URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_bran...
Submission: On January 12 via api from US

Summary

This website contacted 55 IPs in 8 countries across 38 domains to perform 218 HTTP transactions. The main IP is 50.31.169.131, located in Elk Grove Village, United States and belongs to SERVERCENTRAL - Server Central Network, US. The main domain is arstechnica.com.
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on January 16th 2019. Valid for: 2 years.
This is the only time arstechnica.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 50.31.169.131 23352 (SERVERCEN...)
16 205.234.175.175 30081 (CACHENETW...)
3 2a00:1450:400... 15169 (GOOGLE)
3 13.225.86.250 16509 (AMAZON-02)
6 23.210.249.164 16625 (AKAMAI-AS)
30 23.210.250.213 16625 (AKAMAI-AS)
1 143.204.101.48 16509 (AMAZON-02)
3 143.204.101.13 16509 (AMAZON-02)
2 2606:4700::68... 13335 (CLOUDFLAR...)
3 151.139.128.10 20446 (HIGHWINDS3)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
7 172.217.23.98 15169 (GOOGLE)
2 23.210.250.44 16625 (AKAMAI-AS)
2 34.196.100.8 14618 (AMAZON-AES)
2 13.225.84.221 16509 (AMAZON-02)
1 52.19.1.241 16509 (AMAZON-02)
2 151.101.12.239 54113 (FASTLY)
1 3 35.190.59.101 15169 (GOOGLE)
2 35.201.67.47 15169 (GOOGLE)
2 2606:4700::68... 13335 (CLOUDFLAR...)
1 2600:9000:215... 16509 (AMAZON-02)
15 52.2.37.193 ()
1 178.250.2.130 44788 (ASN-CRITE...)
1 52.208.195.87 16509 (AMAZON-02)
1 143.204.101.91 16509 (AMAZON-02)
6 2a00:1450:400... 15169 (GOOGLE)
7 152.195.132.202 15133 (EDGECAST)
1 35.177.62.3 16509 (AMAZON-02)
3 2a00:1450:400... 15169 (GOOGLE)
1 34.206.220.9 14618 (AMAZON-AES)
1 2a00:1450:400... 15169 (GOOGLE)
1 35.190.40.172 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
6 34.194.193.74 14618 (AMAZON-AES)
2 34.231.252.38 14618 (AMAZON-AES)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
26 13.225.84.173 16509 (AMAZON-02)
1 2606:4700:10:... 13335 (CLOUDFLAR...)
3 2a00:1450:400... 15169 (GOOGLE)
4 13.225.84.169 16509 (AMAZON-02)
2 34.230.243.129 14618 (AMAZON-AES)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a03:2880:f02... 32934 (FACEBOOK)
5 143.204.101.95 16509 (AMAZON-02)
7 95.100.198.32 16625 (AKAMAI-AS)
1 35.244.174.68 15169 (GOOGLE)
1 64.202.112.95 22075 (AS-OUTBRAIN)
1 2a03:2880:f02... 32934 (FACEBOOK)
8 20 152.199.21.89 15133 (EDGECAST)
2 178.250.2.152 44788 (ASN-CRITE...)
2 69.173.144.141 26667 (RUBICONPR...)
1 151.101.114.2 54113 (FASTLY)
1 70.42.32.95 22075 (AS-OUTBRAIN)
218 55
Apex Domain
Subdomains
Transfer
37 cloudfront.net
d1z2jf7jlzjs58.cloudfront.net
dwgyu36up6iuz.cloudfront.net
d2c8v52ll5s99u.cloudfront.net
dp8hsntg6do36.cloudfront.net
2 MB
31 moatads.com
z.moatads.com
mb.moatads.com
px.moatads.com
174 KB
25 condenastdigital.com
pixel.condenastdigital.com
capture.condenastdigital.com
infinityid.condenastdigital.com
4d.condenastdigital.com
wren.condenastdigital.com
23 KB
20 advertising.com
adserver-us.adtech.advertising.com
9 KB
16 arstechnica.net
cdn.arstechnica.net
591 KB
8 outbrainimg.com
tcheck.outbrainimg.com
log.outbrainimg.com
images.outbrainimg.com
39 KB
8 doubleclick.net
securepubads.g.doubleclick.net
stats.g.doubleclick.net
pubads.g.doubleclick.net
103 KB
8 skimresources.com
s.skimresources.com
r.skimresources.com
t.skimresources.com
p.skimresources.com
17 KB
7 cookielaw.org
cdn.cookielaw.org
164 KB
6 google-analytics.com
www.google-analytics.com
19 KB
5 cnevids.com
player.cnevids.com
api.cnevids.com
63 KB
4 casalemedia.com
as-sec.casalemedia.com
3 KB
4 outbrain.com
widgets.outbrain.com
odb.outbrain.com
mcdp-nydc1.outbrain.com
49 KB
4 google.com
adservice.google.com
ampcid.google.com
www.google.com
857 B
3 googleapis.com
imasdk.googleapis.com
116 KB
3 parsely.com
srv-2020-01-12-12.config.parsely.com
srv-2020-01-12-12.pixel.parsely.com
1 KB
3 googlesyndication.com
tpc.googlesyndication.com
3 google.de
adservice.google.de
ampcid.google.de
www.google.de
1 KB
3 amazon-adsystem.com
c.amazon-adsystem.com
29 KB
2 rubiconproject.com
fastlane.rubiconproject.com
1 KB
2 criteo.com
bidder.criteo.com
522 B
2 facebook.net
connect.facebook.net
143 KB
2 polarcdn-terrax.com
polarcdn-terrax.com
603 B
2 mediavoice.com
cdn.mediavoice.com
plugin.mediavoice.com
127 KB
2 actionbutton.co
embed.actionbutton.co
prod-native.actionbutton.co
17 KB
2 indexww.com
js-sec.indexww.com
37 KB
2 googletagservices.com
www.googletagservices.com
44 KB
2 arstechnica.com
arstechnica.com
16 KB
1 facebook.com
an.facebook.com
1 KB
1 rlcdn.com
api.rlcdn.com
203 B
1 2mdn.net
s0.2mdn.net
11 KB
1 onetrust.com
geolocation.onetrust.com
520 B
1 consensu.org
api.skimlinks.mgr.consensu.org
636 B
1 rkdms.com
mid.rkdms.com
1 adsrvr.org
match.adsrvr.org
536 B
1 criteo.net
static.criteo.net
28 KB
1 zqtk.net
segment-data.zqtk.net
553 B
1 googletagmanager.com
www.googletagmanager.com
71 KB
218 38
Domain Requested by
28 px.moatads.com arstechnica.com
26 dwgyu36up6iuz.cloudfront.net arstechnica.com
d2c8v52ll5s99u.cloudfront.net
20 adserver-us.adtech.advertising.com 8 redirects arstechnica.com
16 cdn.arstechnica.net arstechnica.com
15 capture.condenastdigital.com arstechnica.com
7 cdn.cookielaw.org www.googletagmanager.com
cdn.cookielaw.org
6 images.outbrainimg.com arstechnica.com
6 www.google-analytics.com www.googletagmanager.com
www.google-analytics.com
6 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
5 wren.condenastdigital.com cdn.arstechnica.net
5 dp8hsntg6do36.cloudfront.net arstechnica.com
d2c8v52ll5s99u.cloudfront.net
4 as-sec.casalemedia.com js-sec.indexww.com
4 d2c8v52ll5s99u.cloudfront.net player.cnevids.com
imasdk.googleapis.com
d2c8v52ll5s99u.cloudfront.net
3 imasdk.googleapis.com player.cnevids.com
imasdk.googleapis.com
3 tpc.googlesyndication.com securepubads.g.doubleclick.net
3 r.skimresources.com 1 redirects arstechnica.com
3 player.cnevids.com arstechnica.com
cdn.arstechnica.net
player.cnevids.com
3 c.amazon-adsystem.com arstechnica.com
c.amazon-adsystem.com
2 fastlane.rubiconproject.com js-sec.indexww.com
2 bidder.criteo.com static.criteo.net
2 connect.facebook.net d2c8v52ll5s99u.cloudfront.net
connect.facebook.net
2 srv-2020-01-12-12.pixel.parsely.com arstechnica.com
2 4d.condenastdigital.com pixel.condenastdigital.com
2 polarcdn-terrax.com cdn.mediavoice.com
plugin.mediavoice.com
2 p.skimresources.com arstechnica.com
2 t.skimresources.com arstechnica.com
s.skimresources.com
2 pixel.condenastdigital.com arstechnica.com
2 d1z2jf7jlzjs58.cloudfront.net arstechnica.com
d1z2jf7jlzjs58.cloudfront.net
2 api.cnevids.com cdn.arstechnica.net
2 widgets.outbrain.com cdn.arstechnica.net
widgets.outbrain.com
2 adservice.google.com www.googletagservices.com
imasdk.googleapis.com
2 z.moatads.com arstechnica.com
d2c8v52ll5s99u.cloudfront.net
2 js-sec.indexww.com arstechnica.com
2 www.googletagservices.com arstechnica.com
securepubads.g.doubleclick.net
2 arstechnica.com cdn.arstechnica.net
1 mcdp-nydc1.outbrain.com widgets.outbrain.com
1 pubads.g.doubleclick.net d2c8v52ll5s99u.cloudfront.net
1 odb.outbrain.com widgets.outbrain.com
1 an.facebook.com js-sec.indexww.com
1 log.outbrainimg.com widgets.outbrain.com
1 api.rlcdn.com js-sec.indexww.com
1 tcheck.outbrainimg.com widgets.outbrain.com
1 s0.2mdn.net imasdk.googleapis.com
1 geolocation.onetrust.com cdn.cookielaw.org
1 www.google.de arstechnica.com
1 www.google.com 1 redirects
1 stats.g.doubleclick.net 1 redirects
1 infinityid.condenastdigital.com pixel.condenastdigital.com
1 ampcid.google.de www.google-analytics.com
1 api.skimlinks.mgr.consensu.org s.skimresources.com
1 ampcid.google.com www.google-analytics.com
1 srv-2020-01-12-12.config.parsely.com d1z2jf7jlzjs58.cloudfront.net
1 mb.moatads.com z.moatads.com
1 mid.rkdms.com js-sec.indexww.com
1 match.adsrvr.org js-sec.indexww.com
1 static.criteo.net js-sec.indexww.com
1 prod-native.actionbutton.co embed.actionbutton.co
1 plugin.mediavoice.com cdn.mediavoice.com
1 segment-data.zqtk.net arstechnica.com
1 adservice.google.de www.googletagservices.com
1 www.googletagmanager.com arstechnica.com
1 s.skimresources.com arstechnica.com
1 cdn.mediavoice.com arstechnica.com
1 embed.actionbutton.co arstechnica.com
218 64
Subject Issuer Validity Valid
*.arstechnica.com
Sectigo RSA Domain Validation Secure Server CA
2019-01-16 -
2021-01-15
2 years crt.sh
*.cachefly.net
GlobalSign RSA OV SSL CA 2018
2019-12-03 -
2021-10-29
2 years crt.sh
*.g.doubleclick.net
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
c.amazon-adsystem.com
Amazon
2019-10-07 -
2020-09-29
a year crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2019-07-17 -
2020-03-09
8 months crt.sh
moatads.com
DigiCert ECC Secure Server CA
2018-11-10 -
2020-02-09
a year crt.sh
*.actionbutton.co
Go Daddy Secure Certificate Authority - G2
2019-06-25 -
2020-06-27
a year crt.sh
*.cnevids.com
Amazon
2019-05-14 -
2020-03-07
10 months crt.sh
ssl962336.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-11-12 -
2020-05-20
6 months crt.sh
*.skimresources.com
DigiCert SHA2 Secure Server CA
2018-09-13 -
2020-10-07
2 years crt.sh
*.google-analytics.com
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
*.google.com
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
*.outbrain.com
DigiCert SHA2 Secure Server CA
2018-12-14 -
2020-03-14
a year crt.sh
*.cloudfront.net
DigiCert Global CA G2
2019-07-17 -
2020-07-05
a year crt.sh
*.zqtk.net
COMODO RSA Domain Validation Secure Server CA
2018-08-09 -
2020-08-24
2 years crt.sh
condenast.com
GlobalSign CloudSSL CA - SHA256 - G3
2019-10-31 -
2020-08-07
9 months crt.sh
ssl446800.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-09-13 -
2020-03-21
6 months crt.sh
*.criteo.net
DigiCert ECC Secure Server CA
2019-12-03 -
2021-04-06
a year crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2019-03-07 -
2021-04-19
2 years crt.sh
*.rkdms.com
Entrust Certification Authority - L1K
2017-10-09 -
2020-10-30
3 years crt.sh
sa437gl.wpc.edgecastcdn.net
DigiCert SHA2 Secure Server CA
2018-05-17 -
2020-08-19
2 years crt.sh
*.moatads.com
DigiCert SHA2 Secure Server CA
2019-03-12 -
2021-06-10
2 years crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
*.config.parsely.com
Amazon
2019-02-27 -
2020-03-27
a year crt.sh
api.skimlinks.mgr.consensu.org
DigiCert SHA2 Secure Server CA
2019-10-04 -
2021-10-07
2 years crt.sh
*.conde.io
Amazon
2019-06-03 -
2020-07-03
a year crt.sh
www.google.de
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
*.onetrust.com
DigiCert SHA2 Secure Server CA
2018-03-12 -
2020-06-14
2 years crt.sh
*.storage.googleapis.com
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
*.pixel.parsely.com
Let's Encrypt Authority X3
2019-12-02 -
2020-03-01
3 months crt.sh
*.doubleclick.net
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-12-06 -
2020-03-05
3 months crt.sh
*.outbrainimg.com
DigiCert SHA2 Secure Server CA
2019-02-24 -
2020-05-25
a year crt.sh
*.rlcdn.com
Sectigo RSA Domain Validation Secure Server CA
2019-04-24 -
2020-04-23
a year crt.sh
*.adtech.advertising.com
DigiCert SHA2 High Assurance Server CA
2018-05-22 -
2020-05-26
2 years crt.sh
*.criteo.com
DigiCert ECC Secure Server CA
2019-12-05 -
2021-04-08
a year crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2019-01-10 -
2021-01-14
2 years crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-07-30 -
2020-07-25
a year crt.sh

This page contains 10 frames:

Primary Page: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Frame ID: C4FE2B48C24EED5F1EB87B1FE43046FE
Requests: 198 HTTP requests in this frame

Frame: https://js-sec.indexww.com/um/ixmatch.html
Frame ID: F65832F0864F84F32B68C89B6AA98D2F
Requests: 1 HTTP requests in this frame

Frame: https://t.skimresources.com/api/v2/robots.txt?__skimjs_preflight__please_ignore__=true&rnd=0.10842023709342619
Frame ID: 0F932A9A9F4A3F14A5EDAB2ADE45EE13
Requests: 1 HTTP requests in this frame

Frame: https://prod-native.actionbutton.co/?isNativeEmbed=true&e889cef0-c3df-47b5-afa4-c4615442fd88
Frame ID: 43C9B5FCFF6D7FDCD6CFAF36E31038DE
Requests: 1 HTTP requests in this frame

Frame: https://polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/
Frame ID: EED3C534DA5F1A8D19CC2D6C35C5C43B
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: CCB8136B20AB90EFC4699B96922D73E3
Requests: 26 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.358.1_en.html
Frame ID: A529A67FFD8348C449F25E8D3EC2FC74
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Frame ID: 9E07DAA23515C54F918BFA49A10BD23A
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Frame ID: 417ED0F802A1A953BD175D176D6D6DED
Requests: 1 HTTP requests in this frame

Frame: https://widgets.outbrain.com/widgetOBUserSync/obUserSync.html
Frame ID: 5D5870EC24780C3E25ED76586E6D9ABC
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /googletagservices\.com\/tag\/js\/gpt(?:_mobile)?\.js/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<!-- (?:End )?Google Tag Manager -->/i

Page Statistics

218
Requests

99 %
HTTPS

32 %
IPv6

38
Domains

64
Subdomains

55
IPs

8
Countries

3489 kB
Transfer

9503 kB
Size

8
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 46
  • https://r.skimresources.com/api/ HTTP 307
  • https://r.skimresources.com/api/?xguid=01DYCWTGGCJRX8GCWATG42Y5XX&persistence=1&checksum=9a48a6e1e9b82b5a10eec92d1cb2d33e9e3d4ef288eb244de8b97115d0e9940d
Request Chain 83
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j79&tid=UA-31997-1&cid=1449571978.1578833364&jid=541929321&gjid=1083977941&_gid=376446956.1578833364&_u=aChAgUAjAAQC~&z=2017818416 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1449571978.1578833364&jid=541929321&_v=j79&z=2017818416 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1449571978.1578833364&jid=541929321&_v=j79&z=2017818416&slf_rd=1&random=637456834
Request Chain 153
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._wTDjAFi2;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._wTDjAFi2;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Request Chain 154
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._4g6GwL4P;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._4g6GwL4P;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Request Chain 161
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._gXyZAwVZ;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._gXyZAwVZ;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Request Chain 162
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._3Nwmh6k6;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._3Nwmh6k6;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Request Chain 164
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._wTDjAFi2;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1Af644ba6e-3539-11ea-9ed4-128b912572ea;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._wTDjAFi2;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Request Chain 165
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._4g6GwL4P;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1Af645001e-3539-11ea-8b43-1222202f268e;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._4g6GwL4P;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Request Chain 166
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._gXyZAwVZ;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1Af64528aa-3539-11ea-bd8b-12bf277b9278;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._gXyZAwVZ;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Request Chain 167
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._3Nwmh6k6;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;apid=1Af64582e6-3539-11ea-b95e-12c8450abec2;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._3Nwmh6k6;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA

218 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/
44 KB
15 KB
Document
General
Full URL
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.31.169.131 Elk Grove Village, United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
ge-11-2-1.ar10.ord6.us.scnet.net
Software
nginx /
Resource Hash
4ce947286503937c7b56248af08f4572a71d1a59be28d645b575e10dab07523a
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
arstechnica.com
:scheme
https
:path
/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
sec-fetch-mode
navigate
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Sec-Fetch-User
?1

Response headers

status
200
server
nginx
date
Sun, 12 Jan 2020 12:49:22 GMT
content-type
text/html; charset=UTF-8
link
<https://arstechnica.com/wp-json/>; rel="https://api.w.org/"
strict-transport-security
max-age=300
x-content-type-options
nosniff
x-xss-protection
1; mode=block
x-frame-options
SAMEORIGIN
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
x-ars-server
web204
content-encoding
gzip
main-480879d7ba.css
cdn.arstechnica.net/wp-content/themes/ars/assets/css/
345 KB
72 KB
Stylesheet
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-480879d7ba.css
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
7408ff91ddbae65dce04283facad2d16791c7ed107fa2cdbea1046dc0f1436c9

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
content-encoding
gzip
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1578345494:cacheN.fra2-01:H
status
200
content-length
72988
x-cf-tsc
1578345498
x-cf2
H
last-modified
Mon, 06 Jan 2020 20:40:54 GMT
server
CFS 0215
x-cff
B
etag
W/"5e139b56-56238"
content-type
text/css
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
2
accept-ranges
bytes
expires
Sun, 08 Mar 2020 12:49:23 GMT
gpt.js
www.googletagservices.com/tag/js/
52 KB
16 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
045674d6bf3f321fa15ee355e5e742fe93d1032b2398ca61a7b610836d8a8b1a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"395 / 448 of 1000 / last-modified: 1578693105"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
15939
x-xss-protection
0
expires
Sun, 12 Jan 2020 12:49:23 GMT
apstag.js
c.amazon-adsystem.com/aax2/
87 KB
26 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.86.250 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-86-250.fra2.r.cloudfront.net
Software
Server /
Resource Hash
0f144f16507d02eabc67a131e4d54ac36266dcfe3dac263a6971265371eff7b9

