-logo-4-w-5808.JPG
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3df60c2277edb5d2ba52f348e5b2c5569dfb42d942460ac14129004821dd0f78

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Thu, 30 Jan 2020 23:05:47 GMT
ETag
128d5da8c470973d5754a5fa76da1dac
Content-Type
image/jpeg
X-Timestamp
1580425546.15983
Cache-Control
public, max-age=75082
Content-Length
60278
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txb90218d8c97f483a9fccd-005e42d896dfw1
Expires
Fri, 21 Feb 2020 05:07:59 GMT
gartner-2019-magic-quadrant-for-integrated-risk-management-logo-3-w-5809.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
126 KB
126 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/gartner-2019-magic-quadrant-for-integrated-risk-management-logo-3-w-5809.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3da4481b904bd7980cdd3d141c5fa92b05fcf7ba5049b91a15c146872359d28e

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Wed, 05 Feb 2020 17:45:05 GMT
ETag
12126951846829fc5767aab091d9d0f2
Content-Type
image/jpeg
X-Timestamp
1580924704.06195
Cache-Control
public, max-age=69093
Content-Length
128870
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txb86b4ba9ee4e4efab1920-005e42e127dfw1
Expires
Fri, 21 Feb 2020 03:28:10 GMT
now-on-now-how-servicenow-has-transformed-its-own-grc-processes-logo-8-w-5807.JPG
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
106 KB
107 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/now-on-now-how-servicenow-has-transformed-its-own-grc-processes-logo-8-w-5807.JPG
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c62f227e118cef1a00c16c8d04dce3e94e445d5e9f6df63f776d428bcafe91a3

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Thu, 30 Jan 2020 23:01:26 GMT
ETag
6a68677d4352ea223c4e634d81929aa4
Content-Type
image/jpeg
X-Timestamp
1580425285.92854
Cache-Control
public, max-age=75074
Content-Length
108868
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx1a2b3bb4507545e19265e-005e42d896dfw1
Expires
Fri, 21 Feb 2020 05:07:51 GMT
live-webinar-your-ultimate-guide-to-phishing-mitigation-showcase_image-9-w-2277.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
63 KB
64 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-your-ultimate-guide-to-phishing-mitigation-showcase_image-9-w-2277.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c30980da6c6f2ec76fdbd29d27519f28daa566818bb50f5df4172e3e84740a64

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Sun, 29 Dec 2019 17:16:39 GMT
ETag
9afaf67a7fa74145beaa3bb9ad8a43b0
Content-Type
image/jpeg
X-Timestamp
1577639798.03195
Cache-Control
public, max-age=61633
Content-Length
64787
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txaa0ad764c3ce45e6bd6d7-005e0a27eddfw1
Expires
Fri, 21 Feb 2020 01:23:50 GMT
how-c-level-leaders-contribute-to-business-driven-security-posture-pdf-6-w-4516.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
370 KB
371 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/how-c-level-leaders-contribute-to-business-driven-security-posture-pdf-6-w-4516.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6f5c46a10c39810a0841017ac4c7a467fe5ef4e8951cb0d9ee7d6b50e1c8c42c

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Fri, 20 Jul 2018 14:14:12 GMT
ETag
31588b06b485cdb3ed272ff960c04d26
Content-Type
image/jpeg
X-Timestamp
1532096051.60357
Cache-Control
public, max-age=17890
Content-Length
379246
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx6af4dc5eb391451d88a6d-005e3b3f5fdfw1
Expires
Thu, 20 Feb 2020 13:14:47 GMT
magic-quadrant-for-access-management-logo-3-w-5630.PNG
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
113 KB
114 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/magic-quadrant-for-access-management-logo-3-w-5630.PNG
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
971e5da960fe52ec41b1c47883c19f0d92c9acb5d298551fc4a07a1314487507

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Fri, 11 Oct 2019 16:17:05 GMT
ETag
d8ce57ba3bd4b990d248343ad6f4e74e
Content-Type
image/png
X-Timestamp
1570810624.74657
Cache-Control
public, max-age=52110
Content-Length
116150
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx972f1b973de846e88c914-005e39edc1dfw1
Expires
Thu, 20 Feb 2020 22:45:07 GMT
cisos-terrible-horrible-no-good-very-bad-day-logo-9-w-5722.JPG
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
168 KB
169 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/cisos-terrible-horrible-no-good-very-bad-day-logo-9-w-5722.JPG
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a4961993d50d7fbf2d3f2d5f2ad68604778e811031889fde129dcfd15a393c25

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Fri, 06 Dec 2019 16:17:25 GMT
ETag
417929f01ceca48a96d226a51edededd
Content-Type
image/jpeg
X-Timestamp
1575649044.31693
Cache-Control
public, max-age=12687
Content-Length
172351
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx90fa10eddb06427890858-005e381b26dfw1
Expires
Thu, 20 Feb 2020 11:48:03 GMT
how-to-defend-your-attack-surface-logo-10-w-5836.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
117 KB
117 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/how-to-defend-your-attack-surface-logo-10-w-5836.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4001377450edf2d572b0007edac625e9ae85cb67fb2d9b932ce231acf5fd0049

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Wed, 12 Feb 2020 22:01:34 GMT
ETag
c36124e08766341d7841d830df2e5a4f
Content-Type
image/jpeg
X-Timestamp
1581544893.17234
Cache-Control
public, max-age=14638
Content-Length
119539
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx922fb8f62db0458b8ca4a-005e4485f3dfw1
Expires
Thu, 20 Feb 2020 12:20:34 GMT
cyber-threats-create-urgency-for-energy-sector-logo-8-w-5749.JPG
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
172 KB
173 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/cyber-threats-create-urgency-for-energy-sector-logo-8-w-5749.JPG
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4c6f79e9d6648dd3f0c2984b000725d09c8dedac32c29af92c46118aaf2d2845

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Mon, 30 Dec 2019 15:00:13 GMT
ETag
85d425fd63b95a7b1920bde166c2f084
Content-Type
image/jpeg
X-Timestamp
1577718012.01439
Cache-Control
public, max-age=52258
Content-Length
176366
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx91b74c2dff4147e8bb6d2-005e3006aedfw1
Expires
Thu, 20 Feb 2020 22:47:34 GMT
canadian-government-breaches-exposed-citizens-data-report-showcase_image-8-a-13739.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
358 KB
359 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/canadian-government-breaches-exposed-citizens-data-report-showcase_image-8-a-13739.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
00f17313b47e226da80eb187be630b9a6b24ebf9f13518489c536a489869d69b

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Wed, 19 Feb 2020 15:03:30 GMT
ETag
caf17826c5adeb81ece87c8f015a3a99
Content-Type
image/jpeg
X-Timestamp
1582124609.37402
Cache-Control
public, max-age=26062
Content-Length
366864
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx800e6a7e1835434ca1854-005e4d54e2dfw1
Expires
Thu, 20 Feb 2020 15:30:59 GMT
assessing-vendor-security-risks-challenges-showcase_image-5-i-4596.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
80 KB
80 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/assessing-vendor-security-risks-challenges-showcase_image-5-i-4596.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
bda4f1fdda2a4f2df7e02fa116386526e1a24cf62c6cf81cccb623007d3be6c2

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Mon, 17 Feb 2020 19:39:00 GMT
ETag
24edcf2c7f3b1867672035cbf90df5cc
Content-Type
image/jpeg
X-Timestamp
1581968339.27164
Cache-Control
public, max-age=29740
Content-Length
81918
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txb9f380f40c1c4cf39ed2b-005e4aef9adfw1
Expires
Thu, 20 Feb 2020 16:32:17 GMT
protecting-ecommerce-sites-from-card-data-theft-showcase_image-6-i-4597.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
437 KB
438 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/protecting-ecommerce-sites-from-card-data-theft-showcase_image-6-i-4597.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
267f517ff9bd6fedfeca9412239a66fd3537d9dd752db8b94a3a8c5d0ce6892e

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Tue, 18 Feb 2020 10:09:29 GMT
ETag
b413a73f3e991d04854b1a3c6804f30f
Content-Type
image/jpeg
X-Timestamp
1582020568.50034
Cache-Control
public, max-age=12922
Content-Length
447855
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txe403ea915743406e9b85e-005e4bf17fdfw1
Expires
Thu, 20 Feb 2020 11:51:59 GMT
coronavirus-how-to-plan-protect-showcase_image-4-i-4590.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
53 KB
53 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/coronavirus-how-to-plan-protect-showcase_image-4-i-4590.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
961cae7c129fa75c5f3e4cb08d5007460a9c9e8cbe3cce04dc2fa41f4a0c8554

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Thu, 06 Feb 2020 18:02:48 GMT
ETag
4b2630bcfaa3212660ee443bc2210d94
Content-Type
image/jpeg
X-Timestamp
1581012167.30343
Cache-Control
public, max-age=10471
Content-Length
53895
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx10c4bdc8adae409d801ce-005e3c5f41dfw1
Expires
Thu, 20 Feb 2020 11:11:08 GMT
cybersecurity-challenges-for-banks-in-bangladesh-showcase_image-10-i-4599.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
219 KB
219 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cybersecurity-challenges-for-banks-in-bangladesh-showcase_image-10-i-4599.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
126053f47a7f3df28ae24979541894aeddcbb7019fcfbb3b3671080743ef7201

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Wed, 19 Feb 2020 07:30:15 GMT
ETag
c7f58058c3a9b3d2dc70f8584fea33bd
Content-Type
image/jpeg
X-Timestamp
1582097414.05062
Cache-Control
public, max-age=83036
Content-Length
224268
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
txd2ba2f3a8a284947a35ed-005e4d0358dfw1
Expires
Fri, 21 Feb 2020 07:20:33 GMT
cloud-security-evolving-role-casb-model-showcase_image-1-i-4593.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
219 KB
219 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cloud-security-evolving-role-casb-model-showcase_image-1-i-4593.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
9e8d419e7b493340b7ce904b346eda9cabd1a792d636bba61a8045cc2dab65b1

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Tue, 11 Feb 2020 06:28:22 GMT
ETag
643c3e93f718d7daabeba17c44ffa97d
Content-Type
image/jpeg
X-Timestamp
1581402501.75884
Cache-Control
public, max-age=10074
Content-Length
223935
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx9b26135af2de4fb19a3b4-005e4252d7dfw1
Expires
Thu, 20 Feb 2020 11:04:31 GMT
analysis-iowa-election-app-missteps-showcase_image-7-i-4592.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
72 KB
72 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-iowa-election-app-missteps-showcase_image-7-i-4592.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3efeb8243a281409f11433f748c487549f79e70bfc3183dbf9b67a50a859100d

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Thu, 06 Feb 2020 21:39:20 GMT
ETag
90c3e0a3474bb9da9ba0abfa5be3b11c
Content-Type
image/jpeg
X-Timestamp
1581025159.93119
Cache-Control
public, max-age=72234
Content-Length
73827
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx3e951d960f034e99b0ce3-005e3d31c3dfw1
Expires
Fri, 21 Feb 2020 04:20:31 GMT
logo-ismg-with-text.png
www.databreachtoday.com/images-responsive/
4 KB
4 KB
Image
General
Full URL
https://www.databreachtoday.com/images-responsive/logo-ismg-with-text.png
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
4e2db1bef009e01901b4083a153f1607301428277a76f508e659dc2849cefa04

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=93
Content-Length
4175
logo-ismg-print.png
www.databreachtoday.com/images-responsive/
5 KB
6 KB
Image
General
Full URL
https://www.databreachtoday.com/images-responsive/logo-ismg-print.png
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
5133e2e1a213ca44a8adb1f42f103a2d2e495849dfa4d42bf67c04fcc962e577

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=94
Content-Length
5598
ondemand-preview-w-255.jpg
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/
56 KB
57 KB
Image
General
Full URL
https://f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/ondemand-preview-w-255.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3059f92e36a564c5cbcedc195f764e3c55c8cf919c84129c5f202870e7026b61