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sat, 11 Jan 2020 23:25:49 GMT
content-encoding
gzip
server
Server
x-amz-cf-pop
FRA2-C2
etag
6bed68e25cc35021d570267b56047ef8
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=86400
accept-ranges
bytes
x-edge-o15-rid
oMRXQW6US1w1GpBBiEn62sYMtzpAW_zWXNqIPDEM1RBtYjWlDd0VNw==
x-amz-cf-id
1b-bWOen6zBLQC52Cha4jR6KrfdR1AlOfVIQYk9oMO_5x2giHrcJ9g==
via
1.1 06d36e78e8dfd9468327f09115761a9e.cloudfront.net (CloudFront)
183973-1558632223658.js
js-sec.indexww.com/ht/p/
129 KB
37 KB
Script
General
Full URL
https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.164 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-249-164.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
c17eff2bacde53ebca1ff1d5871b51abeee623069c48b92b05950a24f3e20ce9

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:49:23 GMT
Content-Encoding
gzip
Last-Modified
Sun, 12 Jan 2020 12:30:16 GMT
Server
Apache
ETag
"904b38-20394-59bf08568b9e0"
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=2514
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
text/javascript
Content-Length
37347
Expires
Sun, 12 Jan 2020 13:31:17 GMT
moatheader.js
z.moatads.com/condenastprebidheader987326845656/
187 KB
66 KB
Script
General
Full URL
https://z.moatads.com/condenastprebidheader987326845656/moatheader.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
0eb438ad4233f9cdadd2cf6e5e3544a29b1e693a03f45b0b9fa25e70f2675917

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:49:23 GMT
Content-Encoding
gzip
Last-Modified
Tue, 29 Oct 2019 23:07:10 GMT
Server
AmazonS3
x-amz-request-id
EE440658F867C214
ETag
"36eff026ea983609efb74e7f83fac3f5"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=22364
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
67412
x-amz-id-2
YL9ogPz0mWBFOZthev9AeEKdbJpmm9pcgfLlY/H6675TxLi7xe45e7mSRBFYKnwFlZgbaSnvgx4=
ars-technica.min.js
cdn.arstechnica.net/cns/
134 KB
44 KB
Script
General
Full URL
https://cdn.arstechnica.net/cns/ars-technica.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
74f7fa7a78e8e51e919df7918f2d872881efca3e930835a1f7d55dfa079bbc21

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
content-encoding
gzip
x-cf3
H
x-amz-request-id
EB5EFB8DF7141FF3
x-cf1
14961:fD.fra2:co:1576089267:cacheN.fra2-01:H
status
200
content-length
44266
x-amz-id-2
rBsgiWaFuvQFzkIrCXZOH1WRGd9bORjDW3ymGUeOhx0SgRVFURe/cfxzQpFeNHJT9JiISUgHK0w=
x-cf-tsc
1576089269
cf4ttl
119.500
x-cf2
H
last-modified
Tue, 10 Dec 2019 17:18:43 GMT
server
CFS 0215
x-timer
S1576089269.399738,VS0,VE9
x-cff
B
etag
"ddc58829b26392a3b7d4ca435d8ade2e"
x-served-by
cache-dca17726-DCA
vary
Accept-Encoding
x-amz-version-id
KECwyyNnH9UBZqmHkq3UHIMjxhZ7ain2
access-control-allow-origin
*
expires
Mon, 13 Jan 2020 12:49:23 GMT
cache-control
max-age=86400
cf4age
2
accept-ranges
bytes
content-type
application/javascript
x-cf-rand
0.316
x-cache-hits
1
ars-bcfee6c82a.ads.us.js
cdn.arstechnica.net/wp-content/themes/ars/assets/js/
4 KB
2 KB
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/ars-bcfee6c82a.ads.us.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
032027ea92b8b014594b64b514f922a12029c27c3dc27e5c11b09eabfaf810c3

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
content-encoding
gzip
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1565891941:cacheN.fra2-01:H
status
200
content-length
1415
x-cf-tsc
1572377912
x-cf2
H
last-modified
Tue, 29 Oct 2019 19:37:29 GMT
server
CFS 0215
x-cff
B
etag
W/"5db894f9-e66"
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
5
accept-ranges
bytes
expires
Sun, 08 Mar 2020 12:49:23 GMT
utilities-800x533.jpg
cdn.arstechnica.net/wp-content/uploads/2020/01/
38 KB
38 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2020/01/utilities-800x533.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
e8dbf7878bdc8806d80910e714ad6f45ed361d2af934caa55895283a09865bb1

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1578687368:cacheN.fra2-01:H
status
200
content-length
38421
x-cf-tsc
1578830882
x-cf2
H
last-modified
Fri, 10 Jan 2020 20:15:36 GMT
server
CFS 0215
x-cff
B
etag
"5e18db68-9615"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
x-cf-rand
1.511
expires
Sun, 08 Mar 2020 12:49:23 GMT
main-21927b84b8.js
cdn.arstechnica.net/wp-content/themes/ars/assets/js/
662 KB
215 KB
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-21927b84b8.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
994348f41972e42ce444fa51b3d2fe5fc1b07fe25771c3ca9add7d2f02208901

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
content-encoding
gzip
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1578344574:cacheN.fra2-01:H
status
200
content-length
219227
x-cf-tsc
1578344575
x-cf2
H
last-modified
Mon, 06 Jan 2020 20:40:54 GMT
server
CFS 0215
x-cff
B
etag
W/"5e139b56-a5753"
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Sun, 08 Mar 2020 12:49:23 GMT
widget.min.js
embed.actionbutton.co/widget/
53 KB
17 KB
Script
General
Full URL
https://embed.actionbutton.co/widget/widget.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.48 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-48.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
f9b84f2df9256c362df6f7eb8ca204830c81a25cec361bcff302e48e55fc15ce

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sat, 11 Jan 2020 18:39:24 GMT
Content-Encoding
gzip
Last-Modified
Mon, 04 Nov 2019 18:33:48 GMT
Server
AmazonS3
Age
65400
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 9c7c26f5beeb09381cea450ea3581b37.cloudfront.net (CloudFront)
Cache-Control
no-cache
Transfer-Encoding
chunked
X-Amz-Cf-Pop
FRA50-C1
Connection
keep-alive
X-Amz-Cf-Id
fY22x7R0s99WP5fEBHGwKcEt6H3uAyUDzquZLkU400q7TWiltXQLdA==
arstechnica.js
player.cnevids.com/interlude/
109 KB
28 KB
Script
General
Full URL
https://player.cnevids.com/interlude/arstechnica.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.13 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-13.fra50.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
02a9db289d960e3196e2269632ee772bbcb51333e9ab3503105ae7f3b1665062
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:48:36 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Age
40
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Status
200 OK
Connection
keep-alive
X-XSS-Protection
1; mode=block
X-Request-Id
2ab328a5-27d1-459a-8db3-e465c7271a62
X-Runtime
0.054895
X-Backend-Node
10.110.72.103
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"100061ec52f3fd11b609bdbb9ae735a3"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 c6702f5f3b6e77da6f394e67ef1a6aab.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Pop
FRA50-C1
X-Amz-Cf-Id
q3pAqZayhcXCv_QciTJJB3fsPLOjoDYHjVhg62j0HdTAeu5icQgIiw==
conde-asa-polar-master.js
cdn.mediavoice.com/nativeads/script/condenastcorporate/
5 KB
2 KB
Script
General
Full URL
https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:d983 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
030e91b7512dbb40e9b9057f20bcf54c296a7f28c04bbcde0f2d2706dd2a3a06

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
content-encoding
gzip
cf-cache-status
HIT
age
12554
status
200
content-type
text/javascript
content-length
2018
via
1.1 varnish
server
cloudflare
cache-control
max-age=21600
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-varnish
1716844763 1716812162
x-country
DE
cf-ipcountry
DE
accept-ranges
bytes
cf-ray
553f40082b2cdfdb-FRA
100098X1555750.skimlinks.js
s.skimresources.com/js/
39 KB
15 KB
Script
General
Full URL
https://s.skimresources.com/js/100098X1555750.skimlinks.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
0cae365407f154c997a95a4b1318f0da00eeae0533812d2389e7dbb0a8c55c8e

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
content-encoding
gzip
last-modified
Tue, 07 Jan 2020 13:26:32 GMT
server
AmazonS3
x-amz-request-id
1A9F78C6C6788B7A
etag
"fe7b319a6fac84576af0e0f704c34150"
x-hw
1578833363.cds001.wa1.hn,1578833363.cds006.wa1.c
content-type
application/octet-stream
status
200
cache-control
max-age=3600
accept-ranges
bytes
content-length
15252
x-amz-id-2
BlQ7xy2uFxcOFQqp8WR5ue8Z3mX6mkitlPyj8I9uLpCkrhG7ml4XcryNZpE0Xo85tVmzR/6wlTE=
gtm.js
www.googletagmanager.com/
290 KB
71 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
dd962d5b71401686d24eee0af00621b8733e0e227ed985adb2095005fb75d195
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
content-encoding
br
last-modified
Sun, 12 Jan 2020 12:00:00 GMT
server
Google Tag Manager
access-control-allow-origin
http://www.googletagmanager.com
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
content-length
72468
x-xss-protection
0
expires
Sun, 12 Jan 2020 12:49:23 GMT
integrator.js
adservice.google.de/adsid/
109 B
778 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
323 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_2019121002.js
securepubads.g.doubleclick.net/gpt/
163 KB
60 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.98 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s45-in-f2.1e100.net
Software
sffe /
Resource Hash
216fd62bccc74ef4e4d35292cd4874e7072a4fb30685afb6235d894a3ec1a2df
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 10 Dec 2019 17:29:18 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
60922
x-xss-protection
0
expires
Sun, 12 Jan 2020 12:49:23 GMT
aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.86.250 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-86-250.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
06b99248a163333e36980a6cfb756f1a7de60fa49517162b87b1a44d5d48f844

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 04:31:35 GMT
content-encoding
gzip
vary
Origin
age
29869
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Wed, 08 Jan 2020 04:09:03 GMT
server
AmazonS3
access-control-max-age
3000
access-control-allow-methods
GET
content-type
application/javascript
via
1.1 04ce5a607a98db6d08257633417b84d7.cloudfront.net (CloudFront)
cache-control
public, max-age=86400
x-amz-cf-pop
FRA2-C2
x-amz-cf-id
hEzggKlJHrYhee_QboUOIzNq0ceIYKS4pwnQ-JqEJDqGmpIVnEd_sQ==
ads.js
arstechnica.com/hotzones/src/
0
517 B
XHR
General
Full URL
https://arstechnica.com/hotzones/src/ads.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.31.169.131 Elk Grove Village, United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
ge-11-2-1.ar10.ord6.us.scnet.net
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
x-content-type-options
nosniff
last-modified
Fri, 10 Jan 2020 23:00:53 GMT
server
nginx
etag
"5e190225-0"
x-frame-options
SAMEORIGIN
content-type
application/javascript
status
200
content-length
0
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
strict-transport-security
max-age=300
accept-ranges
bytes
x-ars-server
web204
x-xss-protection
1; mode=block
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
78c8c364b438f0be81f1c51627902fda95b7aebdd2c04aee28c2f72cd4390207

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
357 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f95836cdd8c1af1d8261e8e198a4c1dd306e2b50ddc389fe820b56212a9cb17d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
economica-bold-otf-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
25 KB
25 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/economica-bold-otf-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
5315cf641e62ac7de4a82e6003cc1bd1ff09218400d8ff5286c951e25aee966b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-480879d7ba.css
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fC.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
25592
x-cf-tsc
1571313839
x-cf2
H
last-modified
Mon, 14 Oct 2019 19:40:51 GMT
server
CFS 0215
x-cff
B
etag
"5da4cf43-63f8"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
35032
accept-ranges
bytes
expires
Sun, 08 Mar 2020 12:49:23 GMT
economica-regular-otf-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
24 KB
24 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/economica-regular-otf-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
c14a030b0b5ef06f710d9bbff164662d4b43c037e62f254aa6280504013caa34

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-480879d7ba.css
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fC.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
24264
x-cf-tsc
1571315214
x-cf2
H
last-modified
Mon, 14 Oct 2019 19:40:51 GMT
server
CFS 0215
x-cff
B
etag
"5da4cf43-5ec8"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
36407
accept-ranges
bytes
expires
Sun, 08 Mar 2020 12:49:23 GMT
truncated
/
279 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5ecbfb541946a9a9437190a21d98e1c7ab7d863837d7d038a9a1e053c649c8ba

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
400 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6f261533d4b74ae931965cf3609bf47bb55001e39eb7029502d96cec73c4749a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
700 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5ab499494548829e507e9b6cd57247a6cd565e7f1bc6eb55e3da445af76f1f0c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
49282a74c6ced31e99f808232188ade8d82652004df4d664dcdb98c32563dd39

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
841 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
039f13cdf684666dd973e2385f773385adb074039e8a832ec48e1ae35fb20c15

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
channel-ars-be7bb52ba9.png
cdn.arstechnica.net/wp-content/themes/ars/assets/img/
5 KB
5 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/img/channel-ars-be7bb52ba9.png
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
08ed3bf6e73a999bafb422b878fb05b87269b00a65230c9457ce75aee10b873e

Request headers

Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-480879d7ba.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
4809
x-cf-tsc
1562286891
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-12c9"
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Sun, 08 Mar 2020 12:49:23 GMT
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c7f2558d7005dc61e343b6abb61a63da8ace760a0fdd45cb0cc124b0de5b4c2f

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
18 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
62c7d2da9a5942053f17c9756e53b7cda414541619bd35c2b1441cd88c77f235

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4ec4b6769730ca98db1f40b152c52bd5bec01f61f559fb92709c307750388ac8

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
opensans-regular-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
18 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-regular-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
caa3854f28740fa98125ded826446ee4456379e8ad7c4ff46643347d1901506a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-480879d7ba.css
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
x-cf3
H
cf4ttl
43200.000
xkey-type
application/octet-stream
x-cf1
14961:fC.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
18824
x-cf-tsc
1571315231
x-cf2
H
last-modified
Mon, 14 Oct 2019 19:40:51 GMT
server
CFS 0215
x-cff
B
etag
"5da4cf43-4988"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
34475
accept-ranges
bytes
expires
Sun, 08 Mar 2020 12:49:23 GMT
bitter-italic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
24 KB
24 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-italic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1193e934b76ed372f47e23f78f8a13e99d9588e564aff866e8f700e7a0650a83

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-480879d7ba.css
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
x-cf3
H
cf4ttl
43200.000
xkey-type
application/octet-stream
x-cf1
14961:fC.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
24212
x-cf-tsc
1571315231
x-cf2
H
last-modified
Mon, 14 Oct 2019 19:40:51 GMT
server
CFS 0215
x-cff
B
etag
"5da4cf43-5e94"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
35313
accept-ranges
bytes
expires
Sun, 08 Mar 2020 12:49:23 GMT
bitter-regular-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
22 KB
23 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-regular-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
0186840386391fa2c0750ff7450a78e066498ba3274546a6fcf0fa9c55cd457c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-480879d7ba.css
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fC.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
22872
x-cf-tsc
1571313840
x-cf2
H
last-modified
Mon, 14 Oct 2019 19:40:51 GMT
server
CFS 0215
x-cff
B
etag
"5da4cf43-5958"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
35033
accept-ranges
bytes
expires
Sun, 08 Mar 2020 12:49:23 GMT
opensans-semibold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
19 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-semibold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1f9cd4a445ba85172da6090dd7b95edf55fd9e81ddb193e0b78093c1afa84378

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-480879d7ba.css
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fC.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
18972
x-cf-tsc
1571290522
last-modified
Mon, 14 Oct 2019 19:40:51 GMT
server
CFS 0215
x-cff
B
etag
"5da4cf43-4a1c"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
25623
accept-ranges
bytes
x-cf-rand
4.385
expires
Sun, 08 Mar 2020 12:49:23 GMT
opensans-semibolditalic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-semibolditalic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
59201950b83489808587827b4050ffe0597992825daa88c227476cdbbf8ca282

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-480879d7ba.css
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fC.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
20872
x-cf-tsc
1571276791
last-modified
Mon, 14 Oct 2019 19:40:51 GMT
server
CFS 0215
x-cff
B
etag
"5da4cf43-5188"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
39354
accept-ranges
bytes
x-cf-rand
3.067
expires
Sun, 08 Mar 2020 12:49:23 GMT
opensans-italic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-italic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
c46974d8f6030e4888708b18a5d9a32b25eb765a5708896e1899df449d87aab7

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-480879d7ba.css
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fC.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
20748
x-cf-tsc
1571311022
last-modified
Mon, 14 Oct 2019 19:40:51 GMT
server
CFS 0215
x-cff
B
etag
"5da4cf43-510c"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
5122
accept-ranges
bytes
x-cf-rand
4.371
expires
Sun, 08 Mar 2020 12:49:23 GMT
bitter-bold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
22 KB
22 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-bold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
807271433f80bb33654a84ec904035be3d2b34e505a051e3469a47fe39ccb752

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-480879d7ba.css
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fC.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
22104
x-cf-tsc
1571303189
last-modified
Mon, 14 Oct 2019 19:40:51 GMT
server
CFS 0215
x-cff
B
etag
"5da4cf43-5658"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
12955
accept-ranges
bytes
x-cf-rand
3.279
expires
Sun, 08 Mar 2020 12:49:23 GMT
opensans-bold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
19 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-bold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
86096831a70c72ac0c08f5e65ae92d98330d9fd2b7511dde65ff50b8a16bfd9a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-480879d7ba.css
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fC.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
19516
x-cf-tsc
1571312426
last-modified
Mon, 14 Oct 2019 19:40:51 GMT
server
CFS 0215
x-cff
B
etag
"5da4cf43-4c3c"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
3719
accept-ranges
bytes
x-cf-rand
0.961
expires
Sun, 08 Mar 2020 12:49:23 GMT
outbrain.js
widgets.outbrain.com/
114 KB
39 KB
Script
General
Full URL
https://widgets.outbrain.com/outbrain.js?_=1578833363287
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-21927b84b8.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.250.44 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-44.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
5a0a93671377a6664ba7cf14edb07eb610b7a41de59270f06c8a6e190aa1c72c

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:49:24 GMT
Content-Encoding
gzip
Last-Modified
Sun, 12 Jan 2020 12:15:40 GMT
Server
AkamaiNetStorage
ETag
"22af29a427ad01d1818440010b0c92a2:1578832461"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=14400
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
39021
video_groups
api.cnevids.com/v1/
4 KB
1 KB
XHR
General
Full URL
https://api.cnevids.com/v1/video_groups?filters={%22channel_key%22:%22arstechnica%22}&pagesize=20&endpoint=oo.arstechnica
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-21927b84b8.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.196.100.8 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-196-100-8.compute-1.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
9f14529883aabaf69fd5def8146c294dfb581116e30c30348c437a10d2c1b8e3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/*
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:49:23 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
665
X-XSS-Protection
1; mode=block
X-Request-Id
98f8cc58-0eed-45b3-962f-ae2c3461f188
X-Runtime
0.001850
X-Backend-Node
10.110.126.151
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
X-Frame-Options
SAMEORIGIN
ETag
W/"c7f09fa381cb5f487ee970dfab0aeedb"
X-Download-Options
noopen
Vary
Accept-Encoding, Origin
Access-Control-Allow-Methods
GET, PUT, POST, DELETE, OPTIONS
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
p.js
d1z2jf7jlzjs58.cloudfront.net/
6 KB
3 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/p.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.221 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-221.fra2.r.cloudfront.net
Software
nginx /
Resource Hash
725913eab3460e2955a8ac4ec176f902c7d8d2db60757248b735cbf8698b0749

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 01:43:21 GMT
Content-Encoding
gzip
Age
39997
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Pragma
public
Last-Modified
Fri, 07 Mar 2014 00:45:07 GMT
Server
nginx
ETag
W/"53191693-19c1"
Content-Type
application/x-javascript
Via
1.1 ac0e9b19969df989a920e6d1b834d009.cloudfront.net (CloudFront)
Cache-Control
max-age=86400, public
X-Amz-Cf-Pop
FRA2-C2
X-Amz-Cf-Id
HBMApWc-Aoui_7awKQl5xQ4p_rpjccU-uKG8CZoTAIga3tw7qDmagw==
Expires
Sun, 12 Jan 2020 01:42:44 GMT
conde-nast
segment-data.zqtk.net/
723 B
553 B
Script
General
Full URL
https://segment-data.zqtk.net/conde-nast?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.19.1.241 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-19-1-241.eu-west-1.compute.amazonaws.com
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
a5be8ebd90e40e03e163a2634948f4a516d68a1bc45215ad5cdc69b3070bafa7

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:49:23 GMT
Content-Encoding
gzip
Last-Modified
Sun, 12 Jan 2020 12:09:28 GMT
Server
nginx/1.10.3 (Ubuntu)
Content-Type
application/javascript; charset=UTF-8
Connection
keep-alive
Content-Length
258
Expires
Tue, 14 Jan 2020 12:09:28 GMT
ixmatch.html
js-sec.indexww.com/um/ Frame F658
0
0
Document
General
Full URL
https://js-sec.indexww.com/um/ixmatch.html
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.164 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-249-164.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Host
js-sec.indexww.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social

Response headers

Server
Apache
Last-Modified
Mon, 19 Jun 2017 19:18:19 GMT
ETag
"74087b-112-55254ff6699bb"
Accept-Ranges
bytes
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Content-Type
text/html; charset=UTF-8
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
211
Date
Sun, 12 Jan 2020 12:49:23 GMT
Connection
keep-alive
ars-technica.config.js
pixel.condenastdigital.com/config/v2/production/
6 KB
2 KB
Script
General
Full URL
https://pixel.condenastdigital.com/config/v2/production/ars-technica.config.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.12.239 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
204f96cd7ddbfc6bf5f972fd350079187faee869527ec70cbc842599bf4f3a3b

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:49:23 GMT
Content-Encoding
gzip
Age
252425
Via
1.1 varnish, 1.1 varnish
X-Cache
HIT, HIT
X-Cache-Hits
2, 296
Connection
keep-alive
Content-Length
1079
x-amz-id-2
qZJZXXPo6Z8HjhsGOcb+0s1SKL7XjxXTGtdgGJ5G15UFQwTNaoOhNidetgjS7SDXxlyWbnPE1Ho=
X-Served-By
cache-iad2130-IAD, cache-fra19137-FRA
Last-Modified
Thu, 02 Jan 2020 14:42:07 GMT
Server
AmazonS3
X-Timer
S1578833363.390294,VS0,VE0
ETag
"4250c65ee742e1b4f32323df8a749ae7"
Vary
Accept-Encoding
x-amz-request-id
1992D9C740724C71
Access-Control-Allow-Origin
*
Cache-Control
no-cache, public, max-age=604800
Accept-Ranges
bytes
Content-Type
application/javascript
Expires
Thu, 02 Jan 2020 20:42:19 GMT
/
r.skimresources.com/api/
Redirect Chain
  • https://r.skimresources.com/api/
  • https://r.skimresources.com/api/?xguid=01DYCWTGGCJRX8GCWATG42Y5XX&persistence=1&checksum=9a48a6e1e9b82b5a10eec92d1cb2d33e9e3d4ef288eb244de8b97115d0e9940d
0
-1 B
XHR
General
Full URL
https://r.skimresources.com/api/?xguid=01DYCWTGGCJRX8GCWATG42Y5XX&persistence=1&checksum=9a48a6e1e9b82b5a10eec92d1cb2d33e9e3d4ef288eb244de8b97115d0e9940d
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
via
1.1 google
server
openresty/1.11.2.5
access-control-allow-origin
https://arstechnica.com
location
//r.skimresources.com/api/?xguid=01DYCWTGGCJRX8GCWATG42Y5XX&persistence=1&checksum=9a48a6e1e9b82b5a10eec92d1cb2d33e9e3d4ef288eb244de8b97115d0e9940d
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
status
307
access-control-allow-credentials
true
content-type
text/html
alt-svc
clear
content-length
193

Redirect headers

date
Sun, 12 Jan 2020 12:49:23 GMT
via
1.1 google
server
openresty/1.11.2.5
status
307
location
//r.skimresources.com/api/?xguid=01DYCWTGGCJRX8GCWATG42Y5XX&persistence=1&checksum=9a48a6e1e9b82b5a10eec92d1cb2d33e9e3d4ef288eb244de8b97115d0e9940d
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
text/html
alt-svc
clear
content-length
193
robots.txt
t.skimresources.com/api/v2/ Frame 0F93
0
105 B
Image
General
Full URL
https://t.skimresources.com/api/v2/robots.txt?__skimjs_preflight__please_ignore__=true&rnd=0.10842023709342619
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
206
date
Sun, 12 Jan 2020 12:49:23 GMT
via
1.1 google
server
Python/3.7 aiohttp/3.5.4
alt-svc
clear
content-length
0
content-type
text/plain charset=UTF-8
px.gif
p.skimresources.com/
43 B
116 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=1&rn=7.240602319685933
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
status
200
x-guploader-uploadid
AEnB2UpPDE5i6v3ggas7TTA0pVWanbUjUGt76QVRXUF2--ifNAFT8khLz924QsaiRebx4ILQfqTOg69Y9Ns0MeubdKekQneUeg
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
x-hw
1578833363.cds001.wa1.hn,1578833363.cds005.wa1.c
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
px.gif
p.skimresources.com/
43 B
470 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=2&rn=7.240602319685933
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
status
200
x-guploader-uploadid
AEnB2UpPDE5i6v3ggas7TTA0pVWanbUjUGt76QVRXUF2--ifNAFT8khLz924QsaiRebx4ILQfqTOg69Y9Ns0MeubdKekQneUeg
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
x-hw
1578833363.cds001.wa1.hn,1578833363.cds005.wa1.c
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
plugin.js
plugin.mediavoice.com/
337 KB
125 KB
Script
General
Full URL
https://plugin.mediavoice.com/plugin.js
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:d983 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
4eff2c28c2fb7c3172b7230c3ff98343a52bff5863901a2f2bb6f3f082455055

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
content-encoding
gzip
cf-cache-status
HIT
age
34697
cf-ray
553f40096841dfdb-FRA
status
200
content-length
127618
via
1.1 varnish
x-varnish
1984741600 1984740798
last-modified
Fri, 20 Dec 2019 15:04:21 GMT
server
cloudflare
etag
W/"5dfce2f5-544bb"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, OPTIONS
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=43200
access-control-allow-credentials
true
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
expires
Sun, 12 Jan 2020 15:07:24 GMT
condenastcorporate
polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/organization/
181 B
603 B
XHR
General
Full URL
https://polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/organization/condenastcorporate
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4032 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
6bd131d59efb6aa6a2d98ce4af498a811c84f74148129e140ff5a76904ca9f74

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

timing-allow-origin
*
date
Sun, 12 Jan 2020 12:49:23 GMT
content-encoding
gzip
server
cloudflare
status
200
etag
W/"4ed41fc03a3c3b67ac78af86ee19d7f1"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-Country, CF-Ray
cache-control
max-age=3600
x-country
DE
cf-ray
553f40099a5fc286-FRA
/
prod-native.actionbutton.co/ Frame 43C9
0
0
Document
General
Full URL
https://prod-native.actionbutton.co/?isNativeEmbed=true&e889cef0-c3df-47b5-afa4-c4615442fd88
Requested by
Host: embed.actionbutton.co
URL: https://embed.actionbutton.co/widget/widget.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2156:2400:11:8cf6:b500:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash

Request headers

:method
GET
:authority
prod-native.actionbutton.co
:scheme
https
:path
/?isNativeEmbed=true&e889cef0-c3df-47b5-afa4-c4615442fd88
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social

Response headers

status
200
content-type
text/html
date
Fri, 10 Jan 2020 15:29:29 GMT
last-modified
Fri, 10 Jan 2020 15:29:17 GMT
cache-control
max-age=31536000,public
server
AmazonS3
content-encoding
gzip
vary
Accept-Encoding
x-cache
Hit from cloudfront
via
1.1 ba77f90aac0ddbc2c4c2c02062fac762.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA50-C1
x-amz-cf-id
6KaXUDWE0TqcaKg0p4LhW7pXNJ9fGGXClXBBOHkPL4Q1jjRmlw_u0A==
age
163195
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&app=playerservice&cCh=videos%2Fshow&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&pID=&sID=&uId=&xid=&_ts=2020-01-12T12%3A49%3A23.444Z&_c=error&_t=Interlude%20Insertion%20Error&dim1=%7B%22interludeFailure%22%3A%22unsupported%20template%22%2C%22pageTemplate%22%3A%22article%7Creport%22%2C%22url%22%3A%22information-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%22%7D&dim3=Availability%3A%20unsupported%20template
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.37.193 Ashburn, United States, ASN (),
Reverse DNS
ec2-52-2-37-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:49:23 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
publishertag.js
static.criteo.net/js/ld/
93 KB
28 KB
Script
General
Full URL
https://static.criteo.net/js/ld/publishertag.js
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
178.250.2.130 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
nginx /
Resource Hash
fbc41d3e67802d67bafea737f75aba27b07eae707b51c5b78a89605fc2786ae9

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
content-encoding
gzip
last-modified
Fri, 20 Dec 2019 17:19:26 GMT
server
nginx
access-control-allow-origin
*
etag
W/"5dfd029e-17429"
content-type
text/javascript
status
200
cache-control
max-age=86400, public
timing-allow-origin
*
expires
Mon, 13 Jan 2020 12:49:23 GMT
rid
match.adsrvr.org/track/
109 B
536 B
XHR
General
Full URL
https://match.adsrvr.org/track/rid?ttd_pid=casale&fmt=json&p=183973
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.208.195.87 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-208-195-87.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
2a1884ce218ad9af1ce96149567fa4166f87753607343e2e1aee6628a3899c73

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
x-aspnet-version
4.0.30319
status
200
vary
Origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
cache-control
private
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Content-Length, Content-Encoding, Vary, Cache-Control, Accept
content-length
109
expires
Tue, 11 Feb 2020 12:49:23 GMT
idsv2
mid.rkdms.com/
0
0
XHR
General
Full URL
https://mid.rkdms.com/idsv2?ptk=17c1789b-e660-493b-aa74-3c8fb990dc5f&pubid=CONDENAST
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.91 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-91.fra50.r.cloudfront.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
dbb67c620eaabf6679a314db18d3ae43037aef71ab27422e6feec08ee987cc0a
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 19 Aug 2019 17:22:41 GMT
server
Golfe2
age
4269
date
Sun, 12 Jan 2020 11:38:14 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
17803
expires
Sun, 12 Jan 2020 13:38:14 GMT
otSDKStub.js
cdn.cookielaw.org/scripttemplates/
8 KB
3 KB
Script
General
Full URL
https://cdn.cookielaw.org/scripttemplates/otSDKStub.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8FE8) /
Resource Hash
c2bdfd6b334593875cb7e009a4ae681f003edf8118a0ae5bb7568216ece5d1d2

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Sun, 12 Jan 2020 12:49:23 GMT
content-encoding
gzip
content-md5
kqDQnbDVJYMXPp1pIncMkg==
x-cache
HIT
status
200
content-length
2682
x-ms-lease-status
unlocked
last-modified
Mon, 30 Dec 2019 16:01:08 GMT
server
ECAcc (frc/8FE8)
etag
0x8D78D417B96453F
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
x-ms-request-id
cc14ac43-801e-012e-5844-c91e74000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Sun, 12 Jan 2020 16:49:23 GMT
yi.js
mb.moatads.com/
2 KB
2 KB
Script
General
Full URL
https://mb.moatads.com/yi.js?ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&callback=MoatNadoAllJsonpRequest_96301246
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/condenastprebidheader987326845656/moatheader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.177.62.3 London, United Kingdom, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-177-62-3.eu-west-2.compute.amazonaws.com
Software
TornadoServer/4.5.3 /
Resource Hash
82bdcef224c70af88291332364753ea82c068581919679508845b5fe3bd3ebf1

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
server
TornadoServer/4.5.3
etag
"10050bceeae08da82bc027698e5da2564a5a978a"
content-type
text/html; charset=UTF-8
status
200
cache-control
max-age=900
timing-allow-origin
*
content-length
1579
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&t=1578833363488&de=483003110543&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatRendered=0&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=0&zMoatSafetyTargetingSet=0&zMoatEmptySlot=0&zMoatNadoDataLoadTime=Not%20Loaded&zMoatAllDataLoadTime=Not%20Loaded&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&ac=1&bq=11&f=0&na=188130189&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:23 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:23 GMT
ads
securepubads.g.doubleclick.net/gampad/
418 B
701 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=198579609326451&correlator=3360938216049643&output=ldjh&impl=fifs&adsid=NT&eid=21064550&vrg=2019121002&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200112&iu_parts=3379%2Cconde.ars%2Cinterstitial%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=1x1&ists=1&prev_scp=pos%3Dinterstitial%26ctx_slot_type%3Dout_of_page%26ctx_slot_rn%3D0%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dout_of_page_0&eri=1&cust_params=amznbid%3D0%26amznp%3D0%26m_data%3Dwaiting%26m_safety%3Dwaiting%26m_categories%3Dwaiting%26m_mv%3Dwaiting%26m_gv%3Dwaiting%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.31.8%26ctx_page_slug%3Diranian-hackers-have-been-password-spraying-the-us-grid%26cnt_tags%3Diran%252Cmagnallium%252Cutilities%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D&cookie_enabled=1&bc=31&abxe=1&lmt=1578833363&dt=1578833363568&dlt=1578833363066&idt=473&frm=20&biw=1585&bih=1200&oid=3&adxs=0&adys=0&adks=2746652139&ucis=1&ifi=1&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&dssz=35&icsg=137615114240&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1585x1&msz=1585x1&ga_vid=1449571978.1578833364&ga_sid=1578833364&ga_hid=1825117583&fws=4&ohw=1585
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.98 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s45-in-f2.1e100.net
Software
cafe /
Resource Hash
b8775225e581ca7690b1950ebf54ed92e536211b4646a3fc6e502d7bc33ad7b8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
209
x-xss-protection
0
google-lineitem-id
-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2019121002.js
securepubads.g.doubleclick.net/gpt/
64 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019121002.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.98 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s45-in-f2.1e100.net
Software
sffe /
Resource Hash
4c52ed8f9039265ffed7fdca0b967b2624325e6356433f437e044b0dd332cddf
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 10 Dec 2019 17:29:18 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24811
x-xss-protection
0
expires
Sun, 12 Jan 2020 12:49:23 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

ads
securepubads.g.doubleclick.net/gampad/
419 B
369 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=198579609326451&correlator=3360938216049643&output=ldjh&impl=fifs&adsid=NT&eid=21064550&vrg=2019121002&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200112&iu_parts=3379%2Cconde.ars.native%2Clegacy%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=2x2&prev_scp=pos%3Dlegacy%26ctx_slot_type%3Dnative_xrail%26ctx_slot_rn%3D0%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dnative_xrail_0&eri=1&cust_params=amznbid%3D0%26amznp%3D0%26m_data%3Dwaiting%26m_safety%3Dwaiting%26m_categories%3Dwaiting%26m_mv%3Dwaiting%26m_gv%3Dwaiting%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.31.8%26ctx_page_slug%3Diranian-hackers-have-been-password-spraying-the-us-grid%26cnt_tags%3Diran%252Cmagnallium%252Cutilities%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D&cookie_enabled=1&bc=31&abxe=1&lmt=1578833363&dt=1578833363581&dlt=1578833363066&idt=473&frm=20&biw=1585&bih=1200&oid=3&adxs=1063&adys=786&adks=2072965525&ucis=2&ifi=2&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&dssz=36&icsg=563087568535552&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=300x0&msz=300x2&ga_vid=1449571978.1578833364&ga_sid=1578833364&ga_hid=1825117583&fws=516&ohw=300
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.98 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s45-in-f2.1e100.net
Software
cafe /
Resource Hash
68570f1720b01cb879a225111b3e758bf10570fe38e43abb6c491537dd47d369
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
208
x-xss-protection
0
google-lineitem-id
-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
r.skimresources.com/api/
152 B
459 B
XHR
General
Full URL
https://r.skimresources.com/api/?xguid=01DYCWTGGCJRX8GCWATG42Y5XX&persistence=1&checksum=9a48a6e1e9b82b5a10eec92d1cb2d33e9e3d4ef288eb244de8b97115d0e9940d
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
23aef9de8cd60bfc645185600dcd22e17018a4eebc6cff6d4109aabf4fcc564f
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
openresty/1.11.2.5
status
200
vary
Accept-Encoding
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google
sparrow.min.js
pixel.condenastdigital.com/
38 KB
14 KB
Script
General
Full URL
https://pixel.condenastdigital.com/sparrow.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.12.239 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1dc3900687fb65b292f1e210c5fe7a931938516ab318c529e5a97433462cb7bc

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:49:23 GMT
Content-Encoding
gzip
Age
312126
Via
1.1 varnish, 1.1 varnish
X-Cache
HIT, HIT
X-Cache-Hits
1, 7442
Connection
keep-alive
Content-Length
13257
x-amz-id-2
vf6gNMpMA++XXQzC6rvTwyrkJUmwCILPrImZKtomr84UhzC/j5ZMFJICYyuXSwNJn5xnGsq13FM=
X-Served-By
cache-iad2138-IAD, cache-fra19137-FRA
Last-Modified
Wed, 20 Nov 2019 22:07:21 GMT
Server
AmazonS3
X-Timer
S1578833364.618427,VS0,VE0
ETag
"dc39378d5b3f7ed533d42c4765bc2eae"
Vary
Accept-Encoding
x-amz-request-id
26C5BF0665EAC459
Access-Control-Allow-Origin
*
Cache-Control
no-cache, public, max-age=604800
Accept-Ranges
bytes
Content-Type
application/javascript
Expires
Thu, 21 Nov 2019 04:07:20 GMT
arstechnica.com
srv-2020-01-12-12.config.parsely.com/config/
419 B
837 B
Script
General
Full URL
https://srv-2020-01-12-12.config.parsely.com/config/arstechnica.com
Requested by
Host: d1z2jf7jlzjs58.cloudfront.net
URL: https://d1z2jf7jlzjs58.cloudfront.net/p.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.206.220.9 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-206-220-9.compute-1.amazonaws.com
Software
/ Express
Resource Hash
02b044afcde5ee4af66d379cfdc52aedd0f566c5373175ce73ad9edaffd95d33

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:49:24 GMT
Cache-Control
private, no-cache
Connection
keep-alive
X-Powered-By
Express
ETag
W/"1a3-iJUcgLyySfvh9zyZ715CJQ"
Content-Length
419
Content-Type
text/javascript; charset=utf-8
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&t=1578833363488&de=483003110543&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatRendered=0&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=0&zMoatSafetyTargetingSet=0&zMoatEmptySlot=0&zMoatNadoDataLoadTime=Not%20Loaded&zMoatAllDataLoadTime=Not%20Loaded&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&ac=1&bq=11&f=0&zn=0&na=1682971618&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:23 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:23 GMT
linkid.js
www.google-analytics.com/plugins/ua/
2 KB
950 B
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/linkid.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
92fca55833f48b4289ac8f1cedd48752b580fce4ec4b5d81670b8193d6e51b54
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 11:51:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 22 Oct 2019 18:15:00 GMT
server
sffe
age
3493
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
859
x-xss-protection
0
expires
Sun, 12 Jan 2020 12:51:10 GMT
publisher:getClientId
ampcid.google.com/v1/
74 B
182 B
XHR
General
Full URL
https://ampcid.google.com/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
991bfe84fec788f2b7d432b99a60c1e2aa2e799bc0137da8cf478299d0fc9a10
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
94
x-xss-protection
0
b10882a1-8446-4e7d-bfb2-ce2c770ad910.json
cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910/
2 MB
48 KB
XHR
General
Full URL
https://cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910/b10882a1-8446-4e7d-bfb2-ce2c770ad910.json
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/otSDKStub.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8FF8) /
Resource Hash
8504fb66992116b9e26f363f95e8d8336551065aab62eedaa737f567b0dd0fef