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:38 GMT
Last-Modified
Fri, 05 Jul 2013 12:55:26 GMT
ETag
7aece0902995efedc289b7c24037434b
Content-Type
image/jpeg
X-Timestamp
1373028925.94439
Cache-Control
public, max-age=896
Content-Length
57633
Connection
keep-alive
Accept-Ranges
bytes
X-Trans-Id
tx6f2244cfd4bf4a83a6df3-005e4e4066dfw1
Expires
Thu, 20 Feb 2020 08:31:34 GMT
ron-ross-smallImage-a-558.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
10 KB
11 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/ron-ross-smallImage-a-558.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
9c8bb391a723e088d163b560afa73f709c42a69df5647c4fefce9d16e4226895

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Last-Modified
Fri, 01 Nov 2013 13:09:25 GMT
X-Serial
4845
X-Akamai-Pragma-Client-IP
10.247.179.207, 213.215.134.141
ETag
fac8c56390d084c4f1dfaa9b24a58c33
Content-Type
image/jpeg
X-Check-Cacheable
YES
X-Timestamp
1383311364.81114
Cache-Control
public, max-age=38189
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
10640
X-Trans-Id
tx0a5e72d258ab47b79d537-005d0322d5dfw1
Expires
Thu, 20 Feb 2020 18:53:06 GMT
mem8YaGs126MiZpBA-UFVZ0bf8pkAg.woff2
fonts.gstatic.com/s/opensans/v17/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem8YaGs126MiZpBA-UFVZ0bf8pkAg.woff2
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/javascripts-responsive/vendor/modernizr.j
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
54c64f3c66372027154f01fc9f24b4e25fdfe405b70d1994c79abbc2576ff775
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Origin
https://www.databreachtoday.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 01 Feb 2020 00:22:27 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:30:49 GMT
server
sffe
age
1670049
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
9132
x-xss-protection
0
expires
Sun, 31 Jan 2021 00:22:27 GMT
ismg-user-ip
worker.ismgcorp.com/
13 B
407 B
XHR
General
Full URL
https://worker.ismgcorp.com/ismg-user-ip
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/javascripts-responsive/vendor/jquery.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.130.251.6 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
6627e5548823f065f872b0cfe220228eda2b68a9ffe3d7ca171315ae894a571c

Request headers

Accept
*/*
Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Origin
https://www.databreachtoday.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/html; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, private
Connection
Keep-Alive
Keep-Alive
timeout=5, max=100
Content-Length
33
gpt.js
www.googletagservices.com/tag/js/
43 KB
14 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
d08ff48ec5b86dd1dcdff144d6a9edd7608ff6146713a35bba361ff44ba545d5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 20 Feb 2020 08:16:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"433 / 562 of 1000 / last-modified: 1582149141"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
14495
x-xss-protection
0
expires
Thu, 20 Feb 2020 08:16:37 GMT
munchkin.js
munchkin.marketo.net/
1 KB
1 KB
Script
General
Full URL
https://munchkin.marketo.net/munchkin.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/javascripts-responsive/vendor/jquery.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.101.176.176 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a95-101-176-176.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
37d3a4e166c1ac159b88faf4c86c36f67289628a8d65fb57546126396508bbf7

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Content-Encoding
gzip
Last-Modified
Fri, 07 Feb 2020 02:37:09 GMT
Server
Apache
ETag
"8cf9a98cedf9b6907e48743aa92f726a:1581043029"
Vary
Accept-Encoding
P3P
policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR"
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
application/x-javascript
Content-Length
760
gtm.js
www.googletagmanager.com/
54 KB
20 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-T626NZ
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
d1a2b09c0143ca46f50ad2ec9da31f93685da02c3c41cf67978c6060d6ffca91
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 20 Feb 2020 08:16:37 GMT
content-encoding
br
status
200
strict-transport-security
max-age=31536000; includeSubDomains
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
20693
x-xss-protection
0
last-modified
Thu, 20 Feb 2020 06:00:00 GMT
server
Google Tag Manager
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Thu, 20 Feb 2020 08:16:37 GMT
moatframe.js
z.moatads.com/addthismoatframe568911941483/
2 KB
1 KB
Script
General
Full URL
https://z.moatads.com/addthismoatframe568911941483/moatframe.js
Requested by
Host: s7.addthis.com
URL: https://s7.addthis.com/js/250/addthis_widget.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
05090f9390f5bc0cd23fe5f432037cc92d7cbce1ced9bfe8faf3d1c9abae85cd

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Content-Encoding
gzip
Last-Modified
Fri, 08 Nov 2019 20:13:52 GMT
Server
AmazonS3
x-amz-request-id
44F36A7E5503EFD2
ETag
"f14b4e1f799b14f798a195f43cf58376"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=45640
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
948
x-amz-id-2
oHBUgg2Oj5pK0QQXXOzoagkYOxKdK6e002JN34Wg9N3QQYy2+t/OPlfVe5S14r+v8UpnJhaEELY=
mem5YaGs126MiZpBA-UN_r8OUuhpKKSTjw.woff2
fonts.gstatic.com/s/opensans/v17/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem5YaGs126MiZpBA-UN_r8OUuhpKKSTjw.woff2
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5e261f7e11c39ff6f4c8fe884e5c9de2fa15f29085a1adefdd36603ef2e23c00
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Origin
https://www.databreachtoday.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 04 Feb 2020 20:40:52 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:30:37 GMT
server
sffe
age
1337744
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
9016
x-xss-protection
0
expires
Wed, 03 Feb 2021 20:40:52 GMT
fontawesome-webfont.woff
www.databreachtoday.com/css-responsive/fonts/
43 KB
44 KB
Font
General
Full URL
https://www.databreachtoday.com/css-responsive/fonts/fontawesome-webfont.woff?v=4.2.0
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
0fd28fece9ebd606b8b071460ebd3fc2ed7bc7a66ef91c8834f11dfacab4a849

Request headers

Referer
https://www.databreachtoday.com/css-responsive/vendor/font-awesome.min.css
Origin
https://www.databreachtoday.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Last-Modified
Wed, 19 Feb 2020 19:59:48 GMT
Server
Apache
ETag
"ad90-59ef33b07ef77"
Content-Type
application/font-woff
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
44432
main.js
www.databreachtoday.com/javascripts-responsive/
37 KB
9 KB
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/main.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
6cd08c8b7a6da3bb29c4fe03a127d5240b89ab5219039088fa5e4118e3d844d0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
8894
bis-hdr.r1.js
www.databreachtoday.com/javascripts-responsive/
1 KB
766 B
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/bis-hdr.r1.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
4c92262ff23b2116bad93fc1e36f1a597dc713ad8b3cd03d56f8e49bec4cb186

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
455
jquery.browser.js
www.databreachtoday.com/javascripts-responsive/
2 KB
1 KB
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/jquery.browser.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
bbe0aa82dca8a36f677fb17025c3baa011d355bd7cb42d4aacea1b0265855d6e

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=95
Content-Length
1022
jquery.prettyPhoto.js
www.databreachtoday.com/javascripts-responsive/
24 KB
7 KB
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/jquery.prettyPhoto.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
1edbdbe7dd4c59e2fef20ef8dc4615a18d116fdf43daf018dce46a93e6cb153e

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 20 Feb 2020 08:16:36 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
6459
ondemand-preview-w-255.mp4
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/
0
0

mem5YaGs126MiZpBA-UN7rgOUuhpKKSTjw.woff2
fonts.gstatic.com/s/opensans/v17/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem5YaGs126MiZpBA-UN7rgOUuhpKKSTjw.woff2
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a48a6e4b14fe55f750c0a3dfb5a6f4941bdc06af0aa542b90de25c30c2b4625c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Origin
https://www.databreachtoday.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 04 Feb 2020 20:18:40 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:31:11 GMT
server
sffe
age
1339076
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
9080
x-xss-protection
0
expires
Wed, 03 Feb 2021 20:18:40 GMT
mem5YaGs126MiZpBA-UNirkOUuhpKKSTjw.woff2
fonts.gstatic.com/s/opensans/v17/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem5YaGs126MiZpBA-UNirkOUuhpKKSTjw.woff2
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b8e23a845bc6b7fd417d29182e0e38d353e64b5e12e06bb1de2b5ce063db1dcc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Origin
https://www.databreachtoday.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 05 Feb 2020 01:55:05 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:30:44 GMT
server
sffe
age
1318891
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
9180
x-xss-protection
0
expires
Thu, 04 Feb 2021 01:55:05 GMT
memnYaGs126MiZpBA-UFUKWyV9hrIqOxjaPX.woff2
fonts.gstatic.com/s/opensans/v17/
10 KB
10 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/memnYaGs126MiZpBA-UFUKWyV9hrIqOxjaPX.woff2
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
41c93545a4e2a1a46bca581d80fec8c8da014e13b310c65d694e4af30c7da9bd
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Origin
https://www.databreachtoday.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 04 Feb 2020 06:22:55 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:30:56 GMT
server
sffe
age
1389221
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
9744
x-xss-protection
0
expires
Wed, 03 Feb 2021 06:22:55 GMT
embed.js
bankinfosecurity.disqus.com/
66 KB
22 KB
Script
General
Full URL
https://bankinfosecurity.disqus.com/embed.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.12.134 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
openresty /
Resource Hash
10aefe1660fe10e82d3ced05aead9403d1350022c24b56ec4ffe970a920259d1
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Content-Encoding
gzip
Server
openresty
Age
0
Vary
Accept-Encoding
Strict-Transport-Security
max-age=300; includeSubdomains
Content-Type
application/javascript; charset=utf-8
Cache-Control
private, max-age=60
X-Service
router
Connection
keep-alive
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
Content-Length
22230
analytics.js
www.google-analytics.com/
44 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
eaf1b128b927ac2868755cb7366d35554255c8af362235afe270f9614f8c806d
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 06 Feb 2020 00:21:02 GMT
server
Golfe2
age
6185
date
Thu, 20 Feb 2020 06:33:32 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
18174
expires
Thu, 20 Feb 2020 08:33:32 GMT
tag.aspx
ml314.com/
26 KB
12 KB
Script
General
Full URL
https://ml314.com/tag.aspx?2012020
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.215.103.126 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-215-103-126.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
c293a28e23c66b27bd04bc1742f3aab0ebf6c382961c1e83140f035a08ea5e5d

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Content-Encoding
gzip
Last-Modified
Thu, 20 Feb 2020 07:14:46 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, max-age=82687
Connection
keep-alive
Content-Length
11932
Expires
Fri, 21 Feb 2020 07:14:46 GMT
insight.min.js
sjs.bizographics.com/
3 KB
2 KB
Script
General
Full URL
https://sjs.bizographics.com/insight.min.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:f1:28a::3adf , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
41dd5e421fe221a7d2921d6fa2b36e8b01a9f2c054aaef5fad866fe896c1d1e0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Content-Encoding
gzip
Last-Modified
Mon, 07 Oct 2019 16:41:31 GMT
X-CDN
AKAM
Vary
Accept-Encoding
Content-Type
application/x-javascript;charset=utf-8
Cache-Control
max-age=57122
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1576
livechat.ashx
vue.comm100.com/
Redirect Chain
  • https://chatserver.comm100.com/livechat.ashx?siteId=92035
  • https://vue.comm100.com/livechat.ashx?siteId=92035
990 B
750 B
Script
General
Full URL
https://vue.comm100.com/livechat.ashx?siteId=92035
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.20.4.43 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
fe22e1de38d017229acd5f79c996496ced9db6983f125973821f1092b4430bc9

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 20 Feb 2020 08:16:39 GMT
content-encoding
gzip
cf-cache-status
DYNAMIC
server
cloudflare
x-aspnet-version
4.0.30319
access-control-allow-origin
*
x-powered-by
ASP.NET
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
content-type
application/x-javascript; charset=utf-8
status
200
cache-control
no-cache, no-store
cf-ray
567f0a242d5ce5e8-LHR
content-length
515

Redirect headers

date
Thu, 20 Feb 2020 08:16:39 GMT
cf-cache-status
DYNAMIC
server
cloudflare
access-control-allow-origin
*
x-powered-by
ASP.NET
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
location
https://vue.comm100.com/livechat.ashx?siteId=92035
content-type
text/html; charset=UTF-8
status
301
cf-ray
567f0a202babe5e8-LHR
content-length
173
ajax.php
www.databreachtoday.com/
7 KB
1 KB
XHR
General
Full URL
https://www.databreachtoday.com/ajax.php?json=twitterWidget
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/javascripts-responsive/vendor/jquery.min.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
f3d97c87a19da78659c78f6f07e1f42cc6b65f897cd845de46c245de74e14950