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

x-ms-blob-type
BlockBlob
date
Sun, 12 Jan 2020 12:49:23 GMT
content-encoding
gzip
content-md5
wExhIhzCvAQwo9SPeiwzKA==
x-cache
HIT
status
200
content-length
48791
x-ms-lease-status
unlocked
last-modified
Thu, 09 Jan 2020 19:29:33 GMT
server
ECAcc (frc/8FF8)
etag
0x8D7953A41B6E7F1
vary
Accept-Encoding
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
1a59f38b-201e-00eb-2b33-c9261a000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Sun, 12 Jan 2020 16:49:23 GMT
iab
api.skimlinks.mgr.consensu.org/
772 B
636 B
XHR
General
Full URL
https://api.skimlinks.mgr.consensu.org/iab?nocache=1578833363711
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.40.172 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
172.40.190.35.bc.googleusercontent.com
Software
nginx/1.14.0 /
Resource Hash
4898c2b9f8c2f931ef6a819d36e0019867931d9519af933ab4bd5edce724b2a8
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:49:24 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
nginx/1.14.0
access-control-allow-headers
*
status
200
vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, DELETE, OPTIONS
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google
publisher:getClientId
ampcid.google.de/v1/
3 B
457 B
XHR
General
Full URL
https://ampcid.google.de/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
23
x-xss-protection
0
/
polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/ Frame EED3
0
0
Document
General
Full URL
https://polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/
Requested by
Host: plugin.mediavoice.com
URL: https://plugin.mediavoice.com/plugin.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4032 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

:method
GET
:authority
polarcdn-terrax.com
:scheme
https
:path
/privacy/v1.0.0/html/optout/readwrite/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Sun, 12 Jan 2020 12:49:23 GMT
content-type
text/html; charset=utf-8
content-length
1242
set-cookie
__cfduid=d08ca6245f32f14ca422b553a0d0b967c1578833363; expires=Tue, 11-Feb-20 12:49:23 GMT; path=/; domain=.polarcdn-terrax.com; HttpOnly; SameSite=Lax
vary
Accept-Encoding
access-control-allow-headers
Authorization
access-control-expose-headers
CF-IPCountry, X-Country, CF-Ray
cache-control
max-age=900
access-control-allow-origin
*
access-control-allow-methods
GET
timing-allow-origin
*
content-encoding
gzip
x-varnish
1869537318
age
30
via
1.1 varnish
cf-cache-status
HIT
accept-ranges
bytes
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
553f400c6e3396ce-FRA
bid
c.amazon-adsystem.com/e/dtb/
23 B
369 B
XHR
General
Full URL
https://c.amazon-adsystem.com/e/dtb/bid?src=3035&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&pid=rXs69Sf9lhGQr&cb=0&ws=1600x1200&v=7.45.00&t=1000&slots=%5B%7B%22sd%22%3A%220%22%2C%22s%22%3A%5B%22300x250%22%2C%22300x600%22%5D%2C%22sn%22%3A%22rail%2Fdesktop%22%7D%2C%7B%22sd%22%3A%221%22%2C%22s%22%3A%5B%22728x90%22%2C%22970x250%22%5D%2C%22sn%22%3A%22hero%2Fdesktop%22%7D%5D&pj=%7B%22si_section%22%3A%22information-technology%22%7D&cfgv=0&gdprl=%7B%22status%22%3A%22cmp-timeout%22%7D
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.86.250 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-86-250.fra2.r.cloudfront.net
Software
Server /
Resource Hash
745a085b52b8371ec6705413fca70a28c6d8bff0db480e6b124bd08c54e95ef8

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:49:23 GMT
via
1.1 06d36e78e8dfd9468327f09115761a9e.cloudfront.net (CloudFront)
server
Server
x-amz-cf-pop
FRA2-C2
status
200
vary
User-Agent
x-cache
Miss from cloudfront
content-type
text/javascript;charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
timing-allow-origin
*
content-length
23
x-amz-cf-id
GnCmmXdnpCAE-YmTydomZjaofK8pmoJ1kinoeYLQjnVUDAxiEKv7VQ==
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=44&t=1578833363488&de=483003110543&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatRendered=0&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=0&zMoatSafetyTargetingSet=0&zMoatEmptySlot=0&zMoatNadoDataLoadTime=181&zMoatAllDataLoadTime=181&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&ac=1&bq=11&f=0&zn=0&if=181&na=900361540&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:23 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:23 GMT
5b27ee7e8c1abc4e7900000f
api.cnevids.com/v1/video_groups/
54 KB
10 KB
XHR
General
Full URL
https://api.cnevids.com/v1/video_groups/5b27ee7e8c1abc4e7900000f?endpoint=oo.arstechnica
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-21927b84b8.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.196.100.8 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-196-100-8.compute-1.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
a386009b7010441f046b87ba766f8bde37ecf242d35bab76de81e8242573aaa9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/*
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:49:23 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
9302
X-XSS-Protection
1; mode=block
X-Request-Id
00d4e8f2-de6a-43a8-9081-d0b294a20764
X-Runtime
0.002956
X-Backend-Node
10.110.10.11
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
X-Frame-Options
SAMEORIGIN
ETag
W/"c5a0cd9aff639f49915bf32984c5b1ff"
X-Download-Options
noopen
Vary
Accept-Encoding, Origin
Access-Control-Allow-Methods
GET, PUT, POST, DELETE, OPTIONS
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
/
infinityid.condenastdigital.com/
36 B
1 KB
XHR
General
Full URL
https://infinityid.condenastdigital.com/?rand=1578833363800
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.194.193.74 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-194-193-74.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
5afe231d85fb7e3d40593eafe86fe3c2fee64084e5a720390f2fbfbcfa8ef0b6

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:49:24 GMT
content-encoding
gzip
Server
nginx/1.15.8
vary
origin,accept-encoding
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
transfer-encoding
chunked
content
4d.condenastdigital.com/
4 KB
2 KB
XHR
General
Full URL
https://4d.condenastdigital.com/content?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.231.252.38 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-231-252-38.compute-1.amazonaws.com
Software
/
Resource Hash
24312ad4ad90fa02382145caec440792c9bdc7afa8c84bf5d00ba9c7eb3abfed

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:49:24 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-01-12T12%3A49%3A23.812Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=Iran%7CMagnallium%7Cutilities&cCh=information%20technology&cTi=Iranian%20hackers%20have%20been%20%E2%80%9Cpassword%20spraying%E2%80%9D%20the%20US%20grid&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&cCl=1054&cId=1642389&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&pRt=referral&pHp=%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4000&pSw=1600&pSh=1200&uID=dd73c6e0-b003-4490-a4a2-e27a01e07c1f&uNw=1&uUq=1&sID=ba36a5e7-b8e0-4dac-8197-b86402bad473&pID=76414615-0a90-4a69-bce3-ee8fb3e4a7b5&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Finterstitial%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3Anull%2C%22campaignId%22%3Anull%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22_out_of_page_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Atrue%2C%22isFirstRequested%22%3Atrue%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22out_of_page_0%22%2C%22outOfPage%22%3Atrue%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%221x1%22%2C%22slug%22%3A%22iranian-hackers-have-been-password-spraying-the-us-grid%22%7D&dim3=%7B%22footerStart%22%3A1578833363192%2C%22headerStart%22%3A1578833363173%2C%22navigationStart%22%3A1578833362611%2C%22pubAdsReady%22%3A1578833363547%2C%22injected%22%3A1578833363811%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22interstitial%22%5D%2C%22ctx_slot_type%22%3A%5B%22out_of_page%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22out_of_page_0%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22iranian-hackers-have-been-password-spraying-the-us-grid%22%5D%2C%22cnt_tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_He7NG7ZboLn_%22%5D%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.37.193 Ashburn, United States, ASN (),
Reverse DNS
ec2-52-2-37-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:49:23 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-01-12T12%3A49%3A23.822Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=Iran%7CMagnallium%7Cutilities&cCh=information%20technology&cTi=Iranian%20hackers%20have%20been%20%E2%80%9Cpassword%20spraying%E2%80%9D%20the%20US%20grid&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&cCl=1054&cId=1642389&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&pRt=referral&pHp=%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4000&pSw=1600&pSh=1200&uID=dd73c6e0-b003-4490-a4a2-e27a01e07c1f&sID=ba36a5e7-b8e0-4dac-8197-b86402bad473&pID=76414615-0a90-4a69-bce3-ee8fb3e4a7b5&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars.native%2Flegacy%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3Anull%2C%22campaignId%22%3Anull%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22native_xrail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Atrue%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22native_xrail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%222x2%22%2C%22slug%22%3A%22iranian-hackers-have-been-password-spraying-the-us-grid%22%7D&dim3=%7B%22footerStart%22%3A1578833363192%2C%22headerStart%22%3A1578833363173%2C%22navigationStart%22%3A1578833362611%2C%22pubAdsReady%22%3A1578833363547%2C%22injected%22%3A1578833363822%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22legacy%22%5D%2C%22ctx_slot_type%22%3A%5B%22native_xrail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22native_xrail_0%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22iranian-hackers-have-been-password-spraying-the-us-grid%22%5D%2C%22cnt_tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_He7NG7ZboLn_%22%5D%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.37.193 Ashburn, United States, ASN (),
Reverse DNS
ec2-52-2-37-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:49:24 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
collect
www.google-analytics.com/
35 B
119 B
Other
General
Full URL
https://www.google-analytics.com/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:23 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
https://arstechnica.com
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j79&tid=UA-31997-1&cid=1449571978.1578833364&jid=541929321&gjid=1083977941&_gid=376446956.1578833364&_u=aChAgUAjAAQC~&z=2017818416
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1449571978.1578833364&jid=541929321&_v=j79&z=2017818416
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1449571978.1578833364&jid=541929321&_v=j79&z=2017818416&slf_rd=1&random=637456834
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1449571978.1578833364&jid=541929321&_v=j79&z=2017818416&slf_rd=1&random=637456834
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:23 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:23 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1449571978.1578833364&jid=541929321&_v=j79&z=2017818416&slf_rd=1&random=637456834
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
page
t.skimresources.com/api/v2/
22 B
383 B
XHR
General
Full URL
https://t.skimresources.com/api/v2/page
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-type
text/plain

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:27 GMT
via
1.1 google
x-content-type-options
nosniff
server
Python/3.7 aiohttp/3.5.4
access-control-allow-headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
status
200
access-control-allow-methods
GET, POST, OPTIONS
content-type
text/plain; charset=utf-8, application/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache, must-revalidate
access-control-allow-credentials
true
alt-svc
clear
content-length
22
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1578833363488&de=483003110543&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=_out_of_page_0&zMoatRendered=1&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=1&zMoatPageDataTargetingSet=1&zMoatSafetyTargetingSet=1&zMoatEmptySlot=1&zMoatNadoDataLoadTime=181&zMoatAllDataLoadTime=181&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&ac=1&bq=11&f=0&zn=0&if=181&na=1503107975&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:23 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:23 GMT
otBannerSdk.js
cdn.cookielaw.org/scripttemplates/5.9.0/
325 KB
78 KB
Script
General
Full URL
https://cdn.cookielaw.org/scripttemplates/5.9.0/otBannerSdk.js
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/otSDKStub.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8FA5) /
Resource Hash
f7aa4714e096a10d27792f4c9f0f5a66d14c7e625d618bc2dcaa02c3b3113d0a

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Sun, 12 Jan 2020 12:49:23 GMT
content-encoding
gzip
content-md5
ogbvarzU0fhMH1X6yZRgBg==
x-cache
HIT
status
200
content-length
80123
x-ms-lease-status
unlocked
last-modified
Tue, 17 Dec 2019 20:41:27 GMT
server
ECAcc (frc/8FA5)
etag
0x8D783317D662F3E
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
x-ms-request-id
9bca7fc3-b01e-0066-3134-c96abc000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Sun, 12 Jan 2020 16:49:23 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1578833363488&de=483003110543&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=native_xrail_0&zMoatRendered=2&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=2&zMoatPageDataTargetingSet=2&zMoatSafetyTargetingSet=2&zMoatEmptySlot=2&zMoatNadoDataLoadTime=181&zMoatAllDataLoadTime=181&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&ac=1&bq=11&f=0&zn=0&if=181&na=725118835&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:23 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:23 GMT
5deac57938d0694c4b9da428.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady22326257
player.cnevids.com/script/video/
63 KB
21 KB
Script
General
Full URL
https://player.cnevids.com/script/video/5deac57938d0694c4b9da428.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady22326257
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-21927b84b8.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.13 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-13.fra50.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
543503d624bea2b1bf99cebc7728bf03a5a0d820f9db140a3dab3044c1f77632
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:49:23 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Amz-Cf-Pop
FRA50-C1
X-Cache
Miss from cloudfront
Status
200 OK
Connection
keep-alive
Content-Length
20742
X-XSS-Protection
1; mode=block
X-Request-Id
beb26fdc-44a5-4037-9b83-027530d9577b
X-Runtime
0.006916
X-Backend-Node
10.110.45.152
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"8f0fc26340ec731ad5486589fba4517f"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 c6702f5f3b6e77da6f394e67ef1a6aab.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Id
wm9WR1--EgTXP6ccXCnHiEtKcFFMMb0ls1xYM0FvWdJTeY0idx7G0w==
arstechnica_mini-4wd-racing.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1575930137/
17 KB
18 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1575930137/arstechnica_mini-4wd-racing.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
5c57a0f6d257ca6be9e6bcb6039fea214962c35b7b30fee3dcc112b8cec18d59

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:06 GMT
Via
1.1 varnish, 1.1 ff2bcb2d3b4a3d9e0615ddd1033c38c4.cloudfront.net (CloudFront)
Age
137
Edge-Cache-Tag
380278988686077832122293282495365645705,404749671192515790889513374839386840902,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
17267
X-Served-By
cache-fra19157-FRA
Last-Modified
Thu, 12 Dec 2019 14:30:32 GMT
Server
cloudinary
X-Timer
S1576161035.250963,VS0,VE102
ETag
"7cfa0c5590f779efc925bf7aee626a20"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
_2CTZf5tXIGlJM5LbBGLJF2AvtFqsWns12geyiq9x_HKNEbsRwMOwQ==
X-Cache-Hits
0
arstechnica_war-stories-war-stories-oddworld.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1575385501/
12 KB
13 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1575385501/arstechnica_war-stories-war-stories-oddworld.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
e67634eb3e8ded1b35d409539a3dde4f53ae0a7b332c9713803e216996b70f25

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:06 GMT
Via
1.1 varnish, 1.1 ff2bcb2d3b4a3d9e0615ddd1033c38c4.cloudfront.net (CloudFront)
Age
137
Edge-Cache-Tag
516766467372198984987912344758962687175,404749671192515790889513374839386840902,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
12630
X-Served-By
cache-hhn4070-HHN
Last-Modified
Tue, 03 Dec 2019 16:18:09 GMT
Server
cloudinary
X-Timer
S1575389916.400537,VS0,VE111
ETag
"7f0c64819a53ef4732059f6fc6df5c8a"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
9j5_N4gi218NzHdTyJXiuzQJr0OBrAvM8_Lsih276Ht8VT9S5H3ulA==
X-Cache-Hits
0
arstechnica_game-judges-you-nintendo-s-corey-olcsvary-reviews-your-mario-maker-2-levels.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1574177299/
12 KB
13 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1574177299/arstechnica_game-judges-you-nintendo-s-corey-olcsvary-reviews-your-mario-maker-2-levels.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
09598ddbbeaf9f31b2ff6f67ffccb4711d144a3795b792be68a3a176ee6c9ebe

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 19 Nov 2019 20:11:51 GMT
Via
1.1 varnish, 1.1 aab8eb1f7b95159cdf1cf139d0bbc33c.cloudfront.net (CloudFront)
Age
1935991
Edge-Cache-Tag
601200027999543495375406924058855020374,404749671192515790889513374839386840902,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
12324
X-Request-Id
3ca40085f6e5d3edafc3958c405ea3f5
X-Served-By
cache-hhn4080-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 19 Nov 2019 20:11:45 GMT
Server
cloudinary
X-Timer
S1574194311.928279,VS0,VE165
ETag
"9034961dde2383da30356914e81e7950"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
PX7t-tADfrSejA3L1rWLHjbaGuzfqoYz36QCdLsT8VDdCwMuloBprQ==
X-Cache-Hits
0
arstechnica_unsolved-mysteries-bioware-answers-unsolved-mysteries-of-the-mass-effect-universe.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1573140819/
11 KB
12 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1573140819/arstechnica_unsolved-mysteries-bioware-answers-unsolved-mysteries-of-the-mass-effect-universe.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
Cloudinary /
Resource Hash
de24551bd4396fc8579b2d87ce01944553dd48fb52775d14373725a50efa0c37
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 ff2bcb2d3b4a3d9e0615ddd1033c38c4.cloudfront.net (CloudFront)
Age
137
X-Cache
Hit from cloudfront
Date
Sun, 12 Jan 2020 12:47:06 GMT
Server-Timing
cloudinary;dur=112;start=2019-11-08T14:35:45.689Z,cld-id;desc=555a3491395f2119db357e871f2eced0,fastly;dur=0;total=205;start=2019-11-08T14:35:45.643Z;desc=MISS,rtt;dur=0
Content-Length
11417
X-Request-Id
555a3491395f2119db357e871f2eced0
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 08 Nov 2019 14:35:23 GMT
Server
Cloudinary
Cache-Control
public, max-age=300
ETag
"3e8509d06c6610d54babcac0d91e5d93"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Server-Timing
Connection
keep-alive
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
iHPXkfm5shMuXWYCRYK1tGL9zrtwJdyFAccaP-z4C5a-yTobiY9G_w==
arstechnica_war-stories-civilization.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1569003425/
16 KB
17 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1569003425/arstechnica_war-stories-civilization.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
1c7dcc8216c6f82da2998ceeac2523632c7f9bffe510824b6d082621201f2012

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Mon, 23 Sep 2019 16:37:49 GMT
Via
1.1 varnish, 1.1 aab8eb1f7b95159cdf1cf139d0bbc33c.cloudfront.net (CloudFront)
Age
1800159
Edge-Cache-Tag
390602458176548494884398897259766670181,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
16236
X-Request-Id
df2afd02bed526ce
X-Served-By
cache-hhn4065-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Mon, 23 Sep 2019 11:27:54 GMT
Server
cloudinary
X-Timer
S1569256670.782884,VS0,VE192
ETag
"72002610618f7bf8bf0e52c760e39897"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
oPyWG_MOiep2YyvtpKU-yo3z9fHaCcOVKDCRb_m4bZxSuupaZyDnkw==
X-Cache-Hits
0
arstechnica_sitrep-dod-resets-ballistic-missile-interceptor-program.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1568662260/
11 KB
11 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1568662260/arstechnica_sitrep-dod-resets-ballistic-missile-interceptor-program.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
7fc88c65d46e83b3f3e9f098f05fd639480332fc3718cd714725e2e4633af4e8

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 17 Sep 2019 19:55:23 GMT
Via
1.1 varnish, 1.1 ff2bcb2d3b4a3d9e0615ddd1033c38c4.cloudfront.net (CloudFront)
Age
2306675
Edge-Cache-Tag
285695674967648002297586464606017083075,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
10793
X-Served-By
cache-fra19156-FRA
Last-Modified
Tue, 17 Sep 2019 19:55:15 GMT
Server
cloudinary
X-Timer
S1568750123.147762,VS0,VE109
ETag
"0e1ff58ccf6d97759de3d774a7ff835a"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
INdUkC0HjyWDQZrZxXRL16_Jy24tzZ9W1zl2jMaGqykyQFyWyjdo1g==
X-Cache-Hits
0
arstechnica_dead-cells-how-to-avoid-falling-to-your-death-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1563202921/
16 KB
17 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1563202921/arstechnica_dead-cells-how-to-avoid-falling-to-your-death-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
5f760e6eaa1fd8e199a7135ae74692369612ff5de37b99eb63bcb8ee7d615568