Request headers

Accept
text/html, */*; q=0.01
Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Sec-Fetch-Dest
empty
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 20 Feb 2020 08:16:36 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/html; charset=UTF-8
Cache-Control
no-store, no-cache, must-revalidate
Transfer-Encoding
chunked
Connection
Keep-Alive
Keep-Alive
timeout=5, max=95
Expires
Thu, 19 Nov 1981 08:52:00 GMT
_ate.track.config_resp
v1.addthisedge.com/live/boost/ra-4fd21f8a1294dd16/
27 B
207 B
Script
General
Full URL
https://v1.addthisedge.com/live/boost/ra-4fd21f8a1294dd16/_ate.track.config_resp
Requested by
Host: s7.addthis.com
URL: https://s7.addthis.com/js/250/addthis_widget.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.248.44 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-248-44.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
19a26d6046c4fcfe9e3efbc1fb7532f424c6b0b7590b9e193788e30bce8b9836

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 20 Feb 2020 08:16:37 GMT
content-encoding
gzip
vary
Accept-Encoding
content-type
application/javascript;charset=utf-8
status
200
cache-control
public, max-age=38, s-maxage=86400
content-disposition
attachment; filename=1.txt
content-length
47
ondemand-preview-w-255.mp4
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/
3 MB
0
Media
General
Full URL
https://f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/ondemand-preview-w-255.mp4
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Sec-Fetch-Dest
video
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-

Response headers

Date
Thu, 20 Feb 2020 08:16:38 GMT
Last-Modified
Fri, 05 Jul 2013 12:56:36 GMT
X-Trans-Id
txa8501aac39eb4181b1a8c-005c769461dfw1
ETag
e5d65b36cc2f1ee7de6cc53cd6609280
Content-Type
video/mp4
Content-Range
bytes 0-10621769/10621770
X-Timestamp
1373028995.98411
Cache-Control
public, max-age=655
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
10621770
Expires
Thu, 20 Feb 2020 08:27:33 GMT
GjV7JWMk_normal.jpg
pbs.twimg.com/profile_images/710735123876982784/
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/710735123876982784/GjV7JWMk_normal.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/4184) /
Resource Hash
e72bbdf7e3d8178ae3264b3c8c9ee995f8825c64f3555f098e702fa6fcab1c43
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 20 Feb 2020 08:16:37 GMT
x-content-type-options
nosniff
age
497832
x-cache
HIT
status
200
content-length
2187
x-response-time
108
surrogate-key
profile_images profile_images/bucket/4 profile_images/710735123876982784
last-modified
Fri, 18 Mar 2016 07:48:33 GMT
server
ECS (fcn/4184)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
918e83dff044412b717b0bc50e2d8c87
accept-ranges
bytes
8svI-1EO_normal.jpg
pbs.twimg.com/profile_images/1197135188473475074/
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/1197135188473475074/8svI-1EO_normal.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40D2) /
Resource Hash
4794b419ca0e88c4548ac9436c2e787de43aa7a2faca1d71c95d70a3175608f3
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 20 Feb 2020 08:16:37 GMT
x-content-type-options
nosniff
age
65857
x-cache
HIT
status
200
content-length
2415
x-response-time
122
surrogate-key
profile_images profile_images/bucket/5 profile_images/1197135188473475074
last-modified
Wed, 20 Nov 2019 12:48:45 GMT
server
ECS (fcn/40D2)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
29d00dd15126fcc1deb1d918fed1af16
accept-ranges
bytes
Jmr01BWF_normal.jpg
pbs.twimg.com/profile_images/744557351018110976/
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/744557351018110976/Jmr01BWF_normal.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41A2) /
Resource Hash
89420e731167a44f60bf3335e3e314a48b39b212c65a0a6d6fe8c34b7ebcd116
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 20 Feb 2020 08:16:37 GMT
x-content-type-options
nosniff
age
216329
x-cache
HIT
status
200
content-length
2415
x-response-time
177
surrogate-key
profile_images profile_images/bucket/2 profile_images/744557351018110976
last-modified
Sun, 19 Jun 2016 15:46:00 GMT
server
ECS (fcn/41A2)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
5b5114f75f71f25a2eac7593f4de0b4c
accept-ranges
bytes
7A0as3u-_normal.jpg
pbs.twimg.com/profile_images/930198318654869509/
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/930198318654869509/7A0as3u-_normal.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/419A) /
Resource Hash
7dd78f918c90ff9e8c5bbd58aa2027a8915ce304f973dab4f84f3ade723ffd59
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 20 Feb 2020 08:16:37 GMT
x-content-type-options
nosniff
age
257797
x-cache
HIT
status
200
content-length
2339
x-response-time
116
surrogate-key
profile_images profile_images/bucket/0 profile_images/930198318654869509
last-modified
Mon, 13 Nov 2017 22:16:56 GMT
server
ECS (fcn/419A)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
2304ebfd176d4ab20efa11a3f76ba4a3
accept-ranges
bytes
bvVizeJ3_normal.jpg
pbs.twimg.com/profile_images/1213210045346746368/
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/1213210045346746368/bvVizeJ3_normal.jpg
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41AF) /
Resource Hash
a50c85d73df6d278fb77084dd38334500fea30223dc7608aa88c8a6feff2eb8a
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 20 Feb 2020 08:16:37 GMT
x-content-type-options
nosniff
age
469717
x-cache
HIT
status
200
content-length
2339
x-response-time
121
surrogate-key
profile_images profile_images/bucket/8 profile_images/1213210045346746368
last-modified
Fri, 03 Jan 2020 21:24:29 GMT
server
ECS (fcn/41AF)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
0dad6618fec8f778640d2bc71e46a3d1
accept-ranges
bytes
ajax.php
www.databreachtoday.com/
5 B
388 B
XHR
General
Full URL
https://www.databreachtoday.com/ajax.php?json=notificationCookies&action=getNotifications
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/javascripts-responsive/vendor/jquery.min.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
fcbcf165908dd18a9e49f7ff27810176db8e9f63b4352213741664245224f8aa

Request headers

Accept
*/*
Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Origin
https://www.databreachtoday.com
X-Requested-With
XMLHttpRequest
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 20 Feb 2020 08:16:37 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/html; charset=UTF-8
Cache-Control
no-store, no-cache, must-revalidate
Transfer-Encoding
chunked
Connection
Keep-Alive
Keep-Alive
timeout=5, max=94
Expires
Thu, 19 Nov 1981 08:52:00 GMT
integrator.js
adservice.google.de/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.databreachtoday.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 20 Feb 2020 08:16:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.databreachtoday.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 20 Feb 2020 08:16:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_2020013001.js
securepubads.g.doubleclick.net/gpt/
167 KB
61 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020013001.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.2 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
sffe /
Resource Hash
06349254c3a3832ea81973863ce5873ab441c1b8006ee1cb553425d152fabf88
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 20 Feb 2020 08:16:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 30 Jan 2020 14:09:03 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
62230
x-xss-protection
0
expires
Thu, 20 Feb 2020 08:16:37 GMT
collect
px.ads.linkedin.com/
Redirect Chain
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749&url=https%3A%2F%2Fwww.databreachtoday.com%2Fhacked-off-patients-sue-ransom-paying-hospital-group-a-13736%3Frf%3D2020-02-19_ENEWS_ACQ_IR__Banne...
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D749%26url%3Dhttps%253A%252F%252Fwww.databreachtoday.com%252Fhacked-off-patients-s...
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749&url=https%3A%2F%2Fwww.databreachtoday.com%2Fhacked-off-patients-sue-ransom-paying-hospital-group-a-13736%3Frf%3D2020-02-19_ENEWS_ACQ_IR__Banne...
0
58 B
Image
General
Full URL
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749&url=https%3A%2F%2Fwww.databreachtoday.com%2Fhacked-off-patients-sue-ransom-paying-hospital-group-a-13736%3Frf%3D2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736%26mkt_tok%3DeyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9&time=1582186597341&liSync=true
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:f500:11:101::b93f:9005 , Ireland, ASN14413 (LINKEDIN, US),
Reverse DNS
Software
Play /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 20 Feb 2020 08:16:37 GMT
server
Play
linkedin-action
1
x-li-fabric
prod-lor1
status
200
x-li-proto
http/2
x-li-pop
prod-tln1
content-type
application/javascript
content-length
0
x-li-uuid
zF6E8VMO9RXQnKFqOisAAA==

Redirect headers

date
Thu, 20 Feb 2020 08:16:37 GMT
x-content-type-options
nosniff
linkedin-action
1
status
302
strict-transport-security
max-age=2592000
content-length
0
x-li-uuid
jn6d51MO9RXQRxqyoSsAAA==
server
Play
pragma
no-cache
x-li-pop
prod-tln1
expect-ct
max-age=86400, report-uri="https://www.linkedin.com/platform-telemetry/ct"
x-frame-options
sameorigin
x-li-fabric
prod-lor1
location
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749&url=https%3A%2F%2Fwww.databreachtoday.com%2Fhacked-off-patients-sue-ransom-paying-hospital-group-a-13736%3Frf%3D2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736%26mkt_tok%3DeyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9&time=1582186597341&liSync=true
x-xss-protection
1; mode=block
cache-control
no-cache, no-store
content-security-policy
default-src *; connect-src 'self' https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com https://dpm.demdex.net/id https://lnkd.demdex.net/event blob: static.licdn.com static-exp1.licdn.com static-exp2.licdn.com static-exp3.licdn.com media.licdn.com media-exp1.licdn.com media-exp2.licdn.com media-exp3.licdn.com; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com https://snap.licdn.com/li.lms-analytics/insight.min.js platform.linkedin.com platform-akam.linkedin.com platform-ecst.linkedin.com platform-azur.linkedin.com; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'; report-uri https://www.linkedin.com/platform-telemetry/csp?f=l
x-li-proto
http/2
expires
Thu, 01 Jan 1970 00:00:00 GMT
collect
www.google-analytics.com/r/
35 B
101 B
Image
General
Full URL
https://www.google-analytics.com/r/collect?v=1&_v=j81&a=1503417176&t=pageview&_s=1&dl=https%3A%2F%2Fwww.databreachtoday.com%2Fhacked-off-patients-sue-ransom-paying-hospital-group-a-13736%3Frf%3D2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736%26mkt_tok%3DeyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9&dr=http%3A%2F%2Flinks.ismgcorp.com%2FljXSN000pUSTeI0d30k051Z&ul=en-us&de=UTF-8&dt=Hacked%20Off%3A%20Patients%20Sue%20Ransom-Paying%20Hospital%20Group&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=IEBAAEAB~&jid=1589184996&gjid=812794222&cid=42732745.1582186597&tid=UA-212197-28&_gid=1999976102.1582186597&_r=1&z=1669127061
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 20 Feb 2020 08:16:37 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
*
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
stats.g.doubleclick.net/r/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j81&a=1503417176&t=pageview&_s=1&dl=https%3A%2F%2Fwww.databreachtoday.com%2Fhacked-off-patients-sue-ransom-paying-hospital-group-a-13736%3Frf%3D202...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-212197-36&cid=42732745.1582186597&jid=604140437&_gid=1999976102.1582186597&gjid=480235538&_v=j81&z=13733292
35 B
102 B
Image
General
Full URL
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-212197-36&cid=42732745.1582186597&jid=604140437&_gid=1999976102.1582186597&gjid=480235538&_v=j81&z=13733292
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:400c:c00::9d Brussels, Belgium, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
strict-transport-security
max-age=10886400; includeSubDomains; preload
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
*
date
Thu, 20 Feb 2020 08:16:37 GMT
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 20 Feb 2020 08:16:37 GMT
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
*
location
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-212197-36&cid=42732745.1582186597&jid=604140437&_gid=1999976102.1582186597&gjid=480235538&_v=j81&z=13733292
content-type
text/html; charset=UTF-8
status
302
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
413
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
www.google-analytics.com/
35 B
100 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j81&a=1503417176&t=event&_s=2&dl=https%3A%2F%2Fwww.databreachtoday.com%2Fhacked-off-patients-sue-ransom-paying-hospital-group-a-13736%3Frf%3D2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736%26mkt_tok%3DeyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9&dr=http%3A%2F%2Flinks.ismgcorp.com%2FljXSN000pUSTeI0d30k051Z&ul=en-us&de=UTF-8&dt=Hacked%20Off%3A%20Patients%20Sue%20Ransom-Paying%20Hospital%20Group&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&ec=dailyemailupdates&ea=impression&el=&_u=IEDAAEAB~&jid=&gjid=&cid=42732745.1582186597&tid=UA-212197-28&_gid=1999976102.1582186597&z=877607209
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 04 Feb 2020 20:05:54 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
1339843
content-type
image/gif
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
no-cache, no-store, must-revalidate
access-control-allow-origin
*
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
munchkin.js
munchkin.marketo.net/156/
9 KB
5 KB
Script
General
Full URL
https://munchkin.marketo.net/156/munchkin.js
Requested by
Host: munchkin.marketo.net
URL: https://munchkin.marketo.net/munchkin.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.101.176.176 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a95-101-176-176.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e6cf48bc1bfd904673cda470939d69e4c555779587d2361e65d03869b26eeebf

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 20 Feb 2020 08:16:37 GMT
Content-Encoding
gzip
Last-Modified
Tue, 17 Sep 2019 20:22:41 GMT
Server
Apache
ETag
"24e78e4d5137c385c6e3393d80cfd6bf:1568751761"
Vary
Accept-Encoding
P3P
policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR", policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR", policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR"
Cache-Control
max-age=8640000
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
application/x-javascript
Content-Length
4198
Expires
Sat, 30 May 2020 08:16:37 GMT
visitWebPage
051-zxi-237.mktoresp.com/webevents/
2 B
303 B
XHR
General
Full URL
https://051-zxi-237.mktoresp.com/webevents/visitWebPage?_mchNc=1582186597472&_mchCn=&_mchId=051-ZXI-237&_mchTk=_mch-databreachtoday.com-1582186597472-54318&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9&_mchHo=www.databreachtoday.com&_mchPo=&_mchRu=%2Fhacked-off-patients-sue-ransom-paying-hospital-group-a-13736&_mchPc=https%3A&_mchVr=156&_mchHa=&_mchRe=http%3A%2F%2Flinks.ismgcorp.com%2FljXSN000pUSTeI0d30k051Z&_mchQp=rf%3D2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736__-__mkt_tok%3DeyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Requested by
Host: munchkin.marketo.net
URL: https://munchkin.marketo.net/156/munchkin.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
192.28.147.68 , United States, ASN53580 (MARKETO, US),
Reverse DNS
Software
akka-http/10.1.7 /
Resource Hash
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Origin
https://www.databreachtoday.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 20 Feb 2020 08:16:37 GMT
Content-Encoding
gzip
Server
akka-http/10.1.7
Transfer-Encoding
chunked
X-Request-Id
9b6e42fa-2b14-4297-97ec-e36c24412204
Content-Type
text/plain; charset=UTF-8
visitWebPage
051-zxi-237.mktoresp.com/webevents/
2 B
303 B
XHR
General
Full URL
https://051-zxi-237.mktoresp.com/webevents/visitWebPage?_mchNc=1582186597473&_mchRu=%2Fhacked-off-patients-sue-ransom-paying-hospital-group-a-13736%3Frf%3D2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736%26amp%3Bmkt_tok%3DeyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9&_mchQp=cat%3D497%26cat%3D409%26cat%3D93%26cat%3D320%26cat%3D151%26cat%3D399%26cat%3D435%26assetID%3D13736%26assetType%3Darticle%26key%3Dhackensack%20meridian%20health%26key%3Dhmh%26key%3Dransomware%26key%3Dattack%26key%3Dlawsuit%26key%3Dclass%20action%26key%3Dpaul%20hales%26key%3Dsteven%20teppler%26key%3Dpaid%26key%3Dbreach%26key%3Dhhs%26key%3Dnotify%26key%3Dreport%26key%3D&_mchId=051-ZXI-237&_mchTk=_mch-databreachtoday.com-1582186597472-54318&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9&_mchHo=www.databreachtoday.com&_mchPo=&_mchPc=https%3A&_mchVr=156&_mchRe=https%3A%2F%2Fwww.databreachtoday.com%2Fhacked-off-patients-sue-ransom-paying-hospital-group-a-13736%3Frf%3D2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736%26mkt_tok%3DeyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Requested by
Host: munchkin.marketo.net
URL: https://munchkin.marketo.net/156/munchkin.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
192.28.147.68 , United States, ASN53580 (MARKETO, US),
Reverse DNS
Software
akka-http/10.1.7 /
Resource Hash
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Origin
https://www.databreachtoday.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 20 Feb 2020 08:16:38 GMT
Content-Encoding
gzip
Server
akka-http/10.1.7
Transfer-Encoding
chunked
X-Request-Id
5c3d2fc0-df55-492f-b4d5-5ef956325278
Content-Type
text/plain; charset=UTF-8
ads
securepubads.g.doubleclick.net/gampad/
132 KB
14 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=552940412284665&correlator=3801724214699703&output=ldjh&impl=fifs&adsid=NT&eid=21065390%2C21065305&vrg=2020013001&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200220&iu_parts=4444691%2CDBT_TOP_728x90%2CDBT_MID_RB_300x250%2CDBT_MID_RB_2_300x250%2CDBT_MID_RB_3_300x250%2CDBT_MID_RB_300x600%2CDBT_MID_L_180x150%2CDBT_MID_R_180x150%2CDBT_MID2_L_180x150%2CDBT_MID2_R_180x150%2CDBT_TEXT_1%2CDBT_TEXT_2%2CDBT_BOTTOM_728x90%2CDBT_MID_728x90%2CDBT_Interstitial%2CDBT_TOP_320x50%2CDBT_BOTTOM_320x50%2CDBT_MID_320x50%2CDBT_CAT_LOGO&enc_prev_ius=%2F0%2F1%2C%2F0%2F2%2C%2F0%2F3%2C%2F0%2F4%2C%2F0%2F5%2C%2F0%2F6%2C%2F0%2F7%2C%2F0%2F8%2C%2F0%2F9%2C%2F0%2F10%2C%2F0%2F11%2C%2F0%2F12%2C%2F0%2F13%2C%2F0%2F14%2C%2F0%2F15%2C%2F0%2F16%2C%2F0%2F17%2C%2F0%2F18&prev_iu_szs=728x90%2C300x250%2C300x250%2C300x250%2C300x600%2C180x150%2C180x150%2C180x150%2C180x150%2C280x70%2C280x70%2C728x90%2C728x90%2C640x480%2C320x50%2C320x50%2C320x50%2C216x54&cust_params=category%3D%255B497%252C409%252C93%252C320%252C151%252C399%252C435%255D%26gated%3Dn&cookie_enabled=1&bc=31&abxe=1&lmt=1582186597&dt=1582186597589&dlt=1582186595542&idt=2031&frm=20&biw=1585&bih=1200&oid=3&adxs=608%2C1018%2C1018%2C-9%2C1003%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C15%2C-9%2C-12245933%2C-12245933%2C-12245933%2C-9%2C-12245933&adys=71%2C592%2C4380%2C-9%2C2227%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C5671%2C-9%2C-12245933%2C-12245933%2C-12245933%2C-9%2C-12245933&adks=3278784386%2C2977291722%2C3327481402%2C2602068264%2C993613247%2C3432865064%2C1680696679%2C2506343038%2C2484848859%2C1900808572%2C392546858%2C1235722975%2C288851561%2C1097209948%2C2986446788%2C3173543903%2C3361737753%2C1845465306&ucis=1%7C2%7C3%7C4%7C5%7C6%7C7%7C8%7C9%7Ca%7Cb%7Cc%7Cd%7Ce%7Cf%7Cg%7Ch%7Ci&ifi=1&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.databreachtoday.com%2Fhacked-off-patients-sue-ransom-paying-hospital-group-a-13736%3Frf%3D2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736%26mkt_tok%3DeyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9&ref=http%3A%2F%2Flinks.ismgcorp.com%2FljXSN000pUSTeI0d30k051Z&dssz=65&icsg=824633469695&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=800x90%7C360x0%7C360x0%7C0x-1%7C390x595%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C1585x90%7C0x-1%7C0x-1%7C0x0%7C0x0%7C0x-1%7C780x5302&msz=770x90%7C360x250%7C360x250%7C0x-1%7C390x600%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C1555x90%7C0x-1%7C0x-1%7C0x0%7C0x0%7C0x-1%7C236x64&ga_vid=42732745.1582186597&ga_sid=1582186598&ga_hid=1503417176&fws=0%2C0%2C0%2C2%2C0%2C2%2C2%2C2%2C2%2C2%2C2%2C0%2C2%2C644%2C128%2C128%2C2%2C128&ohw=0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C1585%2C0%2C0%2C0%2C0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020013001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.2 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
7d3bf317841b426f12e06565407486ac13cbe6285c33da8c70f1604d3c3be4bd
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Origin
https://www.databreachtoday.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 20 Feb 2020 08:16:37 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
13049
x-xss-protection
0
google-lineitem-id
5306369483,5306369483,5306369483,5306369483,5306369483,-2,-2,-2,-2,-2,-2,5306369483,5306369483,5277746312,-2,-2,-2,-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138303639720,138304039882,138303639708,138303639576,138304039336,-2,-2,-2,-2,-2,-2,138303639582,138303639426,138301379725,-2,-2,-2,-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.databreachtoday.com
access-control-expose-headers
x-google-amp-ad-validated-version
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2020013001.js
securepubads.g.doubleclick.net/gpt/
66 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020013001.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020013001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.2 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
sffe /
Resource Hash
ebe54c2b4cdb3fc0bd7bd45b2ce574428f0e970bdd1e9395f50916bce1628cc6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 20 Feb 2020 08:16:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 30 Jan 2020 14:09:03 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24903
x-xss-protection
0
expires
Thu, 20 Feb 2020 08:16:37 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020013001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
empty

Response headers

lounge.15d8f2a22cfa6b9f96345c682b01a08f.css
c.disquscdn.com/next/embed/styles/
0
21 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/styles/lounge.15d8f2a22cfa6b9f96345c682b01a08f.css
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:4da6 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
empty

Response headers

date
Thu, 20 Feb 2020 08:16:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
2967884
cf-ray
567f0a1c5aa7d6fd-FRA
status
200
vary
Accept-Encoding
content-length
21564
x-xss-protection
1; mode=block
last-modified
Thu, 16 Jan 2020 23:42:40 GMT
server
cloudflare
etag
"5e20f4f0-543c"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=300; includeSubdomains
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 15 Jan 2021 23:51:50 GMT
common.bundle.b9167d06dc7bd01b59d6d6332d6aafa1.js
c.disquscdn.com/next/embed/
0
89 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/common.bundle.b9167d06dc7bd01b59d6d6332d6aafa1.js
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:4da6 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
empty

Response headers

date
Thu, 20 Feb 2020 08:16:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
1103678
cf-ray
567f0a1c5aacd6fd-FRA
status
200
vary
Accept-Encoding
content-length
90471
x-xss-protection
1; mode=block
last-modified
Tue, 04 Feb 2020 01:14:10 GMT
server
cloudflare
etag
"5e38c562-16167"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=300; includeSubdomains
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 03 Feb 2021 22:39:15 GMT
lounge.bundle.3c28b73070ee14be97ecb734e8aca3b4.js
c.disquscdn.com/next/embed/
0
108 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/lounge.bundle.3c28b73070ee14be97ecb734e8aca3b4.js
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:4da6 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
empty

Response headers

date
Thu, 20 Feb 2020 08:16:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
122846
cf-ray
567f0a1c5aafd6fd-FRA
status
200
vary
Accept-Encoding
content-length
110517
x-xss-protection
1; mode=block
last-modified
Wed, 12 Feb 2020 00:23:26 GMT
server
cloudflare
etag
"5e43457e-1afb5"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=300; includeSubdomains
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 17 Feb 2021 22:09:10 GMT
config.js
disqus.com/next/
0
6 KB
Other
General
Full URL
https://disqus.com/next/config.js
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.192.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
empty