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:06 GMT
Via
1.1 varnish, 1.1 aab8eb1f7b95159cdf1cf139d0bbc33c.cloudfront.net (CloudFront)
Age
138
Edge-Cache-Tag
512786565011436188602690990842551442357,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
16016
X-Request-Id
558da5101eeb1f1f
X-Served-By
cache-fra19150-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 19 Jul 2019 15:13:07 GMT
Server
cloudinary
X-Timer
S1563549194.385414,VS0,VE180
ETag
"4dba8e36b73a44cca8375175ae0e4b39"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
ePRVsVK7AXXHIW3lB25z71YKlKBNGvWZji9OoG-Qt97KmKXKDpnxPQ==
X-Cache-Hits
0
arstechnica_warframe-reviews.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1561556730/
14 KB
15 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1561556730/arstechnica_warframe-reviews.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
83a366075eb2387c6d9f848f42b08df0546027333eccf5813edf95ba45709be2

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:06 GMT
Via
1.1 varnish, 1.1 ff2bcb2d3b4a3d9e0615ddd1033c38c4.cloudfront.net (CloudFront)
Age
138
Edge-Cache-Tag
409825722100045817936218917770258862228,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
14837
X-Request-Id
b6ad3868f2bf03bf
X-Served-By
cache-hhn4083-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Thu, 27 Jun 2019 19:34:59 GMT
Server
cloudinary
X-Timer
S1561664111.929725,VS0,VE147
ETag
"1d90d6aef7585f963e1270a1a02a4dd4"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
dfXyxbogimjrVUtjRIDkW95TiEH0b3UCI3hipMwXQJqxBbP7TTAt6Q==
X-Cache-Hits
0
arstechnica_war-stories-subnautica.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559747425/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559747425/arstechnica_war-stories-subnautica.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
20660a9ef7ec454c15b2dc62b3db084e0cc9f74c5bb6de71a96fb1a54aef00f8

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:06 GMT
Via
1.1 varnish, 1.1 aab8eb1f7b95159cdf1cf139d0bbc33c.cloudfront.net (CloudFront)
Age
138
Edge-Cache-Tag
384957005148579205807938476483146982592,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15222
X-Request-Id
ce1d27b050d5738b
X-Served-By
cache-hhn1540-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Wed, 05 Jun 2019 17:40:02 GMT
Server
cloudinary
X-Timer
S1561373340.624145,VS0,VE260
ETag
"8c45b6c645caba59f4b14d3fbdc09062"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
H212TOeT493BBO2MoNLQwIp8C9P7sFgwGVhmhO39PJPVxmpUtn0JRQ==
X-Cache-Hits
0
arstechnica_this-war-of-mine-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559075831/
16 KB
17 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559075831/arstechnica_this-war-of-mine-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
ec84902ae04cc118d965c577e2ece816abd594431ce66bcef1afd4f745e951fd

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:06 GMT
Via
1.1 varnish, 1.1 ff2bcb2d3b4a3d9e0615ddd1033c38c4.cloudfront.net (CloudFront)
Age
138
Edge-Cache-Tag
580474366038461196493179311799260666459,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15985
X-Request-Id
e9c3b3c122e652ae
X-Served-By
cache-fra19160-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Mon, 03 Jun 2019 18:11:08 GMT
Server
cloudinary
X-Timer
S1563305622.451318,VS0,VE215
ETag
"42bc7816573b81a73647b6f7123944c5"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
Ayq2Ih3B-qSyxDORo-RFk56hZ1waPlcMG05_OEPvOkhUADW3ygfpZg==
X-Cache-Hits
0
arstechnica_obra-dinn-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1558373184/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1558373184/arstechnica_obra-dinn-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
8574074952616e0a56e5b72d9634bff0a683d658d09804c10324293811606d22

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:06 GMT
Via
1.1 varnish, 1.1 aab8eb1f7b95159cdf1cf139d0bbc33c.cloudfront.net (CloudFront)
Age
138
Edge-Cache-Tag
433557846635605494688582207268998106147,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15609
X-Request-Id
c8a15984885b6e84
X-Served-By
cache-fra19142-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 28 May 2019 17:36:10 GMT
Server
cloudinary
X-Timer
S1559065035.044774,VS0,VE231
ETag
"8becb0d5f4f7ff3e76e89c89871f465d"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
1rVKg1sKSmQH0yIXzA85KlpikXjQzXf19yOA1QAPWAuI23EeaF-8Iw==
X-Cache-Hits
0
arstechnica_army-s-new-pistol-has-had-some-misfires.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556912500/
8 KB
9 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556912500/arstechnica_army-s-new-pistol-has-had-some-misfires.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
a91d62b47f02a7e638d1749e3791ac328b2dd89dac630578f76e65b1ed91ed89

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:06 GMT
Via
1.1 varnish, 1.1 ff2bcb2d3b4a3d9e0615ddd1033c38c4.cloudfront.net (CloudFront)
Age
138
Edge-Cache-Tag
575077299308468417590234438077035908298,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
7863
X-Request-Id
19c9873a9e40bdc6
X-Served-By
cache-hhn1537-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Mon, 13 May 2019 19:11:27 GMT
Server
cloudinary
X-Timer
S1559434184.442899,VS0,VE232
ETag
"31902de995c98904a55c605571f06530"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
a2R3ScxrfrwxhYfj42fWN7_ubcOJiz7DHDA3TArcbtp0XtLjgeZKEA==
X-Cache-Hits
0
arstechnica_war-stories-slay-the-spire-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556741487/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556741487/arstechnica_war-stories-slay-the-spire-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
f9d9e96c4439beeca49a1a10f9dffe6f5cd0b604d13aa13af170d0bc62d8ca1b

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:06 GMT
Via
1.1 varnish, 1.1 aab8eb1f7b95159cdf1cf139d0bbc33c.cloudfront.net (CloudFront)
Age
138
Edge-Cache-Tag
515397136805965062020045600075132664421,404749671192515790889513374839386840902,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15634
X-Request-Id
2d0da7ec326501f4
X-Served-By
cache-fra19145-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Thu, 02 May 2019 18:45:52 GMT
Server
cloudinary
X-Timer
S1559088335.611581,VS0,VE1
ETag
"abee90e53f29ba0127fca9442ab50902"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
0mE8xsczjV5kJxO4t7sOvr13IdG4l3UmzKZ6H3_VCIm-JWNrqQNLqg==
X-Cache-Hits
1
arstechnica_war-stories-amnesia-the-dark-descent-the-horror-facade.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1555359865/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1555359865/arstechnica_war-stories-amnesia-the-dark-descent-the-horror-facade.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
1defb6bc54a7ee9c066136908360e8455c23ee9ad0dec9924e7255d7948cd4be

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:07 GMT
Via
1.1 varnish, 1.1 ff2bcb2d3b4a3d9e0615ddd1033c38c4.cloudfront.net (CloudFront)
Age
137
Edge-Cache-Tag
587193118310891607619753694455047488726,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15251
X-Request-Id
4a753e904b5f7094
X-Served-By
cache-hhn1539-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 16 Apr 2019 18:59:19 GMT
Server
cloudinary
X-Timer
S1558397317.096357,VS0,VE232
ETag
"3e7cdc13e718680bf5e1efa64468b560"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
UuqHQcMoOftBGXSw7AjUBeiGozag6pfha9pp9loeo-h2GwkTxMG4TQ==
X-Cache-Hits
0
arstechnica_war-stories-c-and-c-tiberian-sun.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1551193450/
19 KB
19 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1551193450/arstechnica_war-stories-c-and-c-tiberian-sun.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
27348ba4b98bd80f1038496ec5dea6ad865680540058fb085b8ca199b8aaf4c5

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:06 GMT
Via
1.1 varnish, 1.1 aab8eb1f7b95159cdf1cf139d0bbc33c.cloudfront.net (CloudFront)
Age
137
Edge-Cache-Tag
313687566273846460968749706722669918033,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
19022
X-Request-Id
2200c349462f9c83
X-Served-By
cache-hhn1528-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Wed, 27 Feb 2019 16:48:24 GMT
Server
cloudinary
X-Timer
S1559006978.808642,VS0,VE226
ETag
"fe52b9acd391d8bee8de15a0f429b377"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
3F0nxyALODW6BtutLxWQF7Ne7AvD41kSylRgqPLFmVwY1lnLG4c2RQ==
X-Cache-Hits
0
arstechnica_army-s-next-vertical-lift-en-route.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550680609/
5 KB
6 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550680609/arstechnica_army-s-next-vertical-lift-en-route.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
4868ca91bcd0d492c501ec5b8d44ac78d3e1226977ae14ff598f5efe78751951

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:07 GMT
Via
1.1 varnish, 1.1 ff2bcb2d3b4a3d9e0615ddd1033c38c4.cloudfront.net (CloudFront)
Age
137
Edge-Cache-Tag
312535560964408758261298476626669868625,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
4867
X-Request-Id
e3f346bec24d7ff3
X-Served-By
cache-hhn1532-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Thu, 21 Feb 2019 15:50:43 GMT
Server
cloudinary
X-Timer
S1559089107.834583,VS0,VE286
ETag
"90ad4d692f7209c01596b99729f26e7b"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
duUlfzQuqbjigjPC-dQJyWWrMlJ4vQF8frjVwuPDT5HaGymBftEN4Q==
X-Cache-Hits
0
arstechnica_war-stories-blade-runner-skinjobs-voxels-and-future-noir.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550244434/
18 KB
19 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550244434/arstechnica_war-stories-blade-runner-skinjobs-voxels-and-future-noir.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
8b72952d3fd656ee6594f0d9735d928113ad1d590705b14f77abf75f1d4d5d69

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:07 GMT
Via
1.1 varnish, 1.1 aab8eb1f7b95159cdf1cf139d0bbc33c.cloudfront.net (CloudFront)
Age
137
Edge-Cache-Tag
292757494989914907279105994976263969890,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
18172
X-Request-Id
c3e7d96bbe014b80
X-Served-By
cache-hhn1535-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 15 Feb 2019 15:34:33 GMT
Server
cloudinary
X-Timer
S1559088690.594713,VS0,VE388
ETag
"32f1b8954559c8d598e9861f5b8360b9"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
D2wjTH61BzABAWM8cD0oXIXaRT_hjucXfTl0yBCUN9tOhdnmZ4pBYA==
X-Cache-Hits
0
arstechnica_war-stories-dead-space-the-drag-tentacle.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1546889545/
7 KB
8 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1546889545/arstechnica_war-stories-dead-space-the-drag-tentacle.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
9933997608e86beaf1e7f7188a5c657cdad8ccd9d20eb7b1a46adaa83fa850ab

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 02 Jun 2019 00:19:02 GMT
Via
1.1 varnish, 1.1 ff2bcb2d3b4a3d9e0615ddd1033c38c4.cloudfront.net (CloudFront)
Age
1893066
Edge-Cache-Tag
561334743792169660751574031162860899763,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
7393
X-Served-By
cache-hhn1525-HHN
Last-Modified
Tue, 08 Jan 2019 16:38:58 GMT
Server
cloudinary
X-Timer
S1559434743.785754,VS0,VE1
ETag
"17a6e4b5eb75eb12f5d8c89eb3d0ace8"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
pk9VvTI3_J1uf4U2TEYWkd6H6E39zx7JsXteXE6a0wc6HXp5TFxPFQ==
X-Cache-Hits
1
arstechnica_teach-the-controversy-flat-earthers.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1541592304/
10 KB
11 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1541592304/arstechnica_teach-the-controversy-flat-earthers.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
7364fcbb6c5d775f07816712af8a6419db99268f72c337a4977f706dc3423bb3

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:49:13 GMT
Via
1.1 varnish, 1.1 ff2bcb2d3b4a3d9e0615ddd1033c38c4.cloudfront.net (CloudFront)
Age
11
Edge-Cache-Tag
522150850958368321191235208678465217967,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
10595
X-Request-Id
98a54be49b866b53
X-Served-By
cache-hhn1521-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 09 Nov 2018 14:44:53 GMT
Server
cloudinary
X-Timer
S1559436315.461747,VS0,VE1
ETag
"6c0c4f8a9d61ed2b5863a8058c624a37"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
240J31EEAY9P7R0VRXEgFjrScaLp60z6ZpLQ6tE2eBigMx6lLCu8Tg==
X-Cache-Hits
2
arstechnica_delta-v-the-burgeoning-world-of-small-rockets-paul-allen-s-huge-plane-and-spacex-get-s-a-crucial-green-light.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1537406983/
12 KB
13 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1537406983/arstechnica_delta-v-the-burgeoning-world-of-small-rockets-paul-allen-s-huge-plane-and-spacex-get-s-a-crucial-green-light.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
16f86804dd013db340fee4020a539d3e9d6e5a03d6841e431e50c428e99c26e8

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:49:13 GMT
Via
1.1 varnish, 1.1 aab8eb1f7b95159cdf1cf139d0bbc33c.cloudfront.net (CloudFront)
Age
11
Edge-Cache-Tag
389498626973997838808844380914497340413,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
12509
X-Request-Id
ec5f066ff382a9d5
X-Served-By
cache-fra19162-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 21 Sep 2018 16:51:30 GMT
Server
cloudinary
X-Timer
S1559434364.715908,VS0,VE304
ETag
"b9c502ffc902b60d0eb13698b37a945d"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
wgYm3ZJO8pnWSxn4RSkx18IJGBaDKKbj1BwTh4dNGoieuO-0tol26A==
X-Cache-Hits
0
arstechnica_chris-hadfield-explains-his-space-oddity-video.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1522031130/
7 KB
8 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1522031130/arstechnica_chris-hadfield-explains-his-space-oddity-video.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
3ce7e824185893264ab44fbf8370a8f1262831c4c6c367b15f7d4f1e88fadc8c

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Mon, 06 Jan 2020 08:23:39 GMT
Via
1.1 varnish, 1.1 ff2bcb2d3b4a3d9e0615ddd1033c38c4.cloudfront.net (CloudFront)
Age
534345
Edge-Cache-Tag
294316597633303263276952824544497226127,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
7181
X-Served-By
cache-fra19129-FRA
Last-Modified
Fri, 06 Jul 2018 12:23:22 GMT
Server
cloudinary
X-Timer
S1558376344.111767,VS0,VE1
ETag
"0549828edcecd339d8d10ebe6119de70"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
bbOIkHes1Xl0dM9_Y4vnrGEEazvL8sb2r27fv0_Vq0Dt--ococz4LQ==
X-Cache-Hits
1
arstechnica_apollo-mission-episode-1.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1512424612/
14 KB
15 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1512424612/arstechnica_apollo-mission-episode-1.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
82cd1a97f81e5b63a621311be2993916eea0907b5eadd53bb6b280f4bb0f8391

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:07 GMT
Via
1.1 varnish, 1.1 aab8eb1f7b95159cdf1cf139d0bbc33c.cloudfront.net (CloudFront)
Age
137
Edge-Cache-Tag
424632948265147424317824738369264083785,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
14040
X-Request-Id
37d0301184b1a283
X-Served-By
cache-hhn1547-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 05 Dec 2017 01:52:25 GMT
Server
cloudinary
X-Timer
S1559089275.724502,VS0,VE297
ETag
"ecc047c6eed3dc571a78eab647201220"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
Br_oTPVP4x3NX-JYKW5K5It8Wz2Th_wiwZZlbzdZan2a3paAZbzf7g==
X-Cache-Hits
0
arstechnica_richard-garriot-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1513807048/
14 KB
14 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1513807048/arstechnica_richard-garriot-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
4980853759711c8e9e2779239acd62e9e802fba38371763c65ecdd016a83fdbd

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:07 GMT
Via
1.1 varnish, 1.1 ff2bcb2d3b4a3d9e0615ddd1033c38c4.cloudfront.net (CloudFront)
Age
137
Edge-Cache-Tag
489732375708630852448407029403767769375,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
13885
X-Request-Id
50cb21064027ad75
X-Served-By
cache-hhn1541-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 06 Jul 2018 19:56:42 GMT
Server
cloudinary
X-Timer
S1558398138.789238,VS0,VE1
ETag
"13d45a1733ad4d2f3ae707584d6a8a32"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
jkA6cEqryxCL5Lgx-sAQx7YqsktDp8EqaYlnOxUirg6Iluv2zzu3EQ==
X-Cache-Hits
1
truncated
/
408 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c21029f21dc145723d40362da85504ee5a5bd33f5db6636beae3a01c7aba1fa2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
location
geolocation.onetrust.com/cookieconsentpub/v1/geo/
197 B
520 B
Script
General
Full URL
https://geolocation.onetrust.com/cookieconsentpub/v1/geo/location
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.9.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:b844 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
70a6197fb7cca87ce2344481e863b24bf5eaf85735aebc0e14aecc5cadb8bbfb
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains; preload

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:24 GMT
content-encoding
gzip
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
status
200
strict-transport-security
max-age=0; includeSubDomains; preload
cf-ray
553f400d5ed4c29f-FRA
embed-api.json
player.cnevids.com/
6 KB
3 KB
Fetch
General
Full URL
https://player.cnevids.com/embed-api.json?videoId=5deac57938d0694c4b9da428&embedLocation=arstechnica
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5deac57938d0694c4b9da428.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady22326257
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.13 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-13.fra50.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
b49c714246c3fa6b1facb6654458807e74aa081a48b305b9c3d5afdd87563960
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

Date
Sun, 12 Jan 2020 12:49:24 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Amz-Cf-Pop
FRA50-C1
X-Cache
Miss from cloudfront
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
2094
X-XSS-Protection
1; mode=block
X-Request-Id
b5ed0b56-999e-4c0c-bda4-39b390bcec06
X-Runtime
0.007693
X-Backend-Node
10.110.72.103
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"bf45f5f5c5077bc74b9359a9f11d96e9"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Access-Control-Allow-Methods
GET, OPTIONS
Content-Type
application/json; charset=utf-8
Via
1.1 436c247027acc191b22ece964efbaeca.cloudfront.net (CloudFront)
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
Access-Control-Allow-Origin
*
X-Amz-Cf-Id
g5iM2QeM9-KuSS_92uL2KVWj4X8JAWJF2wql-5MTTA5zvKN-_8QWZA==
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame CCB8
270 KB
92 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5deac57938d0694c4b9da428.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady22326257
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
c612786520975231822586a9890d1ce53d7106bdea13903c26dc36f37f7818b9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:24 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
93653
x-xss-protection
0
expires
Sun, 12 Jan 2020 12:49:24 GMT
gpt_proxy.js
imasdk.googleapis.com/js/sdkloader/
66 KB
24 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/gpt_proxy.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5deac57938d0694c4b9da428.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady22326257
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
b71308191586711362df7b836a1a7f50f70e460cb008d5f191d960b9247aeb4d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:44:27 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 08 Jan 2020 17:25:34 GMT
server
sffe
age
297
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24583
x-xss-protection
0
expires
Sun, 12 Jan 2020 12:59:27 GMT
player-style-3b3a013ac40046610e8f2fefe02c3b07.css
d2c8v52ll5s99u.cloudfront.net/player/ Frame CCB8
74 KB
12 KB
Stylesheet
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-3b3a013ac40046610e8f2fefe02c3b07.css
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5deac57938d0694c4b9da428.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady22326257
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.169 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-169.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
596b76b93c7801ba85fb53f2f6e2281d4dbffc96ddc18bb056e8cb0e94be34fd

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 10 Nov 2019 05:17:45 GMT
Content-Encoding
gzip
Age
5470300
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
11365
Last-Modified
Wed, 05 Jun 2019 16:03:54 GMT
Server
AmazonS3
ETag
"cff060eda5015972d532696ec91d375b"
Content-Type
text/css; charset=utf-8
Via
1.1 f8fe53d5464b299529d281799da8de30.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
X-Amz-Cf-Id
HUZqR0xXxLS2SCqLMWHmZHdwAHZrcxz1HaDwE9zzvzulRILVAh6dHA==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
main-8acd27185b78ea8d8dde.js
d2c8v52ll5s99u.cloudfront.net/player/ Frame CCB8
915 KB
230 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5deac57938d0694c4b9da428.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady22326257
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.169 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-169.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
5c6c066d45fcff5eb73d9f8c6e7b2d756d46229d4c05a7b776054c71c05c70b4