Response headers

Timing-Allow-Origin
*
Date
Thu, 20 Feb 2020 08:16:37 GMT
X-Content-Type-Options
nosniff
Server
nginx
Age
44
X-Frame-Options
SAMEORIGIN
Connection
keep-alive
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Access-Control-Allow-Origin
*
Cache-Control
public, stale-while-revalidate=300, s-stalewhilerevalidate=3600, max-age=60
Strict-Transport-Security
max-age=300; includeSubdomains
Content-Type
application/javascript; charset=UTF-8
Content-Length
5443
X-XSS-Protection
1; mode=block
amp4ads-host-v0.js
cdn.ampproject.org/rtv/012002112037430/
20 KB
7 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012002112037430/amp4ads-host-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020013001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c3186a55bc67271424c17f202a5797f96d54a851d12249ff7ec152854e4017eb
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
796
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
7145
x-xss-protection
0
server
sffe
date
Thu, 20 Feb 2020 08:03:21 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"5c826442ea1b9f7a"
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 19 Feb 2021 08:03:21 GMT
amp4ads-v0.js
cdn.ampproject.org/rtv/012002112037430/ Frame ED38
201 KB
55 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012002112037430/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020013001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
83693e5de36f9cc42f540d09a10978348d85c6e7074a8ba9803e2646df7d95a1
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
3257
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
55865
x-xss-protection
0
server
sffe
date
Thu, 20 Feb 2020 07:22:20 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"726cd723e48be406"
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 19 Feb 2021 07:22:20 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012002112037430/v0/ Frame ED38
91 KB
27 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012002112037430/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020013001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7dec9dba8e7c23f46e9b3bca2287a7d6e2d59ad57cc9e8389b7fc00f268b71ca
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
3434
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27980
x-xss-protection
0
server
sffe
date
Thu, 20 Feb 2020 07:19:23 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"1fae760e2b8d4fc0"
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 19 Feb 2021 07:19:23 GMT
truncated
/ Frame ED38
213 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5524b36c96470485d9e42741ed77d4f32eb6365ce9a189d8441abb6db9328c8c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
amp4ads-v0.js
cdn.ampproject.org/rtv/012002112037430/ Frame 18A5
201 KB
55 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012002112037430/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020013001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
83693e5de36f9cc42f540d09a10978348d85c6e7074a8ba9803e2646df7d95a1
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
3257
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
55865
x-xss-protection
0
server
sffe
date
Thu, 20 Feb 2020 07:22:20 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"726cd723e48be406"
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 19 Feb 2021 07:22:20 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012002112037430/v0/ Frame 18A5
91 KB
27 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012002112037430/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020013001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7dec9dba8e7c23f46e9b3bca2287a7d6e2d59ad57cc9e8389b7fc00f268b71ca
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
3434
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27980
x-xss-protection
0
server
sffe
date
Thu, 20 Feb 2020 07:19:23 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"1fae760e2b8d4fc0"
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 19 Feb 2021 07:19:23 GMT
truncated
/ Frame 18A5
207 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
edb95b6c7fd1f6104ea228a605eb813665beb090fb11f7444b777713b50bef16

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
amp4ads-v0.js
cdn.ampproject.org/rtv/012002112037430/ Frame 66AA
201 KB
55 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012002112037430/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020013001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
83693e5de36f9cc42f540d09a10978348d85c6e7074a8ba9803e2646df7d95a1
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
3257
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
55865
x-xss-protection
0
server
sffe
date
Thu, 20 Feb 2020 07:22:20 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"726cd723e48be406"
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 19 Feb 2021 07:22:20 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012002112037430/v0/ Frame 66AA
91 KB
27 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012002112037430/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020013001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7dec9dba8e7c23f46e9b3bca2287a7d6e2d59ad57cc9e8389b7fc00f268b71ca
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
3434
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27980
x-xss-protection
0
server
sffe
date
Thu, 20 Feb 2020 07:19:23 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"1fae760e2b8d4fc0"
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 19 Feb 2021 07:19:23 GMT
truncated
/ Frame 66AA
213 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
65d11073847e1d0d08941d43cac3bc7e991e70c2bda1918c72961af8ac648dc6

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
15057868570340896021
tpc.googlesyndication.com/simgad/ Frame ED38
19 KB
19 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/15057868570340896021
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5472245f3b84e87158b1246237f2eb4b7135184da55452a1af5843d7f0105d85
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 19 Feb 2020 18:10:05 GMT
x-content-type-options
nosniff
age
50792
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
19522
x-xss-protection
0
last-modified
Wed, 19 Feb 2020 17:42:18 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 18 Feb 2021 18:10:05 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame ED38
0
307 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsv31jMwaj0miarUTdZJIOT8y67jlDYzHw5YeCBo9HStxFHFA36cIe8aTJDQlwjIi665LJyccfNyxBe1ZIdpks2uVLGpq6xBxAu4o3MMr-w4v_fxRLS27XAqmO1NpalbzmKlcRzRjNvs_MzGGrz0IOiYVPbXQHCHLl9MWsFd5bKtN4_DXkK9RaE4tFyGPdPlA6JYY34oITZseglBllQ00ffXZZgBUh9XBhELn2Sogvq6X7RjuLjZrR5SeJYg-dWS6aY4EkQfBWCVsvV6jK5ySg&sai=AMfl-YT6Ax0JZk4gPBAr_pgurC-vvJm8pDYEzFc0gVGUBircffja3MUZo2Lphd6bgwMXcFpbypHFHqA0SkJTpniRv8Zac5alaBU6TukFIGROla-px4kApf6G2zHO4dse4z95&sig=Cg0ArKJSzLXeidnCxudeEAE&adurl=
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.2 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 20 Feb 2020 08:16:37 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Thu, 20 Feb 2020 08:16:37 GMT
7324374746021245407
tpc.googlesyndication.com/simgad/ Frame 18A5
26 KB
26 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7324374746021245407
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c407d4783ffcb4e85907981e3c9b2f99a6c71ff28761085a593489781778936d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 19 Feb 2020 18:10:05 GMT
x-content-type-options
nosniff
age
50792
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
26912
x-xss-protection
0
last-modified
Wed, 19 Feb 2020 17:42:47 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 18 Feb 2021 18:10:05 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 18A5
0
280 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssqAxo8BfqaJJJ9K2LK7gdi9YPPJcmC5sY_HnUnzoUVwU5sav6TCuho-Y7SqEy1xRkzn1RbrltU_Ij2n9xnranoPCly7P3WLbDVV6UXI2Utw9YNvHFVXuK7bZiRDXCcEVgpkt55w-h7-xn4S1qvLBRGVLLEWqkq81rZDO2AUomwm2I-wZtdEEKXzwvF_WmlPoZImlAVrIJq6zOqdYU_AhRr45izbm7YDhv3BvGUCy8I0QDQygAPsVaRbcHI9QmDoIf5Q_cbk7Xq-UjrtdgeY-cbOYI&sai=AMfl-YSNexWT3hlxhgYYn97KAC_YD0yAzoBwYt1lSfkTCuAX_tFaOqI-68Y8y0fEcoH2eJCC59ro-TGhea1fg4jQ-pXE6weDnMLfkwNOEwmyeVw9ZiIcrQ8NNYcO36fDSS5J&sig=Cg0ArKJSzPm_sM9SdOBFEAE&adurl=
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.2 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 20 Feb 2020 08:16:37 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Thu, 20 Feb 2020 08:16:37 GMT
7324374746021245407
tpc.googlesyndication.com/simgad/ Frame 66AA
26 KB
26 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7324374746021245407
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c407d4783ffcb4e85907981e3c9b2f99a6c71ff28761085a593489781778936d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 19 Feb 2020 18:10:05 GMT
x-content-type-options
nosniff
age
50792
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
26912
x-xss-protection
0
last-modified
Wed, 19 Feb 2020 17:42:47 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 18 Feb 2021 18:10:05 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 66AA
0
281 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstD2G08RRrEM2NdHuKvw0F_4ZpGtzW99uyBPe0xYbqBrhId5uENJtTkmNV5jAKInhHBRjJRb-vZOoe8g2e2283VnSpx2LVDix-UgVSjXD0f-Lgmk055_QX0uquZG3oBkN1FGS1sl2-vHGcZ1CcyapDPwRQaAxECn4hsKirD-BWFt8lYYiNmVod1SCQiwu_sREnVlNdCANip5wUb-dUtBGdM7F0SkDqV2UZ7_1WtKamlesygwDOaGMsBkstRCKMbsdhgy-dy9bNxn22-_T4jMUNeT6j0Yw&sai=AMfl-YRt9V6ozqM_qxSbuOmGnYG3PJnWAGRCQygmV4AiQpLNfQiUFm-ZEdEMV51WEOxGfOn7cVdQQEIOEm6N0PP4672UE4IixKV7ITVUH5bPUtnSSSuSADuMdJyE4KQZZU-M&sig=Cg0ArKJSzO1bmpNTSJrTEAE&adurl=
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.2 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 20 Feb 2020 08:16:37 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Thu, 20 Feb 2020 08:16:37 GMT
l
www.google.com/ads/measurement/ Frame 66AA
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaSgoNgWUNXyO4Vks3wNl9tnDJz-xMbgZbchalAOWSItsuMZp0Sg730Ace7SLi4FnwyuxSPo
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

amp4ads-v0.js
cdn.ampproject.org/rtv/012002112037430/ Frame 9F89
201 KB
55 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012002112037430/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020013001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
83693e5de36f9cc42f540d09a10978348d85c6e7074a8ba9803e2646df7d95a1
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
3257
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
55865
x-xss-protection
0
server
sffe
date
Thu, 20 Feb 2020 07:22:20 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"726cd723e48be406"
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 19 Feb 2021 07:22:20 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012002112037430/v0/ Frame 9F89
91 KB
27 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012002112037430/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020013001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7dec9dba8e7c23f46e9b3bca2287a7d6e2d59ad57cc9e8389b7fc00f268b71ca
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
3434
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27980
x-xss-protection
0
server
sffe
date
Thu, 20 Feb 2020 07:19:23 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"1fae760e2b8d4fc0"
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 19 Feb 2021 07:19:23 GMT
truncated
/ Frame 9F89
212 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0592b0f7e9a3ffa089df12c38c15c2b214cfd5bcf811b7513c24b7add9d7745c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
amp4ads-v0.js
cdn.ampproject.org/rtv/012002112037430/ Frame B65A
201 KB
55 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012002112037430/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020013001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
83693e5de36f9cc42f540d09a10978348d85c6e7074a8ba9803e2646df7d95a1
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
3257
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
55865
x-xss-protection
0
server
sffe
date
Thu, 20 Feb 2020 07:22:20 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"726cd723e48be406"
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 19 Feb 2021 07:22:20 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012002112037430/v0/ Frame B65A
91 KB
27 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012002112037430/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020013001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7dec9dba8e7c23f46e9b3bca2287a7d6e2d59ad57cc9e8389b7fc00f268b71ca
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
3434
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27980
x-xss-protection
0
server
sffe
date
Thu, 20 Feb 2020 07:19:23 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"1fae760e2b8d4fc0"
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 19 Feb 2021 07:19:23 GMT
15057868570340896021
tpc.googlesyndication.com/simgad/ Frame B65A
19 KB
19 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/15057868570340896021
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020013001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5472245f3b84e87158b1246237f2eb4b7135184da55452a1af5843d7f0105d85
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 19 Feb 2020 18:10:05 GMT
x-content-type-options
nosniff
age
50792
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
19522
x-xss-protection
0
last-modified
Wed, 19 Feb 2020 17:42:18 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 18 Feb 2021 18:10:05 GMT
truncated
/ Frame B65A
206 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
75d404b17f98bb0df5282e62f573f84ed04431d00f3574e953934b0260c4f2c6

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
amp4ads-v0.js
cdn.ampproject.org/rtv/012002112037430/ Frame AB9A
201 KB
55 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012002112037430/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020013001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
83693e5de36f9cc42f540d09a10978348d85c6e7074a8ba9803e2646df7d95a1
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
3257
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
55865
x-xss-protection
0
server
sffe
date
Thu, 20 Feb 2020 07:22:20 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"726cd723e48be406"
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 19 Feb 2021 07:22:20 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012002112037430/v0/ Frame AB9A
91 KB
27 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012002112037430/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020013001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7dec9dba8e7c23f46e9b3bca2287a7d6e2d59ad57cc9e8389b7fc00f268b71ca
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
3434
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27980
x-xss-protection
0
server
sffe
date
Thu, 20 Feb 2020 07:19:23 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"1fae760e2b8d4fc0"
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 19 Feb 2021 07:19:23 GMT
713737757822001072
tpc.googlesyndication.com/simgad/ Frame 9F89
44 KB
44 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/713737757822001072
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0e100268f8f83bfb184ba2ad4feb278311aede978c543c33fcb2748d6383dce2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 19 Feb 2020 18:10:05 GMT
x-content-type-options
nosniff
age
50792
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
45429
x-xss-protection
0
last-modified
Wed, 19 Feb 2020 17:41:38 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 18 Feb 2021 18:10:05 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 9F89
0
291 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstS1W1ak4W8oitkYAIE2AF4IrVR-T4Mc9twoTKmtSE1q9jQYYX0twPhezSeIvHRVJN3iLeFBrkTUuKna5RtkQJbPtgWtzAL9q2ifM82YEGs7Ikaq1e4qvmqKR2kdJh1v16HhJV6NiUu-JHePmGwEQ80Ah-CQZ6wkfGmOFN48WXF7dLyUjiElkpyO6FEs27eicEKb_N7TVQNcKM23s71CwZVJp_C3T1hE4q3Fkie7osRE3ZzGPAYItfUaWUHohE4AE-lUboDpdUGgR-w7peMkjNPfiA&sai=AMfl-YTTkFOUFy5H1Bo56fdt69GxqZIcup_iiRRqL2M0Cwt6M-1b6GzamZR8gH9Hto6-TxJCxL3EFGidvHs4vlmdcvA4VRt-TpnG_lCpveSrT-nV3FxbMvsc7ihh2LFiiXO5&sig=Cg0ArKJSzCpQd4sP1Y-mEAE&adurl=
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.2 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 20 Feb 2020 08:16:37 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Thu, 20 Feb 2020 08:16:37 GMT
l
www.google.com/ads/measurement/ Frame 9F89
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaQZRC_TaKQmyJ4t1Av2r7kO_q_DGF6iJAfs5ynv9rmJBbrJSjCtv-jflurb2RDNWL_Mqrkv
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

view
securepubads.g.doubleclick.net/pcs/ Frame B65A
0
291 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvVbMIDWnj-BDInD4e-9eojcf1Jr_kL9ViynVH9Iutv9-DywsALkOjUEhOlvqe2WEw7Uf6QiDHWN7_Al_c3NZXR_f0b8da4yxAgryLlmfcwxYIuVjmiBBaiWivWd8q-m3fxuks2FzNJ26WqArQlOqf5Br17qHHYwFtFfJyQi5zpIq47hixe-w8Al1Lr8Lag30d1Twz1ATVj5asOeXBQvsp-XS3-VDoLhpdtTVdItPiFFa65aYXkm_78Pcspj9K4T4kCpgBbBbCCFI-Uj8UNSoiGEw&sai=AMfl-YSxtnUQChTSxUQgo3_OUtFyO0wRlhVMn0AJilHFwfLhUA_l_xBLcXzuRj5QOxgtz6nLR0qGOA-lfm-Beabole0klhpSbTCf5BHuMJ-12m9gvGI3eeIZ7zBAYQT4XCvl&sig=Cg0ArKJSzBIXHCfLOH9dEAE&adurl=
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.2 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 20 Feb 2020 08:16:37 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Thu, 20 Feb 2020 08:16:37 GMT
l
www.google.com/ads/measurement/ Frame B65A
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaRZPa6pDtUsrvrjqnBrTYSRMlcjiBwlM7jHcujeCLpm8rTKSDIohAfLysE62F5bQHNap0We
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

1646778300210692104
tpc.googlesyndication.com/simgad/ Frame AB9A
44 KB
44 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/1646778300210692104
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
fc7f700d02e4b65e6a97ea48937626284649cc2c67c113ae727efe2017f983d3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 05 Feb 2020 10:00:06 GMT
x-content-type-options
nosniff
age
1289791
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
44964
x-xss-protection
0
last-modified
Wed, 22 Jan 2020 17:12:54 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 04 Feb 2021 10:00:06 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame AB9A
0
282 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuWevci1-oZdMGOJLsmViP4nS7Q_4NGZ09Sf3hPJfUOm0F2A-xkZnXwkVxi4njf_kQJDkiEvxoTH1NTlXbBr1ENKSqfisC0zM_D9Lb5UBEEW12cHJ-Unx1653TuN02Bo0MnpR2hV_RsckFYuODGzrwaZF-I5zwyAyHkI8MwPsaQ9sG0Qhf87OIXU2EX4HuGJa_w1RnK0TcmnBGYExlbyfP8sGhhEFkTIB9xYMi1wbgO4jgmdGC02n9dg1aY6JEjtiKXb0E5dYwYJsw0FWE02ZvN&sai=AMfl-YR136UwWdyrYFSYG-spKFgiW2r_rqD54ExAOtVwBWlImPii_4imTZV4R6MGYOIqccHHHj1euK_OxS-Rkzd-7GrWA-O6rZtWFcxtmd-jspVumgZco_yhtKF_ipiCS5Bf&sig=Cg0ArKJSzDO4A65DbwldEAE&adurl=
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.2 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 20 Feb 2020 08:16:37 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Thu, 20 Feb 2020 08:16:37 GMT
l
www.google.com/ads/measurement/ Frame AB9A
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaRhxyt-zjJODqiUoOETT3wCPBPYvf2m5O0BHaZJAzMEzwPJJqhTaM1beb5Nh0KMJQjJQIgz
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

/
disqus.com/embed/comments/ Frame B725
0
0
Document
General
Full URL
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2Fhmh-lawsuit-a-13736&t_d=Hacked%20Off%3A%20Patients%20Sue%20Ransom-Paying%20Hospital%20Group&t_t=Hacked%20Off%3A%20Patients%20Sue%20Ransom-Paying%20Hospital%20Group&s_o=default
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.192.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ 'unsafe-inline' https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ https://apis.google.com https://www.google.com/recaptcha/ https://disqus.com
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Host
disqus.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9

Response headers

Server
nginx
Content-Security-Policy
script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ 'unsafe-inline' https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ https://apis.google.com https://www.google.com/recaptcha/ https://disqus.com
Link
<https://c.disquscdn.com>;rel=preconnect,<https://c.disquscdn.com>;rel=dns-prefetch
Cache-Control
stale-if-error=3600, s-stalewhilerevalidate=3600, stale-while-revalidate=30, no-cache, must-revalidate, public, s-maxage=5
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Timing-Allow-Origin
*
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Content-Type
text/html; charset=utf-8
Last-Modified
Tue, 18 Feb 2020 20:03:26 GMT
ETag
W/"lounge:view:7877385262.016955a1c7c4e26b190ca6f26c8f85cb.2"
Content-Encoding
gzip
Content-Length
2605
Date
Thu, 20 Feb 2020 08:16:38 GMT
Age
0
Connection
keep-alive
Vary
Accept-Encoding
Strict-Transport-Security
max-age=300; includeSubdomains
15057868570340896021
tpc.googlesyndication.com/simgad/ Frame ED38
19 KB
19 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/15057868570340896021
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012002112037430/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5472245f3b84e87158b1246237f2eb4b7135184da55452a1af5843d7f0105d85
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 19 Feb 2020 18:10:05 GMT
x-content-type-options
nosniff
age
50792
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
19522
x-xss-protection
0
last-modified
Wed, 19 Feb 2020 17:42:18 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 18 Feb 2021 18:10:05 GMT
7324374746021245407
tpc.googlesyndication.com/simgad/ Frame 18A5
26 KB
26 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7324374746021245407
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012002112037430/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c407d4783ffcb4e85907981e3c9b2f99a6c71ff28761085a593489781778936d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 19 Feb 2020 18:10:05 GMT
x-content-type-options
nosniff
age
50792
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
26912
x-xss-protection
0
last-modified
Wed, 19 Feb 2020 17:42:47 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 18 Feb 2021 18:10:05 GMT
7324374746021245407
tpc.googlesyndication.com/simgad/ Frame 66AA
26 KB
26 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7324374746021245407
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012002112037430/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c407d4783ffcb4e85907981e3c9b2f99a6c71ff28761085a593489781778936d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 19 Feb 2020 18:10:05 GMT
x-content-type-options
nosniff
age
50792
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
26912
x-xss-protection
0
last-modified
Wed, 19 Feb 2020 17:42:47 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 18 Feb 2021 18:10:05 GMT
713737757822001072
tpc.googlesyndication.com/simgad/ Frame 9F89
44 KB
44 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/713737757822001072
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012002112037430/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0e100268f8f83bfb184ba2ad4feb278311aede978c543c33fcb2748d6383dce2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 19 Feb 2020 18:10:05 GMT
x-content-type-options
nosniff
age
50793
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
45429
x-xss-protection
0
last-modified
Wed, 19 Feb 2020 17:41:38 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 18 Feb 2021 18:10:05 GMT
15057868570340896021
tpc.googlesyndication.com/simgad/ Frame B65A
19 KB
19 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/15057868570340896021
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012002112037430/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5472245f3b84e87158b1246237f2eb4b7135184da55452a1af5843d7f0105d85
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 19 Feb 2020 18:10:05 GMT
x-content-type-options
nosniff
age
50793
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
19522
x-xss-protection
0
last-modified
Wed, 19 Feb 2020 17:42:18 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 18 Feb 2021 18:10:05 GMT
realtime.af77184dec69e96e69aff958ae2bb738.css
c.disquscdn.com/next/embed/styles/ Frame CF49
337 B
348 B
Stylesheet
General
Full URL
https://c.disquscdn.com/next/embed/styles/realtime.af77184dec69e96e69aff958ae2bb738.css
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:4da6 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c284dcb06ef882b1b45e11e0a16baa223b4117eca94e243c8e725c4ce3f909b3
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Thu, 20 Feb 2020 08:16:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
1123122
cf-ray
567f0a1fca69d6fd-FRA
status
200
vary
Accept-Encoding
content-length
244
x-xss-protection
1; mode=block
last-modified
Tue, 04 Feb 2020 01:14:10 GMT
server
cloudflare
etag
"5e38c562-f4"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=300; includeSubdomains
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 04 Feb 2021 13:19:18 GMT
realtime.af77184dec69e96e69aff958ae2bb738.css
c.disquscdn.com/next/embed/styles/ Frame AF02
337 B
309 B
Stylesheet
General
Full URL
https://c.disquscdn.com/next/embed/styles/realtime.af77184dec69e96e69aff958ae2bb738.css
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:4da6 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c284dcb06ef882b1b45e11e0a16baa223b4117eca94e243c8e725c4ce3f909b3
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Thu, 20 Feb 2020 08:16:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
1123122
cf-ray
567f0a1fda70d6fd-FRA
status
200
vary
Accept-Encoding
content-length
244
x-xss-protection
1; mode=block
last-modified
Tue, 04 Feb 2020 01:14:10 GMT
server
cloudflare
etag
"5e38c562-f4"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=300; includeSubdomains
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 04 Feb 2021 13:19:18 GMT
ajax.php
www.databreachtoday.com/
16 B
511 B
XHR
General
Full URL
https://www.databreachtoday.com/ajax.php?json=marketoContactIdentification
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/javascripts-responsive/vendor/jquery.min.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
7cbe0f08ecfaae9f608237302eed00beab7ca27391ddbea6e5eae37299b91dfa

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Sec-Fetch-Dest
empty
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 20 Feb 2020 08:16:38 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/html; charset=UTF-8
Cache-Control
no-store, no-cache, must-revalidate
Transfer-Encoding
chunked
Connection
Keep-Alive
Keep-Alive
timeout=5, max=93
Expires
Thu, 19 Nov 1981 08:52:00 GMT
utsync.ashx
ml314.com/
733 B
2 KB
Script
General
Full URL
https://ml314.com/utsync.ashx?pub=&adv=&et=0&eid=57819&ct=js&pi=&fp=&clid=&if=0&ps=&cl=&mlt=&data=&&cp=https%3A%2F%2Fwww.databreachtoday.com%2Fhacked-off-patients-sue-ransom-paying-hospital-group-a-13736%3Frf%3D2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736%26mkt_tok%3DeyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9&pv=1582186598499_9zwuzdirr&bl=en-us&cb=7089651&return=&ht=&d=&dc=&si=1582186598499_9zwuzdirr&cid=&s=1600x1200&rp=http%3A%2F%2Flinks.ismgcorp.com%2FljXSN000pUSTeI0d30k051Z
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?2012020
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.215.103.126 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-215-103-126.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
210f2918796574eed53313f1c379fd3a7adc7d21d3aa1d4f03ec6b75b4161f54