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 07 Jan 2020 21:11:36 GMT
Content-Encoding
gzip
Age
401869
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
234924
Last-Modified
Tue, 07 Jan 2020 21:03:27 GMT
Server
AmazonS3
ETag
"fb0b5702877a9be5aaeeec5b6ba4c842"
Content-Type
application/javascript
Via
1.1 f8fe53d5464b299529d281799da8de30.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
X-Amz-Cf-Id
hmBxsDUBkD1UHOHL2Ympe4MBg43D_NDwNywYD7MqIlcgY_V2zTqKSw==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
ptrack-v1.4.0-engagedtime-slots.js
d1z2jf7jlzjs58.cloudfront.net/code/
39 KB
16 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/code/ptrack-v1.4.0-engagedtime-slots.js
Requested by
Host: d1z2jf7jlzjs58.cloudfront.net
URL: https://d1z2jf7jlzjs58.cloudfront.net/p.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.221 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-221.fra2.r.cloudfront.net
Software
nginx /
Resource Hash
5c66cbe33a007920cdea231069727d9420e5e4a751378d2adb7777a03fe716bd

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 19 Sep 2019 21:15:08 GMT
Content-Encoding
gzip
Age
9905656
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Pragma
public
Last-Modified
Thu, 19 Sep 2019 16:47:30 GMT
Server
nginx
ETag
W/"5d83b122-9c0d"
Content-Type
application/x-javascript
Via
1.1 ac0e9b19969df989a920e6d1b834d009.cloudfront.net (CloudFront)
Cache-Control
max-age=315360000, public
X-Amz-Cf-Pop
FRA2-C2
X-Amz-Cf-Id
ROlUO48SoH9pNrUToGQTCNdHzbvK24WmdXKVXt2boHBmGmW85lSdJw==
Expires
Thu, 31 Dec 2037 23:55:55 GMT
/
srv-2020-01-12-12.pixel.parsely.com/plogger/
43 B
229 B
Image
General
Full URL
https://srv-2020-01-12-12.pixel.parsely.com/plogger/?rand=1578833364126&plid=39844375&idsite=arstechnica.com&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&urlref=&screen=1600x1200%7C1600x1200%7C24&data=%7B%22parsely_uuid%22%3A%22bdf63c77-5a31-4098-b1ae-7cd6f00e19a4%22%2C%22parsely_site_uuid%22%3A%2245afcdc9-0d3f-4e09-9fe0-b1588833d651%22%7D&sid=1&surl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&sref=&sts=1578833364116&slts=0&title=Iranian+hackers+have+been+%E2%80%9Cpassword+spraying%E2%80%9D+the+US+grid+%7C+Ars+Technica&date=Sun+Jan+12+2020+13%3A49%3A24+GMT%2B0100+(Central+European+Standard+Time)&action=pageview&pvid=4956339&u=45afcdc9-0d3f-4e09-9fe0-b1588833d651
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.230.243.129 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-230-243-129.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:49:07 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
en.json
cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910/ef17d20e-0b37-40e7-a82c-27f698052aea/
76 KB
13 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910/ef17d20e-0b37-40e7-a82c-27f698052aea/en.json
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.9.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8FE9) /
Resource Hash
573cb4596b4aa1085e874238d858cf6addbb735b39f0ea15300eb49b8faf3f16

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

x-ms-blob-type
BlockBlob
date
Sun, 12 Jan 2020 12:49:24 GMT
content-encoding
gzip
content-md5
q1rg3LZyxjhQPFrJLer4MQ==
x-cache
HIT
status
200
content-length
13236
x-ms-lease-status
unlocked
last-modified
Thu, 09 Jan 2020 19:29:40 GMT
server
ECAcc (frc/8FE9)
etag
0x8D7953A45A1D84F
vary
Accept-Encoding
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
8d14a958-201e-0005-0f29-c92c99000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Sun, 12 Jan 2020 16:49:24 GMT
eaff3a95-883a-4a55-b298-1d31c926b69c
https://arstechnica.com/ Frame CCB8
31 B
0
Other
General
Full URL
blob:https://arstechnica.com/eaff3a95-883a-4a55-b298-1d31c926b69c
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7725538fe2f71147bffeba7452b434c826aef9009666cb4360c605d0b2a91d1d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Length
31
Content-Type
application/javascript
otCMP.js
cdn.cookielaw.org/scripttemplates/5.9.0/
15 KB
5 KB
Script
General
Full URL
https://cdn.cookielaw.org/scripttemplates/5.9.0/otCMP.js
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.9.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8F37) /
Resource Hash
a761b79faf8e1a8808729668853cac9dfbbcfa070fe3fc3814a5685abb16bb6e

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Sun, 12 Jan 2020 12:49:24 GMT
content-encoding
gzip
content-md5
UlzILkh3IgsGXEj4KlzDaw==
x-cache
HIT
status
200
content-length
5080
x-ms-lease-status
unlocked
last-modified
Tue, 17 Dec 2019 20:41:33 GMT
server
ECAcc (frc/8F37)
etag
0x8D7833180B9A577
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
x-ms-request-id
2589f808-e01e-0057-2f3f-c9316b000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
expires
Sun, 12 Jan 2020 16:49:24 GMT
user
4d.condenastdigital.com/
67 B
423 B
XHR
General
Full URL
https://4d.condenastdigital.com/user?xid=f243d0b3-aa47-4216-ad43-d5b588dec887
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.231.252.38 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-231-252-38.compute-1.amazonaws.com
Software
/
Resource Hash
6977711b48838bf03a6e3fdade64e0d61800eeb4b0a1f758032621a7203e79ec

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:49:25 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
sf-ui-display-medium-webfont.woff2
d2c8v52ll5s99u.cloudfront.net/assets/fonts/ Frame CCB8
29 KB
30 KB
Font
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/assets/fonts/sf-ui-display-medium-webfont.woff2
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.169 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-169.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
d281c9d6bae645f3da6d2f0769a2cf0668709fd28e2021ce74821cdd8c7117b3

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-3b3a013ac40046610e8f2fefe02c3b07.css
Origin
https://arstechnica.com

Response headers

Date
Sun, 12 Jan 2020 12:49:25 GMT
Content-Encoding
gzip
X-Amz-Cf-Pop
FRA2-C2
X-Cache
RefreshHit from cloudfront
Access-Control-Max-Age
3000
Connection
keep-alive
Content-Length
29632
Via
1.1 57d93b321db68494cc6755a0d3fb29cd.cloudfront.net (CloudFront)
Last-Modified
Mon, 26 Jun 2017 15:24:42 GMT
Server
AmazonS3
ETag
"7d18db04f980971f2a9c5026bbc34bed"
Vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
Access-Control-Allow-Methods
GET
Content-Type
application/font-woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=63072000, public
Accept-Ranges
bytes
X-Amz-Cf-Id
1GHQm_6KCzVfVyZebvbD5UkIeIzj4Tdd2tFufARvzD-eL4fRYDLnqQ==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
bridge3.358.1_en.html
imasdk.googleapis.com/js/core/ Frame A529
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.358.1_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.358.1_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
197105
date
Thu, 09 Jan 2020 12:00:31 GMT
expires
Fri, 08 Jan 2021 12:00:31 GMT
last-modified
Wed, 08 Jan 2020 17:21:14 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
262133
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
client.js
s0.2mdn.net/instream/video/ Frame CCB8
26 KB
11 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:24 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10523
x-xss-protection
0
expires
Sun, 12 Jan 2020 12:49:24 GMT
integrator.js
adservice.google.com/adsid/ Frame CCB8
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:24 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
fbevents.js
connect.facebook.net/en_US/ Frame CCB8
126 KB
30 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
1ada5b4d0b63b06d2bd668cd7d6597689796da41a434a675cfdbd2a1bddf251a
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-24=":443"; ma=3600
content-length
30426
x-xss-protection
0
pragma
public
x-fb-debug
fwXcrpU7xuaVQx8Jro/Tr/rr0yqI+07qkRTFHLtcTtGcwXk+d5sCj3BrTUzh7jNdDkM6uopfh/FGmmeJP1hF9Q==
x-fb-trip-id
194532234
date
Sun, 12 Jan 2020 12:49:24 GMT
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
vary
Accept-Encoding
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
comscore-min.js
d2c8v52ll5s99u.cloudfront.net/player/ Frame CCB8
38 KB
11 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/comscore-min.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.169 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-169.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
833a86642252016b29f08dd45ffd27f9e00ca237f28d8c5f0147a6e15d009377

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:09 GMT
Content-Encoding
gzip
Last-Modified
Wed, 24 May 2017 18:19:15 GMT
Server
AmazonS3
Age
136
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
text/javascript
Via
1.1 f8fe53d5464b299529d281799da8de30.cloudfront.net (CloudFront)
Transfer-Encoding
chunked
X-Amz-Cf-Pop
FRA2-C2
Connection
keep-alive
X-Amz-Cf-Id
h0FLt7VziWw1Vjj4oW1iI_0MX1BUiYd4sFvh0mQIw8Ui7D_BeqfQgg==
collect
www.google-analytics.com/r/
35 B
102 B
Other
General
Full URL
https://www.google-analytics.com/r/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:24 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
https://arstechnica.com
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
track
capture.condenastdigital.com/ Frame CCB8
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2020-01-12T12%3A49%3A24.302Z&_c=&_t=Player%20Requested&sID=ba36a5e7-b8e0-4dac-8197-b86402bad473&pID=76414615-0a90-4a69-bce3-ee8fb3e4a7b5&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.37.193 Ashburn, United States, ASN (),
Reverse DNS
ec2-52-2-37-193.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:49:24 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
arstechnica_mini-4wd-racing.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1575930137/ Frame CCB8
77 KB
78 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1575930137/arstechnica_mini-4wd-racing.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
00e3bdc033f31eee3294bbfa68d03bc0968b4f86507e68ff9d19d9890039c89c

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:29 GMT
Via
1.1 varnish, 1.1 ff2bcb2d3b4a3d9e0615ddd1033c38c4.cloudfront.net (CloudFront)
Age
115
Edge-Cache-Tag
380278988686077832122293282495365645705,504486728181076666154556403696563473843,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
78622
X-Served-By
cache-fra19151-FRA
Last-Modified
Tue, 10 Dec 2019 16:07:04 GMT
Server
cloudinary
X-Timer
S1578714081.614489,VS0,VE0
ETag
"bc88b9555531b7b8cfae6ecc1581a7f7"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
ZZkozUoGucRKWs5Clb-MpJNRJYTpuOrEx80qWAbJB5Mi6IFXc6D9sw==
X-Cache-Hits
5
21b60411-41b1-4740-8528-630500e6af3ethumbs.mp4
dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/ Frame CCB8
64 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/21b60411-41b1-4740-8528-630500e6af3ethumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.95 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-95.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Range
bytes=0-

Response headers

Date
Sat, 11 Jan 2020 16:32:35 GMT
Via
1.1 ef13dd533b8dc9dcfdc35449cf88f808.cloudfront.net (CloudFront)
Last-Modified
Fri, 06 Dec 2019 21:47:42 GMT
Server
AmazonS3
Age
73010
ETag
"3c4c69d175578a2c5dcb4d064f187efb"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 0-1999682/1999683
Connection
keep-alive
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Content-Length
1999683
X-Amz-Cf-Id
yYaJssJbC98Oh2ne2sNRdIY8TnDP6ogpggq8kQZqH0POwCTKFbbebQ==
21b60411-41b1-4740-8528-630500e6af3ethumbs.mp4
dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/ Frame CCB8
128 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/21b60411-41b1-4740-8528-630500e6af3ethumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.95 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-95.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Range
bytes=0-

Response headers

Date
Sat, 11 Jan 2020 16:32:35 GMT
Via
1.1 9ab847fabb8c9edbd39cff57c2a2f4c0.cloudfront.net (CloudFront)
Last-Modified
Fri, 06 Dec 2019 21:47:42 GMT
Server
AmazonS3
Age
73010
ETag
"3c4c69d175578a2c5dcb4d064f187efb"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 0-1999682/1999683
Connection
keep-alive
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
Content-Length
1999683
X-Amz-Cf-Id
ZBwzNWwSWBAkcxhHGW4uK66vBOroRGYt1uk_nT0G9T4_xTaaM61acQ==
track
capture.condenastdigital.com/ Frame CCB8
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2020-01-12T12%3A49%3A24.542Z&_c=Player%20Event&_t=Player%20Loaded&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=https%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Fcustomizing-mini-4wd-racers-for-high-speeds-on-a-small-scale%2F&cId=5deac57938d0694c4b9da428&cKe=hobbies%2Crace%20car%2Crace%20cars%2Cracing&cPd=2019-12-10T16%3A00%3A00%2B00%3A00&cTi=Customizing%20Mini%204WD%20Racers%20For%20High%20Speeds%20On%20A%20Small%20Scale&mDu=655&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&pID=76414615-0a90-4a69-bce3-ee8fb3e4a7b5&pWw=540&pWh=303.75&sID=ba36a5e7-b8e0-4dac-8197-b86402bad473&uId=dd73c6e0-b003-4490-a4a2-e27a01e07c1f&xid=f243d0b3-aa47-4216-ad43-d5b588dec887&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22gitBranch%22%3A%22master%22%2C%22gitSha%22%3A%227a2672b%22%2C%22guid%22%3A%221192efb3-1d6b-ccc1-f514-939980dadd53%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A3233.9375%2C%22playerType%22%3A%22video-continuous%22%2C%22playsOnPage%22%3A0%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22isRightRail%22%3Afalse%2C%22tabStatus%22%3A%22active%22%2C%22versoPageType%22%3A%22article%7Creport%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3A%22OUT_OF_VIEWPORT%22%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%2C%22podIndex%22%3A%22%22%7D&adId=&pageType=article%7Creport
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.37.193 Ashburn, United States, ASN (),
Reverse DNS
ec2-52-2-37-193.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:49:24 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
f07b041c-3c1c-42e8-b5c8-37a7bac19f9d
https://arstechnica.com/ Frame CCB8
5 KB
0
Other
General
Full URL
blob:https://arstechnica.com/f07b041c-3c1c-42e8-b5c8-37a7bac19f9d
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d5f3418a3fa657175d5341b5e032be036cb4d5818de5d1497f2175be5a7e3701

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Length
5463
Content-Type
application/javascript
21b60411-41b1-4740-8528-630500e6af3emanifest-ios.m3u8
dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/ Frame CCB8
918 B
1 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/21b60411-41b1-4740-8528-630500e6af3emanifest-ios.m3u8?videoIndex=0&requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.95 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-95.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
28a54fd477ae1a0ad0b5104a4bf2875d20b528c9bfaedf1afd863deef25813f1

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

Date
Thu, 12 Dec 2019 14:32:49 GMT
Via
1.1 c6702f5f3b6e77da6f394e67ef1a6aab.cloudfront.net (CloudFront)
Vary
Origin
Age
78144
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
918
Last-Modified
Fri, 06 Dec 2019 21:45:39 GMT
Server
AmazonS3
ETag
"b28fce536bde8d5b45f75f7b99f52cec"
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
X-Amz-Cf-Id
p_jlOfqq1q0pBwEw72BkQruAjHoHKEftjklI7Wu7XtfzwkM8JUeC0g==
otFlat.json
cdn.cookielaw.org/scripttemplates/5.9.0/assets/
15 KB
3 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/scripttemplates/5.9.0/assets/otFlat.json
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.9.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8F0D) /
Resource Hash
c01d825e8f03f4125b38f630b84c7a88201c319b4f94e5a6a787cd86b89543f0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

x-ms-blob-type
BlockBlob
date
Sun, 12 Jan 2020 12:49:24 GMT
content-encoding
gzip
content-md5
dxOB/be8nmsxf/Kih6JKlA==
x-cache
HIT
status
200
content-length
2826
x-ms-lease-status
unlocked
last-modified
Tue, 17 Dec 2019 20:41:25 GMT
server
ECAcc (frc/8F0D)
etag
0x8D783317BF2D096
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
*
x-ms-request-id
e400951c-701e-0016-2844-c91978000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Sun, 12 Jan 2020 16:49:24 GMT
otPcCenter.json
cdn.cookielaw.org/scripttemplates/5.9.0/assets/
75 KB
13 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/scripttemplates/5.9.0/assets/otPcCenter.json
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.9.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8F41) /
Resource Hash
07a1bfbc0952fdf7ba7b4776d12b04ca9121c77a2a2fc884f3401617f4ba97c6

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

x-ms-blob-type
BlockBlob
date
Sun, 12 Jan 2020 12:49:24 GMT
content-encoding
gzip
content-md5
ZKBNGH1g2s7/Loa8vBKjKA==
x-cache
HIT
status
200
content-length
13145
x-ms-lease-status
unlocked
last-modified
Tue, 17 Dec 2019 20:41:25 GMT
server
ECAcc (frc/8F41)
etag
0x8D783317C1616BC
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
*
x-ms-request-id
9037682c-701e-0156-4044-c976c3000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Sun, 12 Jan 2020 16:49:24 GMT
1663130473914833
connect.facebook.net/signals/config/ Frame CCB8
447 KB
113 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/1663130473914833?v=2.9.15&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
7ed50c95fbc229d3a9e94ad67a3eab19277f344e0fd228333390962b38998fd0
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-24=":443"; ma=3600
content-length
114918
x-xss-protection
0
pragma
public
x-fb-debug
u9Kz/zSnKfhDqmAeok43I5mYoUcz4ade6Zqf2GRUpC8lXy6NMs4wzwjCXNtWpGJRP7jP1Tc1Gj7BZpkuqvOzmA==
x-fb-trip-id
194532234
date
Sun, 12 Jan 2020 12:49:24 GMT
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
vary
Accept-Encoding
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
YXJzdGVjaG5pY2EuY29t
tcheck.outbrainimg.com/tcheck/check/
16 B
477 B
XHR
General
Full URL
https://tcheck.outbrainimg.com/tcheck/check/YXJzdGVjaG5pY2EuY29t
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1578833363287
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
95.100.198.32 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-198-32.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
929701ed632814943e3df803ddd9e3f179ccf889c0ad7b7f3392bd8d109b174f
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
ETag
W/"10-us8lSJutAxKqLzf8c1+n5XstcwY"
Access-Control-Max-Age
43200
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=29208
Date
Sun, 12 Jan 2020 12:49:24 GMT
Connection
keep-alive
Access-Control-Allow-Credentials
false
Content-Length
16
Expires
Sun, 12 Jan 2020 20:56:12 GMT
arstechnica_mini-4wd-racing.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1575930137/ Frame CCB8
77 KB
78 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1575930137/arstechnica_mini-4wd-racing.jpg
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
00e3bdc033f31eee3294bbfa68d03bc0968b4f86507e68ff9d19d9890039c89c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

Date
Sun, 12 Jan 2020 12:47:29 GMT
Via
1.1 varnish, 1.1 df26103dc140569d7032449c70c3b141.cloudfront.net (CloudFront)
Age
116
Edge-Cache-Tag
380278988686077832122293282495365645705,504486728181076666154556403696563473843,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
78622
X-Served-By
cache-fra19151-FRA
Last-Modified
Tue, 10 Dec 2019 16:07:04 GMT
Server
cloudinary
X-Timer
S1578714081.614489,VS0,VE0
ETag
"bc88b9555531b7b8cfae6ecc1581a7f7"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
2wwrYxy-PsjHH_f5NBrIwXrjUs7RVvQz-l_pCcAVxI_xuq0vkFBRow==
X-Cache-Hits
5
arstechnica_mini-4wd-racing.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1575930137/ Frame CCB8
77 KB
78 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1575930137/arstechnica_mini-4wd-racing.jpg
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.173 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-173.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
00e3bdc033f31eee3294bbfa68d03bc0968b4f86507e68ff9d19d9890039c89c