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Pragma
no-cache
Date
Thu, 20 Feb 2020 08:16:38 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
p3P
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
Cache-Control
private
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Content-Length
500
Expires
0
ud.ashx
in.ml314.com/
20 B
481 B
Script
General
Full URL
https://in.ml314.com/ud.ashx?topiclimit=&cb=2012020
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?2012020
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.206.149.41 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-206-149-41.compute-1.amazonaws.com
Software
Microsoft-IIS/8.5 / ASP.NET
Resource Hash
d0e4a6372d6fb5ffe9505dbe9e94aee8f1b9b96ec8e5e20684cce8b4c5a88fa7

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 20 Feb 2020 08:16:38 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/8.5
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public
Connection
keep-alive
Content-Length
138
Expires
Fri, 21 Feb 2020 08:16:38 GMT
csync.ashx
ml314.com/
Redirect Chain
  • https://tags.bluekai.com/site/20486?limit=0&id=3608314821413437496&redir=https://ml314.com/csync.ashx%3Ffp=$_BK_UUID%26person_id=3608314821413437496%26eid=50056
  • https://ml314.com/csync.ashx?fp=rkLeBx9999OQWW8K&person_id=3608314821413437496&eid=50056
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=rkLeBx9999OQWW8K&person_id=3608314821413437496&eid=50056
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.215.103.126 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-215-103-126.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 20 Feb 2020 08:16:39 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Fri, 21 Feb 2020 03:16:39 GMT

Redirect headers

Location
https://ml314.com/csync.ashx?fp=rkLeBx9999OQWW8K&person_id=3608314821413437496&eid=50056
Date
Thu, 20 Feb 2020 08:16:39 GMT
Connection
keep-alive
Content-Length
0
BK-Server
448e
P3P
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV", policyref="http://tags.bluekai.com/w3c/p3p.xml"
csync.ashx
ml314.com/
Redirect Chain
  • https://idsync.rlcdn.com/395886.gif?partner_uid=3608314821413437496
  • https://idsync.rlcdn.com/1000.gif?memo=CO6UGBIeChoIARCuXxoTMzYwODMxNDgyMTQxMzQzNzQ5NhAAGg0I5oC58gUSBQjoBxAAQgBKAA
  • https://ml314.com/csync.ashx?fp=e3eec1cee059ea288258cd88947ae7f3ff707e636d07d469b3bfad46a36d6d19f4cb09cee1a4f8eb&person_id=3608314821413437496&eid=50082
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=e3eec1cee059ea288258cd88947ae7f3ff707e636d07d469b3bfad46a36d6d19f4cb09cee1a4f8eb&person_id=3608314821413437496&eid=50082
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.215.103.126 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-215-103-126.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 20 Feb 2020 08:16:38 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Fri, 21 Feb 2020 03:16:39 GMT

Redirect headers

date
Thu, 20 Feb 2020 08:16:39 GMT
via
1.1 google
location
https://ml314.com/csync.ashx?fp=e3eec1cee059ea288258cd88947ae7f3ff707e636d07d469b3bfad46a36d6d19f4cb09cee1a4f8eb&person_id=3608314821413437496&eid=50082
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
status
307
cache-control
no-cache, no-store
timing-allow-origin
*
alt-svc
clear
content-length
0
csync.ashx
ml314.com/
Redirect Chain
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=d0tro1j&ttd_tpi=1
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=d0tro1j&ttd_tpi=1
  • https://ml314.com/utsync.ashx?eid=53819&et=0&fp=3d4f7bb0-1836-4903-aa07-77b4694508f4
  • https://ml314.com/csync.ashx?fp=3d4f7bb0-1836-4903-aa07-77b4694508f4&person_id=3608314821413437496&eid=53819
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=3d4f7bb0-1836-4903-aa07-77b4694508f4&person_id=3608314821413437496&eid=53819
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.215.103.126 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-215-103-126.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 20 Feb 2020 08:16:38 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Fri, 21 Feb 2020 03:16:39 GMT

Redirect headers

Pragma
no-cache
Date
Thu, 20 Feb 2020 08:16:38 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
p3P
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
Location
https://ml314.com/csync.ashx?fp=3d4f7bb0-1836-4903-aa07-77b4694508f4&person_id=3608314821413437496&eid=53819
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
0,Fri, 21 Feb 2020 03:16:38 GMT
csync.ashx
ml314.com/
Redirect Chain
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3608314821413437496
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3608314821413437496
  • https://ml314.com/csync.ashx?fp=394d68cbb2b5f374ec2a2305fd43a134&eid=50146&person_id=3608314821413437496
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=394d68cbb2b5f374ec2a2305fd43a134&eid=50146&person_id=3608314821413437496
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.215.103.126 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-215-103-126.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 20 Feb 2020 08:16:38 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Fri, 21 Feb 2020 03:16:38 GMT

Redirect headers

Pragma
no-cache
Date
Thu, 20 Feb 2020 08:16:38 GMT
P3P
CP=NOI DSP COR NID PSAa PSDa OUR UNI COM NAV
Location
https://ml314.com/csync.ashx?fp=394d68cbb2b5f374ec2a2305fd43a134&eid=50146&person_id=3608314821413437496
Cache-Control
no-cache
X-Server
10.45.1.87
Connection
keep-alive
Content-Length
0
Expires
0
pixel
ps.eyeota.net/
0
344 B
Image
General
Full URL
https://ps.eyeota.net/pixel?pid=r8hrb20&t=gif
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
3.121.27.153 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-121-27-153.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Thu, 20 Feb 2020 08:16:38 GMT
Content-Length
0
P3P
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR SAMo BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR", policyref="http://ps.eyeota.net/w3c/p3p.xml"
activeview
pagead2.googlesyndication.com/pcs/ Frame ED38
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsseZo0XI_C4X5oT7RWcuZ-HdC1VAgRXAuz-SJNXZZjJPn8mEKodTKFGIedxvE_YmeByX9wHAQ3tIhbGjgT2rrYh0wq-YyP-oEveySU7LR8&sig=Cg0ArKJSzOjZLpuLpbKcEAE&id=ampim&o=629,71&d=728,90&ss=1600,1200&bs=1600,1200&mcvt=1000&mtos=0,0,1000,1000,1000&tos=0,0,1000,0,0&tfs=134&tls=1134&g=100&h=100&tt=1134&r=v&adk=3278784386&avms=ampa
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 20 Feb 2020 08:16:39 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 18A5
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsurddY5q86qmAvs5WWSmCQRNgOTnl6bUn4U8XYPxLeB-8Z424tQIJ_rZyAIVwWq6lVWqEn1WZxfeP2sWsVSYwrvSv06TKGWFMs9exEiXrA&sig=Cg0ArKJSzOZnNaaXzM1QEAE&id=ampim&o=1033,592&d=300,250&ss=1600,1200&bs=1600,1200&mcvt=1000&mtos=0,0,1000,1000,1000&tos=0,0,1000,0,0&tfs=112&tls=1112&g=100&h=100&tt=1112&r=v&adk=2977291722&avms=ampa
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 20 Feb 2020 08:16:39 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
bundle.099e61e16efedea507ca37360f78f15f.js
vue.comm100.com/js/ Frame 13C6
1002 KB
243 KB
Script
General
Full URL
https://vue.comm100.com/js/bundle.099e61e16efedea507ca37360f78f15f.js
Requested by
Host: vue.comm100.com
URL: https://vue.comm100.com/livechat.ashx?siteId=92035
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.20.4.43 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
0a076a70f1f327ba3be434082c06613f8fe53c89e79ab12f524ff0b662c3043f

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 20 Feb 2020 08:16:39 GMT
content-encoding
gzip
cf-cache-status
HIT
age
4084005
x-powered-by
ASP.NET
status
200
content-length
248215
last-modified
Wed, 11 Dec 2019 21:20:34 GMT
server
cloudflare
etag
"03dfad268b0d51:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
cf-ray
567f0a255fe6e5e8-LHR
bis-hdr.desktop.r2.js
www.databreachtoday.com/javascripts-responsive/
2 KB
906 B
Script
General
Full URL
https://www.databreachtoday.com/javascripts-responsive/bis-hdr.desktop.r2.js
Requested by
Host: www.databreachtoday.com
URL: https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
a952a44375a3d8c869e96f85505fcbae076f4226021f08676a1b4627152252d0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Thu, 20 Feb 2020 08:16:39 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=92
Content-Length
595
sodar
pagead2.googlesyndication.com/getconfig/
7 KB
5 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=2020013001&st=env
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020013001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
58626ecd672350c8d1866dacf81de570d63567bb5b8c6ec5e569651a7b4702fe
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Origin
https://www.databreachtoday.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 20 Feb 2020 08:16:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
5178
x-xss-protection
0
truncated
/ Frame AB9A
214 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
983469805dab10fae02e41229a9a6c0a0ce233704df1709ec1e9f86ee0724dea

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
visitor.ashx
chatserver3.comm100.com/ Frame 13C6
996 B
837 B
XHR
General
Full URL
https://chatserver3.comm100.com/visitor.ashx?siteId=92035
Requested by
Host: vue.comm100.com
URL: https://vue.comm100.com/js/bundle.099e61e16efedea507ca37360f78f15f.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.20.4.43 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
43e83158d97ef3ea049cc7c9887aa4d3b2972d943f1ce4cfd7d334d28bfdedcb

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Origin
https://www.databreachtoday.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Thu, 20 Feb 2020 08:16:39 GMT
content-encoding
gzip
cf-cache-status
DYNAMIC
x-aspnet-version
4.0.30319
x-powered-by
ASP.NET
p3p
CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
status
200
content-length
546
x-robots-tag
noindex, nofollow
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
content-type
text/json; charset=utf-8
access-control-allow-origin
https://www.databreachtoday.com
cache-control
private
access-control-allow-credentials
true
cf-ray
567f0a268a40e5e8-LHR
access-control-allow-headers
Content-type,api-key,Authorization,X-Requested-With
64ead273d1f41aa7
pixel.sitescout.com/iap/
Redirect Chain
  • https://pixel-a.basis.net/iap/64ead273d1f41aa7
  • https://pixel.sitescout.com/iap/64ead273d1f41aa7
0
248 B
Image
General
Full URL
https://pixel.sitescout.com/iap/64ead273d1f41aa7
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
66.155.71.25 Portsmouth, United Kingdom, ASN13768 (COGECO-PEER1, CA),
Reverse DNS
Software
AC1.1 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 20 Feb 2020 08:16:39 GMT
Cache-Control
max-age=0,no-cache,no-store
Expires
Tue, 11 Oct 1977 12:34:56 GMT
Server
AC1.1
P3P
CP="NON DEVa PSAa PSDa OUR NOR NAV",policyref="/w3c/p3p.xml"