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:29 GMT
Via
1.1 varnish, 1.1 ff2bcb2d3b4a3d9e0615ddd1033c38c4.cloudfront.net (CloudFront)
Age
115
Edge-Cache-Tag
380278988686077832122293282495365645705,504486728181076666154556403696563473843,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
78622
X-Served-By
cache-fra19151-FRA
Last-Modified
Tue, 10 Dec 2019 16:07:04 GMT
Server
cloudinary
X-Timer
S1578714081.614489,VS0,VE0
ETag
"bc88b9555531b7b8cfae6ecc1581a7f7"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
B7IOLvkoD_E_9pW3t0zLLgjlCdHEqo83H5DF-SL0ksY78H-E8hzDHw==
X-Cache-Hits
5
identity
api.rlcdn.com/api/
0
203 B
XHR
General
Full URL
https://api.rlcdn.com/api/identity?pid=2&rt=envelope&cv=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA&ct=1
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.244.174.68 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
68.174.244.35.bc.googleusercontent.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Sun, 12 Jan 2020 12:49:26 GMT
via
1.1 google
alt-svc
clear
status
204
access-control-allow-methods
GET, OPTIONS
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
access-control-allow-headers
Cookie, Accept, Origin, Authorization, Content-Type
truncated
/
817 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
db311174b0e3c340727b63c055cfb5b317808e909503e1bda11cc58af444f12b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml
dwce_cheq_events
log.outbrainimg.com/loggerServices/
4 B
343 B
XHR
General
Full URL
https://log.outbrainimg.com/loggerServices/dwce_cheq_events?timestamp=1578833364712&sessionId=969d0677-f58c-180f-c966-e030e35aa130&url=arstechnica.com&cheqSource=1&cheqEvent=0&exitReason=2
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1578833363287
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.202.112.95 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:25 GMT
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
close
X-TraceId
f1a9de64375184dd6613416d3ef4b53
Content-Length
4
Expires
0
ads
securepubads.g.doubleclick.net/gampad/
14 KB
8 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=198579609326451&correlator=3360938216049643&output=ldjh&impl=fifs&adsid=NT&eid=21064550&vrg=2019121002&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200112&iu_parts=3379%2Cconde.ars%2Crail%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=300x250%7C300x600&prev_scp=pos%3Drail%26ctx_slot_type%3Dsiderail%26ctx_slot_rn%3D0%26m_mv%3DslotNoHistData%26m_gv%3DslotNoHistData%26amznbid%3D2%26amznp%3D2%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dsiderail_0&eri=1&cust_params=m_data%3D1%26m_safety%3Dsafe%26m_categories%3Dmoat_safe%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.31.8%26ctx_page_slug%3Diranian-hackers-have-been-password-spraying-the-us-grid%26cnt_tags%3Diran%252Cmagnallium%252Cutilities%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26vnd_prx_segments%3D300003%252C112200%252C121100%252C131100%252C112216%252C210000%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252Cqx7745%252Cwmhp4i%252Cdcxr0c%252C2hkgm5%252Cap05we%252Cfdf1wd%252C65f9pd%252Cuas8ja%252C_He7NG7ZboLn_&cookie=ID%3Dab296c9baa47c284%3AT%3D1578833363%3AS%3DALNI_MYTMS7dp_v5hftUHoYtnVwcmVrUoQ&cookie_enabled=1&bc=31&abxe=1&lmt=1578833364&dt=1578833364715&dlt=1578833363066&idt=473&frm=20&biw=1585&bih=1200&oid=3&adxs=1063&adys=370&adks=1483574547&ucis=3&ifi=3&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&dssz=45&icsg=35229469245440&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=300x250&msz=300x250&ga_vid=1449571978.1578833364&ga_sid=1578833364&ga_hid=1825117583&fws=516&ohw=300
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.98 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s45-in-f2.1e100.net
Software
cafe /
Resource Hash
7052e8f2f51e299b903555979c7aaa0e681fe1399e11f03aa82df982bdcff67a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:49:24 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
8065
x-xss-protection
0
google-lineitem-id
-1
pragma
no-cache
server
cafe
google-creative-id
-1
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
14 KB
8 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=198579609326451&correlator=3360938216049643&output=ldjh&impl=fifs&adsid=NT&eid=21064550&vrg=2019121002&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200112&iu_parts=3379%2Cconde.ars%2Chero%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=728x90%7C970x250%7C9x1%7C10x1&prev_scp=pos%3Dhero%26ctx_slot_type%3Dpost_nav%26ctx_slot_rn%3D0%26m_mv%3DslotNoHistData%26m_gv%3DslotNoHistData%26amznbid%3D2%26amznp%3D2%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dpost_nav_0&eri=1&cust_params=m_data%3D1%26m_safety%3Dsafe%26m_categories%3Dmoat_safe%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.31.8%26ctx_page_slug%3Diranian-hackers-have-been-password-spraying-the-us-grid%26cnt_tags%3Diran%252Cmagnallium%252Cutilities%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26vnd_prx_segments%3D300003%252C112200%252C121100%252C131100%252C112216%252C210000%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252Cqx7745%252Cwmhp4i%252Cdcxr0c%252C2hkgm5%252Cap05we%252Cfdf1wd%252C65f9pd%252Cuas8ja%252C_He7NG7ZboLn_&cookie=ID%3Dab296c9baa47c284%3AT%3D1578833363%3AS%3DALNI_MYTMS7dp_v5hftUHoYtnVwcmVrUoQ&cookie_enabled=1&bc=31&abxe=1&lmt=1578833364&dt=1578833364721&dlt=1578833363066&idt=473&frm=20&biw=1585&bih=1200&oid=3&adxs=0&adys=80&adks=2385402828&ucis=4&ifi=4&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&dssz=45&icsg=35229469245440&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1585x90&msz=1585x90&ga_vid=1449571978.1578833364&ga_sid=1578833364&ga_hid=1825117583&fws=4&ohw=1585
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.98 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s45-in-f2.1e100.net
Software
cafe /
Resource Hash
6916cf33a8cc5bd845108358b9c8f9b659a3b764d996894a67782195f1e7ebe3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:49:25 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
8372
x-xss-protection
0
google-lineitem-id
-1
pragma
no-cache
server
cafe
google-creative-id
-1
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
placementbid.json
an.facebook.com/v2/
105 B
1 KB
XHR
General
Full URL
https://an.facebook.com/v2/placementbid.json?sdk=5.5.web&placementids%5B%5D=2038188213062675_2473096466238512&adformats%5B%5D=300x250&cachebuster=1qmVEbSaocA3Pwh9FbQezPHyzfQIT7atIsdlC3Q1a8yBmbScZffZV7oF&platform=2061185240785516&adapterver=2.1.0
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:e:face:b00c:0:2 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
35a0d76e8a8d7956b8bf92d402bf57a9389c797636ab353be71a0ba38372d319
Security Headers
Name Value
Content-Security-Policy default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

strict-transport-security
max-age=15552000; preload
content-encoding
br
x-content-type-options
nosniff
x-fb-an-errors
No bids
x-fb-an-request-id
5905662660921171113
status
200
alt-svc
h3-24=":443"; ma=3600
x-xss-protection
0
pragma
no-cache
x-fb-debug
I5TAqtk9FgLLO713brIjdkz1SlZQDKabAglmEGdfD65K/0DCxteDL8m/WeXc8JKHuw4pLHPu/jNHIE0CVA8w7Q==
x-frame-options
DENY
date
Sun, 12 Jan 2020 12:49:24 GMT
vary
Accept-Encoding
content-type
text/javascript; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
X-FB-AN-Request-ID, X-FB-AN-Errors, X-FB-AN-Bid-Count
cache-control
private, no-cache, no-store, must-revalidate
access-control-allow-credentials
true
content-security-policy
default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._wTDjAFi2;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_Nuzv...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._wTDjAFi2;gdpr=1;eucon...
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._wTDjAFi2;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:24 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._wTDjAFi2;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:24 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._wTDjAFi2;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._4g6GwL4P;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_Nuzv...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._4g6GwL4P;gdpr=1;eucon...
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._4g6GwL4P;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:24 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._4g6GwL4P;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:24 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._4g6GwL4P;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
cdb
bidder.criteo.com/
0
145 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=79&profileId=154&cb=48443706855
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
178.250.2.152 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

status
204
date
Sun, 12 Jan 2020 12:49:25 GMT
access-control-allow-credentials
true
server
Finatra
access-control-allow-origin
https://arstechnica.com
timing-allow-origin
*
vary
Origin
cygnus
as-sec.casalemedia.com/
66 B
966 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=321388&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A68302534%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2233%22%2C%22siteID%22%3A%22375863%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2231%22%2C%22siteID%22%3A%22375863%22%7D%2C%22id%22%3A%222%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%2C%22user%22%3A%7B%22eids%22%3A%5B%7B%22source%22%3A%22adserver.org%22%2C%22uids%22%3A%5B%7B%22id%22%3A%22a98e5493-611f-45cd-bb88-93f4dbe0c998%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID%22%7D%7D%2C%7B%22id%22%3A%22FALSE%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_LOOKUP%22%7D%7D%2C%7B%22id%22%3A%222020-01-12T12%3A49%3A23%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_CREATED_AT%22%7D%7D%5D%7D%5D%2C%22ext%22%3A%7B%22consent%22%3A%22BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA%22%7D%7D%2C%22regs%22%3A%7B%22ext%22%3A%7B%22gdpr%22%3A1%7D%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.164 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-249-164.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
0843ec2ea3a3b1c07400e4ab2cd0b8d331bde247175f7477537b19ad3a27aaad

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:25 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
86
Expires
Sun, 12 Jan 2020 12:49:25 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
261 B
744 B
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=15&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&p_screen_res=1600x1200&site_id=217438&zone_id=1070068&kw=rp.fastlane&tk_flint=index&rand=0.9558832236048571&gdpr=1&gdpr_consent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA&alt_size_ids=10
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.141 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
cdac6b74d53081bd0dcd92f0fb953695203b52f7c5a9a778547017f26fcdb60d

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:25 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=453
Content-Length
261
Expires
Wed, 17 Sep 1975 21:32:10 GMT
cdb
bidder.criteo.com/
247 B
377 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=79&profileId=154&cb=45027990774
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
178.250.2.152 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
Finatra /
Resource Hash
041e5a6258a6ad1e75c1f6acf891f8d2810e36890f00a08e2c2343711ec7d85b

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

date
Sun, 12 Jan 2020 12:49:26 GMT
content-encoding
gzip
server
Finatra
status
200
vary
Origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
timing-allow-origin
*
content-length
170
cygnus
as-sec.casalemedia.com/
66 B
966 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=321388&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A33779700%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%227%22%2C%22siteID%22%3A%22375847%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%228%22%2C%22siteID%22%3A%22375847%22%7D%2C%22id%22%3A%222%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%2C%22user%22%3A%7B%22eids%22%3A%5B%7B%22source%22%3A%22adserver.org%22%2C%22uids%22%3A%5B%7B%22id%22%3A%22a98e5493-611f-45cd-bb88-93f4dbe0c998%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID%22%7D%7D%2C%7B%22id%22%3A%22FALSE%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_LOOKUP%22%7D%7D%2C%7B%22id%22%3A%222020-01-12T12%3A49%3A23%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_CREATED_AT%22%7D%7D%5D%7D%5D%2C%22ext%22%3A%7B%22consent%22%3A%22BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA%22%7D%7D%2C%22regs%22%3A%7B%22ext%22%3A%7B%22gdpr%22%3A1%7D%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.164 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-249-164.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
23a2a004ac34c0727fc07fd244b4e8e717c846c00ad96f68bc47c2922411beeb

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:25 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
86
Expires
Sun, 12 Jan 2020 12:49:25 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
260 B
743 B
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=2&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&p_screen_res=1600x1200&site_id=217438&zone_id=1070068&kw=rp.fastlane&tk_flint=index&rand=0.14249228281879378&gdpr=1&gdpr_consent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA&alt_size_ids=57
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.141 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
4df4a6a714dd954722d23475539f4632523ec1d3702e3e33c42b18f3f6558173

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:26 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=277
Content-Length
260
Expires
Wed, 17 Sep 1975 21:32:10 GMT
ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._gXyZAwVZ;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_Nuzv...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._gXyZAwVZ;gdpr=1;eucon...
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._gXyZAwVZ;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:24 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._gXyZAwVZ;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:24 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._gXyZAwVZ;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._3Nwmh6k6;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_Nuzv...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._3Nwmh6k6;gdpr=1;eucon...
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._3Nwmh6k6;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:24 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._3Nwmh6k6;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:24 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._3Nwmh6k6;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
events
wren.condenastdigital.com/1.0/conde/
0
732 B
Other
General
Full URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.194.193.74 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-194-193-74.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Date
Sun, 12 Jan 2020 12:49:26 GMT
strict-transport-security
max-age=15768000; preload
x-content-type-options
nosniff
Server
nginx/1.15.8
x-download-options
noopen
x-frame-options
DENY
Content-Type
image/gif
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
vary
origin
x-xss-protection
1; mode=block
ADTECH;apid=1Af644ba6e-3539-11ea-9ed4-128b912572ea;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._wTDjAFi2;gdpr=1;euconsent=BOtD...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1Af644ba6e-3539-11ea-9ed4-128b912572ea;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1Af644ba6e-3539-11ea-9ed4-128b912572ea;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._wTDjAFi2;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:24 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1Af644ba6e-3539-11ea-9ed4-128b912572ea;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._wTDjAFi2;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:24 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1Af644ba6e-3539-11ea-9ed4-128b912572ea;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._wTDjAFi2;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Af645001e-3539-11ea-8b43-1222202f268e;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._4g6GwL4P;gdpr=1;euconsent=BOtD...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1Af645001e-3539-11ea-8b43-1222202f268e;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1Af645001e-3539-11ea-8b43-1222202f268e;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._4g6GwL4P;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:24 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1Af645001e-3539-11ea-8b43-1222202f268e;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._4g6GwL4P;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:24 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1Af645001e-3539-11ea-8b43-1222202f268e;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._4g6GwL4P;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Af64528aa-3539-11ea-bd8b-12bf277b9278;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._gXyZAwVZ;gdpr=1;euconsent=BOtD...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1Af64528aa-3539-11ea-bd8b-12bf277b9278;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1Af64528aa-3539-11ea-bd8b-12bf277b9278;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._gXyZAwVZ;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:24 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1Af64528aa-3539-11ea-bd8b-12bf277b9278;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._gXyZAwVZ;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:24 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1Af64528aa-3539-11ea-bd8b-12bf277b9278;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._gXyZAwVZ;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Af64582e6-3539-11ea-b95e-12c8450abec2;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._3Nwmh6k6;gdpr=1;euconsent=BOtD...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;apid=1Af64582e6-3539-11ea-b95e-12c8450abec2;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;apid=1Af64582e6-3539-11ea-b95e-12c8450abec2;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._3Nwmh6k6;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:24 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;apid=1Af64582e6-3539-11ea-b95e-12c8450abec2;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._3Nwmh6k6;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:24 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;apid=1Af64582e6-3539-11ea-b95e-12c8450abec2;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._3Nwmh6k6;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Af644ba6e-3539-11ea-9ed4-128b912572ea;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._wTDjAFi2;gdpr=1;euconsent=BOtD...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/
2 KB
2 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1Af644ba6e-3539-11ea-9ed4-128b912572ea;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._wTDjAFi2;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
228138fa0acd574eee6fc676147206709b599cf4160f75483cd8143dc29882bd

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:25 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
1751
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Af645001e-3539-11ea-8b43-1222202f268e;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._4g6GwL4P;gdpr=1;euconsent=BOtD...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/
2 KB
2 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1Af645001e-3539-11ea-8b43-1222202f268e;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364746;callback=window.headertag.AolHtb.adResponseCallbacks._4g6GwL4P;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
2e0bdce744bdcbcc16fa775493c217c50ffb5944bcc87426825ee308c316dc71

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:25 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
1751
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Af64528aa-3539-11ea-bd8b-12bf277b9278;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._gXyZAwVZ;gdpr=1;euconsent=BOtD...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/
2 KB
2 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1Af64528aa-3539-11ea-bd8b-12bf277b9278;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._gXyZAwVZ;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
3a8085c0f6aea6db29e49f95b1e29941df2dca759b8c89bd6ba0025dab30b564

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:25 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
1751
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Af64582e6-3539-11ea-b95e-12c8450abec2;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._3Nwmh6k6;gdpr=1;euconsent=BOtD...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/
104 B
137 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;apid=1Af64582e6-3539-11ea-b95e-12c8450abec2;cfp=1;rndc=1578833364;cmd=bid;cors=yes;v=2;misc=1578833364761;callback=window.headertag.AolHtb.adResponseCallbacks._3Nwmh6k6;gdpr=1;euconsent=BOtDtpOOtDtpOAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
b376d74eef1e3fb3b74b71a7db2601dba10a266a82fbafececf7bfbe549bb88b