Redirect headers

Location
https://pixel.sitescout.com/iap/64ead273d1f41aa7
Content-length
0
sodar2.js
tpc.googlesyndication.com/sodar/
21 KB
8 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020013001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
9d6757384f86ea93a46cf05a185da797dd19a39053a0cc6e64759598f2bc05c0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Thu, 20 Feb 2020 08:16:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1580338855439378"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
8104
x-xss-protection
0
expires
Thu, 20 Feb 2020 08:16:39 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/206/ Frame 7CC7
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/206/runner.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/206/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
4624
date
Thu, 20 Feb 2020 07:44:27 GMT
expires
Fri, 19 Feb 2021 07:44:27 GMT
last-modified
Tue, 19 Nov 2019 17:13:16 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
1932
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
gen_204
pagead2.googlesyndication.com/pagead/
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=206&t=2&li=gpt_2020013001&jk=552940412284665&bg=!7-yl7PRYRVXaTQRdhQcCAAAAQVIAAAAKmQFj0dyF9tjZgqiTf_okPAIk0PScU_4VQbDrdh7EgVHH2MQFLtoMbyQDIBQ_EXecW0efkXq661yJP0NuAeN8lKvEson_j0W37Rkd_R2RVrC769Nzpve8YIf-DqmVJMYVcsuaaVH0HQmhesjlZZujMCnL3qWqRARvQ8u4zj3d7_rJp7S72IjF9eDQzIUHgPPUlmoWlQPKgrgkdLJbafKmH0JlgW0WUBLfMTLK4H_ezspGxnVze1hI3v6_UN3xY9WBNNIdo4NDnP9m9L3zX-LNJVsVHs1Iuw4mn1z5a38xINdVa2Pfoj7Vq42xuIZ3KhWqmB7gNzEl2FtUq-LGk8k0jDX8QVp0jI5trNDWpu3VeNuCiNl8Nr_ijilyuociBBnoUV8GhNap3ueO3X3-iYEwE8AqaDrxS287TNMbKTFnlgLRSxraVt6rHVL9gM1tm_s6Cb9yo-oxKt_g3FnIbN_XFIuHnV8lzA
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 20 Feb 2020 08:16:39 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
visitor.ashx
chatserver3.comm100.com/ Frame 13C6
1 KB
982 B
XHR
General
Full URL
https://chatserver3.comm100.com/visitor.ashx?siteId=92035
Requested by
Host: vue.comm100.com
URL: https://vue.comm100.com/js/bundle.099e61e16efedea507ca37360f78f15f.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.20.4.43 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
63649f050e1d643f808774ac2e57eaae71e8f86618c73bdc4021d00119b29310

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Origin
https://www.databreachtoday.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Thu, 20 Feb 2020 08:16:39 GMT
content-encoding
gzip
cf-cache-status
DYNAMIC
x-aspnet-version
4.0.30319
x-powered-by
ASP.NET
p3p
CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
status
200
content-length
826
x-robots-tag
noindex, nofollow
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
content-type
text/json; charset=utf-8
access-control-allow-origin
https://www.databreachtoday.com
cache-control
private
access-control-allow-credentials
true
cf-ray
567f0a27bc79e5e8-LHR
access-control-allow-headers
Content-type,api-key,Authorization,X-Requested-With
campaign.ashx
chatserver3.comm100.com/ Frame 13C6
6 KB
3 KB
XHR
General
Full URL
https://chatserver3.comm100.com/campaign.ashx?siteId=92035&campaignId=1275&lastUpdateTime=75567E86D28614B61879350BF24B10CF3D5F2F97D558627059BACCEACEA691D0
Requested by
Host: vue.comm100.com
URL: https://vue.comm100.com/js/bundle.099e61e16efedea507ca37360f78f15f.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.20.4.43 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
75567e86d28614b61879350bf24b10cf3d5f2f97d558627059bacceacea691d0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
Origin
https://www.databreachtoday.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 20 Feb 2020 08:16:40 GMT
content-encoding
gzip
cf-cache-status
DYNAMIC
x-aspnet-version
4.0.30319
x-powered-by
ASP.NET
cf-ray
567f0a295b25e620-LHR
status
200
content-length
2617
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/json; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000
x-robots-tag
noindex, nofollow
access-control-allow-headers
Content-type,api-key,Authorization,X-Requested-With
activeview
pagead2.googlesyndication.com/pcs/ Frame AB9A
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjst0Veu1i9XT580GLOv_NBflT-fF0B8QWPftMO0nxoOB7Gu2FdlGZ-q1AYljJqaMCLi1mLuKBVoNHj5A38Rj88Tgd6RNSksYUSsY_OlesGU&sig=Cg0ArKJSzGEyXuL6KxO4EAE&id=ampim&o=0,0&d=640,480&ss=1600,1200&bs=1600,1200&mcvt=1000&mtos=0,0,0,1000,1000&tos=0,0,0,1000,0&tfs=1439&tls=2439&g=100&h=100&tt=2440&r=v&adk=1097209948&avms=ampa
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Thu, 20 Feb 2020 08:16:40 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
URL
https://f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/ondemand-preview-w-255.mp4

Verdicts & Comments Add Verdict or Comment

185 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| $ function| jQuery object| html5 object| Modernizr object| jQuery19109570164301099575 object| mejs function| MediaElement object| HtmlMediaElement function| onYouTubePlayerAPIReady function| DefaultPlayer function| MediaElementPlayer number| mce-data-1e1gqn23i object| tinyMCE object| tinymce function| des function| des_createKeys function| stringToHex function| hexToString function| readCookie function| disqus_config object| googletag object| top_banner_display object| dataLayer function| atwpjp string| _atd function| _euc function| _duc object| _atc string| _atr object| addthis string| addthis_pub function| emdot object| _ate object| _adr object| addthis_conf function| addthis_open function| addthis_close function| addthis_sendto function| importScript function| cleanExistingScript function| refreshJavascript string| base_url string| base_url_auto string| ssl_base string| services_url string| includes_url object| video_intro object| audio_data boolean| rsa_page boolean| ceo_page boolean| interview_page boolean| article_page boolean| is_gatedasset number| videoAskLoginTime number| videoStart boolean| identified_user boolean| display_videologin string| current_page string| session_id boolean| user_is_acq object| login_reload_pages object| scrollTopPages string| popup_to_open string| marketo_contact_identification_ajax object| all_states object| all_countries_with_states string| webinar_auto_click_register string| webinar_auto_click_register_slot string| __family__ boolean| exclude_pre_roll object| user_email number| ENTER_KEY string| register_source undefined| opened_modal undefined| do_hashchange function| closeCookieTerms function| uncheckGroupInputs function| submitFormPopup function| setMembershipPrices function| updatePriceBox function| forgotPassword function| generateHash2w function| login function| register function| pagination function| scrollTO function| showAlert function| assetPrequalSubmit function| addToBriefcase function| toggleDdlsByValue function| populateStates function| registerFormShowErrors function| recordLead function| initAudio function| initVideos function| togglePrePostTime function| jumpSlide function| initVideoEvents function| URLToObj function| timedPopUpCount function| initAutoPopups function| initAJAXpopups function| checkClassicPopupPrequalErrors function| submitPopupAction function| saveToMyJobs function| initEmailSubscriptionsValidation function| emailSubscriptionsUncheckAll function| showPopupOnDemand function| sendAssetEmail function| runStrikesOnMKTLeadIdentification number| width function| isMobile boolean| isDesktop function| addClassToMenuItem function| addClassToDropDown function| removeClassFromMenuItem function| removeClassFromDropDown function| clearDropDowns function| showDropDown function| hideDropDown function| showDropDown2 function| hideDropDown2 string| disqus_shortname string| disqus_url string| GoogleAnalyticsObject function| ga object| _ml string| _bizo_data_partner_id object| Comm100API object| comm100_chatButton object| comm100_lc object| comm100_s number| top_banner_display_interval object| jQBrowser boolean| pp_alreadyInitialized boolean| doresize object| scroll_pos string| url boolean| hashtag object| addthis_share object| addthis_config boolean| notifications object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken object| google_tag_manager function| lintrk boolean| _already_called_lintrk object| google_tag_data object| gaplugins object| gaGlobal object| gaData object| oattr function| mktoMunchkinFunction object| Munchkin function| mktoMunchkin object| MunchkinTracker number| google_srt undefined| google_measure_js_timing number| __google_ad_urls_id number| google_unique_id function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter boolean| __@@##MUH object| DISQUS object| __google_ad_urls object| ampInaboxIframes object| ampInaboxPendingMessages object| __AMP_LOG object| __AMP_ERRORS boolean| ampInaboxInitialized object| __AMP_MODE function| __AMP_REPORT_ERROR object| ampInaboxPositionObserver object| ampInaboxFrameOverlayManager object| AMP object| GoogleGcLKhOms function| showSearch function| hideSearch object| google_image_requests

0 Cookies

7 Console Messages

Source Level URL
Text
console-api debug URL: https://munchkin.marketo.net/156/munchkin.js(Line 19)
Message:
Munchkin.init("%s") options: 051-ZXI-237 [object Object]
console-api info URL: https://cdn.ampproject.org/rtv/012002112037430/amp4ads-v0.js(Line 409)
Message:
Powered by AMP ⚡ HTML – Version 2002112037430 https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
console-api info URL: https://cdn.ampproject.org/rtv/012002112037430/amp4ads-v0.js(Line 409)
Message:
Powered by AMP ⚡ HTML – Version 2002112037430 https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
console-api info URL: https://cdn.ampproject.org/rtv/012002112037430/amp4ads-v0.js(Line 409)
Message:
Powered by AMP ⚡ HTML – Version 2002112037430 https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
console-api info URL: https://cdn.ampproject.org/rtv/012002112037430/amp4ads-v0.js(Line 409)
Message:
Powered by AMP ⚡ HTML – Version 2002112037430 https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
console-api info URL: https://cdn.ampproject.org/rtv/012002112037430/amp4ads-v0.js(Line 409)
Message:
Powered by AMP ⚡ HTML – Version 2002112037430 https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9
console-api info URL: https://cdn.ampproject.org/rtv/012002112037430/amp4ads-v0.js(Line 409)
Message:
Powered by AMP ⚡ HTML – Version 2002112037430 https://www.databreachtoday.com/hacked-off-patients-sue-ransom-paying-hospital-group-a-13736?rf=2020-02-19_ENEWS_ACQ_IR__Banner_ATN_ART13736&mkt_tok=eyJpIjoiTjJNMU1qbGlZak5oTXpnNCIsInQiOiJ0S21XTTJ5WDB1NzBESEZyOXNsYXc2TlFaUGJjelRvRnpVYys3NDNMWklQVFpiUEhacjR5R3lyUTMwdXgwc1Nzd2ZQdTZaZjNwNUkrMjVQS1BVNEQ3dkROWkloM2Y5TUpHeFRidlhzRkxLOWhXWnc2ZGtSREpuTnFkRE54eWlhZTFrUXlvZFU4aTlodzVmbWVqZG9QUUE9PSJ9

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com
051-zxi-237.mktoresp.com
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com
adservice.google.com
adservice.google.de
bankinfosecurity.disqus.com
c.disquscdn.com
cdn.ampproject.org
chatserver.comm100.com
chatserver3.comm100.com
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com
disqus.com
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com
fonts.googleapis.com
fonts.gstatic.com
idsync.rlcdn.com
in.ml314.com
links.ismgcorp.com
match.adsrvr.org
ml314.com
munchkin.marketo.net
pagead2.googlesyndication.com
pbs.twimg.com
pixel-a.basis.net
pixel.sitescout.com
ps.eyeota.net
px.ads.linkedin.com
s7.addthis.com
securepubads.g.doubleclick.net
sjs.bizographics.com
stats.g.doubleclick.net
sync.crwdcntrl.net
tags.bluekai.com
tpc.googlesyndication.com
v1.addthisedge.com
vue.comm100.com
worker.ismgcorp.com
www.databreachtoday.com
www.google-analytics.com
www.google.com
www.googletagmanager.com
www.googletagservices.com
www.linkedin.com
z.moatads.com
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
104.130.251.6
104.20.4.43
151.101.12.134
151.101.192.134
172.217.22.2
192.28.147.68
199.15.215.8
23.210.248.44
23.210.249.12
23.210.250.213
23.45.237.36
2606:2800:134:fa2:1627:1fe:edb:1665
2606:4700::6810:4da6
2a00:1450:4001:806::2002
2a00:1450:4001:806::200e
2a00:1450:4001:808::200a
2a00:1450:4001:80b::2008
2a00:1450:4001:815::2003
2a00:1450:4001:816::2002
2a00:1450:4001:81e::2001
2a00:1450:4001:820::2004
2a00:1450:4001:821::2001
2a00:1450:4001:824::2002
2a00:1450:400c:c00::9d
2a02:26f0:f1:28a::3adf
2a05:f500:11:101::b93f:9001
2a05:f500:11:101::b93f:9005
3.121.27.153
34.206.149.41
35.190.72.21
50.56.167.254
52.19.221.77
52.215.103.126
52.49.13.31
66.155.71.25
95.101.176.176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