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:25 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
text/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
104
expires
Mon, 15 Jun 1998 00:00:00 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame 9E07
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019121002.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-37/html/container.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
2973
date
Sun, 12 Jan 2020 12:18:46 GMT
expires
Mon, 11 Jan 2021 12:18:46 GMT
last-modified
Thu, 21 Nov 2019 16:01:11 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
1839
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
osd.js
www.googletagservices.com/activeview/js/current/
76 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
ade8ffb528cb5f03a069e2d5136668f7515cb7108007267134eebb7c364add18
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:49:25 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1578659119029161"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28668
x-xss-protection
0
expires
Sun, 12 Jan 2020 12:49:25 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CONDENAST_PREBID_HEADER1&hp=1&wf=1&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=11&f=0&j=&t=1578833363488&de=226178751648&rx=783309976117&m=0&ar=29bb202-clean&iw=81ef8f7&q=1&cb=0&cu=1578833363488&ll=2&lm=0&ln=0&em=0&en=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&fd=1&ac=1&it=500&fs=173485&na=2146107474&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:25 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:25 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-01-12T12%3A49%3A25.048Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=Iran%7CMagnallium%7Cutilities&cCh=information%20technology&cTi=Iranian%20hackers%20have%20been%20%E2%80%9Cpassword%20spraying%E2%80%9D%20the%20US%20grid&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677&cEnt=dragos%2C%20iranian%2C%20us%2C%20hacker%2C%20iran%2C%20page%20layout%2C%20magnallium%2C%20vpn%2C%20password%2C%20andy%20greenberg%2C%20blackout%2C%20electric%20grid%2C%20general%20qasem%20soleimani%2C%20parisite%2C%20wired.com%2C%20microsoft%2C%20industrial%20control%20system%2C%20lee%2C%20joe%20slowik%2C%20john%20hultquist&cEnw=1%2C%200.9948814740636635%2C%200.993834808488321%2C%200.867972460651954%2C%200.797578388434278%2C%200.6757588854164678%2C%200.6721388482679548%2C%200.5932158592747869%2C%200.5599606313111571%2C%200.5463281960338536%2C%200.5446415036461565%2C%200.5218636787380018%2C%200.508151505482784%2C%200.49947373170459813%2C%200.48667455412573274%2C%200.4864466489493094%2C%200.4853001682566736%2C%200.4477203657351927%2C%200.4451035055823759%2C%200.39094876976574355&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&cCl=1054&cId=1642389&cPd=2020-01-12T12%3A05%3A31.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&pRt=referral&pHp=%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4500&pSw=1600&pSh=1200&uID=dd73c6e0-b003-4490-a4a2-e27a01e07c1f&sID=ba36a5e7-b8e0-4dac-8197-b86402bad473&pID=76414615-0a90-4a69-bce3-ee8fb3e4a7b5&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22siderail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Atrue%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22siderail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x600%22%2C%22slug%22%3A%22iranian-hackers-have-been-password-spraying-the-us-grid%22%7D&dim3=%7B%22footerStart%22%3A1578833363192%2C%22headerStart%22%3A1578833363173%2C%22navigationStart%22%3A1578833362611%2C%22pubAdsReady%22%3A1578833363547%2C%22injected%22%3A1578833365043%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22rail%22%5D%2C%22ctx_slot_type%22%3A%5B%22siderail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22siderail_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22iranian-hackers-have-been-password-spraying-the-us-grid%22%5D%2C%22cnt_tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_He7NG7ZboLn_%22%5D%7D&cKh=dragos%2Ciranian%2Cus%2Chacker%2Ciran%2Celectric%20utility%2Cpage%20layout%2Cmagnallium%2Cstate-sponsored%20group%2Cvulnerability
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.37.193 Ashburn, United States, ASN (),
Reverse DNS
ec2-52-2-37-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:49:25 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-01-12T12%3A49%3A25.104Z&_t=pageview&cBr=Ars%20Technica&cKe=Iran%7CMagnallium%7Cutilities&cCh=information%20technology&cTi=Iranian%20hackers%20have%20been%20%E2%80%9Cpassword%20spraying%E2%80%9D%20the%20US%20grid&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677&cEnt=dragos%2C%20iranian%2C%20us%2C%20hacker%2C%20iran%2C%20page%20layout%2C%20magnallium%2C%20vpn%2C%20password%2C%20andy%20greenberg%2C%20blackout%2C%20electric%20grid%2C%20general%20qasem%20soleimani%2C%20parisite%2C%20wired.com%2C%20microsoft%2C%20industrial%20control%20system%2C%20lee%2C%20joe%20slowik%2C%20john%20hultquist&cEnw=1%2C%200.9948814740636635%2C%200.993834808488321%2C%200.867972460651954%2C%200.797578388434278%2C%200.6757588854164678%2C%200.6721388482679548%2C%200.5932158592747869%2C%200.5599606313111571%2C%200.5463281960338536%2C%200.5446415036461565%2C%200.5218636787380018%2C%200.508151505482784%2C%200.49947373170459813%2C%200.48667455412573274%2C%200.4864466489493094%2C%200.4853001682566736%2C%200.4477203657351927%2C%200.4451035055823759%2C%200.39094876976574355&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&cCl=1054&cId=1642389&cPd=2020-01-12T12%3A05%3A31.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&pRt=referral&pHp=%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4500&pSw=1600&pSh=1200&uID=dd73c6e0-b003-4490-a4a2-e27a01e07c1f&sID=ba36a5e7-b8e0-4dac-8197-b86402bad473&pID=76414615-0a90-4a69-bce3-ee8fb3e4a7b5&uDt=desktop&_o=ars-technica&_c=general&xID=f243d0b3-aa47-4216-ad43-d5b588dec887&cKh=dragos%2Ciranian%2Cus%2Chacker%2Ciran%2Celectric%20utility%2Cpage%20layout%2Cmagnallium%2Cstate-sponsored%20group%2Cvulnerability
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.37.193 Ashburn, United States, ASN (),
Reverse DNS
ec2-52-2-37-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:49:25 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1578833363488&de=483003110543&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=siderail_0&zMoatRendered=3&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=3&zMoatPageDataTargetingSet=3&zMoatSafetyTargetingSet=3&zMoatEmptySlot=2&zMoatNadoDataLoadTime=181&zMoatAllDataLoadTime=181&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&ac=1&bq=11&f=0&zn=0&if=181&na=416444424&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:25 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:25 GMT
get
odb.outbrain.com/utils/
15 KB
9 KB
Script
General
Full URL
https://odb.outbrain.com/utils/get?url=http%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&srcUrl=http%3A%2F%2Ffeeds.arstechnica.com%2Farstechnica%2Findex%2F&settings=true&recs=true&widgetJSId=JS_1&key=NANOWDGT01&idx=0&version=1050109&apv=false&sig=HXPFVBDE&format=vjapi&va=true&rand=41743&pdobuid=-1&osLang=en-US&winW=1600&winH=1200&scrW=1600&scrH=1200&adblck=false&secured=true&cmpStat=1&ccpaStat=0&ref=
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1578833363287
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
1b997f6e704955e73131633e04e5f6ab3bda310319b958777fd3ed80f50f74a3
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=0; includeSubDomains;
content-encoding
gzip
traffic-path
NYDC1, JFK, HHN, Europe1
x-cache
MISS, MISS
p3p
policyref="http://www.outbrain.com/w3c/p3p.xml",CP="NOI NID CURa DEVa TAIa PSAa PSDa OUR IND UNI"
status
200
x-traceid
8f1eb064a2a99dae8951460a04aff4a1
content-length
8948
x-served-by
cache-jfk8148-JFK, cache-hhn4081-HHN
pragma
no-cache
x-timer
S1578833372.497618,VS0,VE200
date
Sun, 12 Jan 2020 12:49:32 GMT
vary
Accept-Encoding, User-Agent
content-type
text/x-json; charset=UTF-8
via
1.1 varnish, 1.1 varnish
expires
Thu, 01 Jan 1970 00:00:00 GMT
cache-control
no-cache
backend-ip
104.156.90.48
accept-ranges
bytes, bytes
x-cache-hits
0, 0
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame 417E
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019121002.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-37/html/container.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
2973
date
Sun, 12 Jan 2020 12:18:46 GMT
expires
Mon, 11 Jan 2021 12:18:46 GMT
last-modified
Thu, 21 Nov 2019 16:01:11 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
1839
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CONDENAST_PREBID_HEADER1&hp=1&wf=1&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=11&f=0&j=&t=1578833363488&de=187746424991&rx=783309976117&m=0&ar=29bb202-clean&iw=81ef8f7&q=2&cb=0&cu=1578833363488&ll=2&lm=0&ln=0&em=0&en=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&fd=1&ac=1&it=500&fs=173485&na=115755796&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:25 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:25 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-01-12T12%3A49%3A25.261Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=Iran%7CMagnallium%7Cutilities&cCh=information%20technology&cTi=Iranian%20hackers%20have%20been%20%E2%80%9Cpassword%20spraying%E2%80%9D%20the%20US%20grid&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677&cEnt=dragos%2C%20iranian%2C%20us%2C%20hacker%2C%20iran%2C%20page%20layout%2C%20magnallium%2C%20vpn%2C%20password%2C%20andy%20greenberg%2C%20blackout%2C%20electric%20grid%2C%20general%20qasem%20soleimani%2C%20parisite%2C%20wired.com%2C%20microsoft%2C%20industrial%20control%20system%2C%20lee%2C%20joe%20slowik%2C%20john%20hultquist&cEnw=1%2C%200.9948814740636635%2C%200.993834808488321%2C%200.867972460651954%2C%200.797578388434278%2C%200.6757588854164678%2C%200.6721388482679548%2C%200.5932158592747869%2C%200.5599606313111571%2C%200.5463281960338536%2C%200.5446415036461565%2C%200.5218636787380018%2C%200.508151505482784%2C%200.49947373170459813%2C%200.48667455412573274%2C%200.4864466489493094%2C%200.4853001682566736%2C%200.4477203657351927%2C%200.4451035055823759%2C%200.39094876976574355&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&cCl=1054&cId=1642389&cPd=2020-01-12T12%3A05%3A31.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&pRt=referral&pHp=%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4500&pSw=1600&pSh=1200&uID=dd73c6e0-b003-4490-a4a2-e27a01e07c1f&sID=ba36a5e7-b8e0-4dac-8197-b86402bad473&pID=76414615-0a90-4a69-bce3-ee8fb3e4a7b5&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&xID=f243d0b3-aa47-4216-ad43-d5b588dec887&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22post_nav_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22post_nav_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22728x90%22%2C%22slug%22%3A%22iranian-hackers-have-been-password-spraying-the-us-grid%22%7D&dim3=%7B%22footerStart%22%3A1578833363192%2C%22headerStart%22%3A1578833363173%2C%22navigationStart%22%3A1578833362611%2C%22pubAdsReady%22%3A1578833363547%2C%22injected%22%3A1578833365261%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22hero%22%5D%2C%22ctx_slot_type%22%3A%5B%22post_nav%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22post_nav_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22iranian-hackers-have-been-password-spraying-the-us-grid%22%5D%2C%22cnt_tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_He7NG7ZboLn_%22%5D%7D&cKh=dragos%2Ciranian%2Cus%2Chacker%2Ciran%2Celectric%20utility%2Cpage%20layout%2Cmagnallium%2Cstate-sponsored%20group%2Cvulnerability
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.37.193 Ashburn, United States, ASN (),
Reverse DNS
ec2-52-2-37-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:49:25 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1578833363488&de=483003110543&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=post_nav_0&zMoatRendered=4&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=4&zMoatPageDataTargetingSet=4&zMoatSafetyTargetingSet=4&zMoatEmptySlot=2&zMoatNadoDataLoadTime=181&zMoatAllDataLoadTime=181&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&ac=1&bq=11&f=0&zn=0&if=181&na=245436945&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:25 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:25 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsafeframe%2F1-0-37%2Fhtml%2Fcontainer.html&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833363488&de=226178751648&rx=783309976117&cu=1578833363488&m=2091&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4517&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=0&ag=93&an=0&gf=93&gg=0&ix=93&ic=93&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=93&bx=0&dj=1&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=185&cd=0&ah=185&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=47531661&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:25 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:25 GMT
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=321388&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.164 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-249-164.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:25 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Sun, 12 Jan 2020 12:49:25 GMT
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=321388&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.164 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-249-164.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:25 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Sun, 12 Jan 2020 12:49:25 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsafeframe%2F1-0-37%2Fhtml%2Fcontainer.html&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&rm=1&fy=428.5&gp=80&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833363488&de=187746424991&rx=783309976117&cu=1578833363488&m=2287&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=80&lb=4517&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=0&ag=91&an=0&gf=91&gg=0&ix=91&ic=91&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=91&bx=0&dj=1&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=182&cd=0&ah=182&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=911814245&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:25 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:25 GMT
21b60411-41b1-4740-8528-630500e6af3efile-1422k-128-48000-768.m3u8
dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/ Frame CCB8
9 KB
1 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/21b60411-41b1-4740-8528-630500e6af3efile-1422k-128-48000-768.m3u8?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.95 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-95.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
95f4f5090eababa4dad68068640228a63058d9756f252d83669758464daf7e19

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

Date
Sat, 11 Jan 2020 15:12:55 GMT
Content-Encoding
gzip
Vary
Origin
Age
77791
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Access-Control-Allow-Origin
*
Last-Modified
Fri, 06 Dec 2019 21:49:50 GMT
Server
AmazonS3
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Via
1.1 c6702f5f3b6e77da6f394e67ef1a6aab.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA50-C1
X-Amz-Cf-Id
_hVH3qU9N0Q2VXgjPoDYle0KKkO0t9pfvc6-aLDlbmNGRZCWa8sCcw==
7b5f6ab8-29de-4676-be19-6c1f00dcce96
https://arstechnica.com/ Frame CCB8
64 KB
0
Other
General
Full URL
blob:https://arstechnica.com/7b5f6ab8-29de-4676-be19-6c1f00dcce96
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4b188a568fa90fa61d4bbe76dd6cf523abe65787e0ac3dc6b5c44db5e823685b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Length
65790
Content-Type
application/javascript
21b60411-41b1-4740-8528-630500e6af3efile-1422k-128-48000-768-00001.ts
dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/ Frame CCB8
737 KB
738 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/21b60411-41b1-4740-8528-630500e6af3efile-1422k-128-48000-768-00001.ts?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.95 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-95.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
86ca318ca88169e6206b93695ef6091e9fc42a1061344fdcfe78310390c83997

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

Date
Sat, 11 Jan 2020 15:22:30 GMT
Via
1.1 c6702f5f3b6e77da6f394e67ef1a6aab.cloudfront.net (CloudFront)
Vary
Origin
Age
77216
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
755008
Last-Modified
Fri, 06 Dec 2019 21:49:42 GMT
Server
AmazonS3
ETag
"e39a265b0e43ceb94cfff3fe218e4eb0"
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
X-Amz-Cf-Id
sA2MnnCjj-IfQf5vyoF-nIRbIv0CP_XrNmXhdCBJ2wyGqnQqAr9E7g==
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-01-12T12%3A49%3A26.282Z&_t=slot_impression_viewable&cBr=Ars%20Technica&cKe=Iran%7CMagnallium%7Cutilities&cCh=information%20technology&cTi=Iranian%20hackers%20have%20been%20%E2%80%9Cpassword%20spraying%E2%80%9D%20the%20US%20grid&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677&cEnt=dragos%2C%20iranian%2C%20us%2C%20hacker%2C%20iran%2C%20page%20layout%2C%20magnallium%2C%20vpn%2C%20password%2C%20andy%20greenberg%2C%20blackout%2C%20electric%20grid%2C%20general%20qasem%20soleimani%2C%20parisite%2C%20wired.com%2C%20microsoft%2C%20industrial%20control%20system%2C%20lee%2C%20joe%20slowik%2C%20john%20hultquist&cEnw=1%2C%200.9948814740636635%2C%200.993834808488321%2C%200.867972460651954%2C%200.797578388434278%2C%200.6757588854164678%2C%200.6721388482679548%2C%200.5932158592747869%2C%200.5599606313111571%2C%200.5463281960338536%2C%200.5446415036461565%2C%200.5218636787380018%2C%200.508151505482784%2C%200.49947373170459813%2C%200.48667455412573274%2C%200.4864466489493094%2C%200.4853001682566736%2C%200.4477203657351927%2C%200.4451035055823759%2C%200.39094876976574355&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&cCl=1054&cId=1642389&cPd=2020-01-12T12%3A05%3A31.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&pRt=referral&pHp=%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4500&pSw=1600&pSh=1200&uID=e72c538f-66bc-478b-b1b3-79449de9bd28&uNw=1&uUq=1&pID=d80844c3-4df1-4400-a40a-cb5e1091f093&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&xID=f243d0b3-aa47-4216-ad43-d5b588dec887&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22siderail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstImpressionViewable%22%3Atrue%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpressionViewable%22%3Atrue%2C%22isFirstMoneyRequested%22%3Atrue%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22siderail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x600%22%2C%22slug%22%3A%22iranian-hackers-have-been-password-spraying-the-us-grid%22%7D&dim3=%7B%22footerStart%22%3A1578833363192%2C%22headerStart%22%3A1578833363173%2C%22navigationStart%22%3A1578833362611%2C%22pubAdsReady%22%3A1578833363547%2C%22injected%22%3A1578833365043%2C%22viewable%22%3A1578833366282%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22rail%22%5D%2C%22ctx_slot_type%22%3A%5B%22siderail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22siderail_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22iranian-hackers-have-been-password-spraying-the-us-grid%22%5D%2C%22cnt_tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_He7NG7ZboLn_%22%5D%7D&cKh=dragos%2Ciranian%2Cus%2Chacker%2Ciran%2Celectric%20utility%2Cpage%20layout%2Cmagnallium%2Cstate-sponsored%20group%2Cvulnerability
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.37.193 Ashburn, United States, ASN (),
Reverse DNS
ec2-52-2-37-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:49:26 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-01-12T12%3A49%3A26.383Z&_t=slot_impression_viewable&cBr=Ars%20Technica&cKe=Iran%7CMagnallium%7Cutilities&cCh=information%20technology&cTi=Iranian%20hackers%20have%20been%20%E2%80%9Cpassword%20spraying%E2%80%9D%20the%20US%20grid&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677&cEnt=dragos%2C%20iranian%2C%20us%2C%20hacker%2C%20iran%2C%20page%20layout%2C%20magnallium%2C%20vpn%2C%20password%2C%20andy%20greenberg%2C%20blackout%2C%20electric%20grid%2C%20general%20qasem%20soleimani%2C%20parisite%2C%20wired.com%2C%20microsoft%2C%20industrial%20control%20system%2C%20lee%2C%20joe%20slowik%2C%20john%20hultquist&cEnw=1%2C%200.9948814740636635%2C%200.993834808488321%2C%200.867972460651954%2C%200.797578388434278%2C%200.6757588854164678%2C%200.6721388482679548%2C%200.5932158592747869%2C%200.5599606313111571%2C%200.5463281960338536%2C%200.5446415036461565%2C%200.5218636787380018%2C%200.508151505482784%2C%200.49947373170459813%2C%200.48667455412573274%2C%200.4864466489493094%2C%200.4853001682566736%2C%200.4477203657351927%2C%200.4451035055823759%2C%200.39094876976574355&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&cCl=1054&cId=1642389&cPd=2020-01-12T12%3A05%3A31.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&pRt=referral&pHp=%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4500&pSw=1600&pSh=1200&uID=e72c538f-66bc-478b-b1b3-79449de9bd28&sID=5ebfb5b7-c1ee-4c9e-8511-81a71bd6eeeb&pID=d80844c3-4df1-4400-a40a-cb5e1091f093&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&xID=f243d0b3-aa47-4216-ad43-d5b588dec887&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22post_nav_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstImpressionViewable%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpressionViewable%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22post_nav_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22728x90%22%2C%22slug%22%3A%22iranian-hackers-have-been-password-spraying-the-us-grid%22%7D&dim3=%7B%22footerStart%22%3A1578833363192%2C%22headerStart%22%3A1578833363173%2C%22navigationStart%22%3A1578833362611%2C%22pubAdsReady%22%3A1578833363547%2C%22injected%22%3A1578833365261%2C%22viewable%22%3A1578833366383%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22hero%22%5D%2C%22ctx_slot_type%22%3A%5B%22post_nav%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22post_nav_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22iranian-hackers-have-been-password-spraying-the-us-grid%22%5D%2C%22cnt_tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_He7NG7ZboLn_%22%5D%7D&cKh=dragos%2Ciranian%2Cus%2Chacker%2Ciran%2Celectric%20utility%2Cpage%20layout%2Cmagnallium%2Cstate-sponsored%20group%2Cvulnerability
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.37.193 Ashburn, United States, ASN (),
Reverse DNS
ec2-52-2-37-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:49:26 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833363488&de=226178751648&rx=783309976117&cu=1578833363488&m=3110&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4517&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1118&an=93&gi=1&gf=1118&gg=93&ix=1118&ic=1118&ez=1&ck=1118&kw=1007&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1118&bx=93&ci=1118&jz=1007&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1007&cd=185&ah=1007&am=185&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1163706245&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:26 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:26 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833363488&de=226178751648&rx=783309976117&cu=1578833363488&m=3111&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4517&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1118&an=1118&gi=1&gf=1118&gg=1118&ix=1118&ic=1118&ez=1&ck=1118&kw=1007&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1118&bx=1118&ci=1118&jz=1007&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1007&cd=1007&ah=1007&am=1007&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1881654101&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:26 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:26 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833363488&de=226178751648&rx=783309976117&cu=1578833363488&m=3112&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4517&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1118&an=1118&gi=1&gf=1118&gg=1118&ix=1118&ic=1118&ez=1&ck=1118&kw=1007&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1118&bx=1118&ci=1118&jz=1007&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1007&cd=1007&ah=1007&am=1007&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1591155093&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:26 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:26 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&rm=1&fy=428.5&gp=80&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833363488&de=187746424991&rx=783309976117&cu=1578833363488&m=3314&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=80&lb=4517&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1119&an=91&gi=1&gf=1119&gg=91&ix=1119&ic=1119&ez=1&ck=1119&kw=1006&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1119&bx=91&ci=1119&jz=1006&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1006&cd=182&ah=1006&am=182&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=2091413171&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:26 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:26 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&rm=1&fy=428.5&gp=80&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833363488&de=187746424991&rx=783309976117&cu=1578833363488&m=3315&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=80&lb=4517&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1119&an=1119&gi=1&gf=1119&gg=1119&ix=1119&ic=1119&ez=1&ck=1119&kw=1006&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1119&bx=1119&ci=1119&jz=1006&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1006&cd=1006&ah=1006&am=1006&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1623256664&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:26 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:26 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&rm=1&fy=428.5&gp=80&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833363488&de=187746424991&rx=783309976117&cu=1578833363488&m=3316&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=80&lb=4517&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1119&an=1119&gi=1&gf=1119&gg=1119&ix=1119&ic=1119&ez=1&ck=1119&kw=1006&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1119&bx=1119&ci=1119&jz=1006&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1006&cd=1006&ah=1006&am=1006&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=77794230&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:26 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:26 GMT
events
wren.condenastdigital.com/1.0/conde/
0
732 B
Other
General
Full URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.194.193.74 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-194-193-74.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Date
Sun, 12 Jan 2020 12:49:27 GMT
strict-transport-security
max-age=15768000; preload
x-content-type-options
nosniff
Server
nginx/1.15.8
x-download-options
noopen
x-frame-options
DENY
Content-Type
image/gif
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
vary
origin
x-xss-protection
1; mode=block
ads
pubads.g.doubleclick.net/gampad/ Frame CCB8
4 KB
2 KB
XHR
General
Full URL
https://pubads.g.doubleclick.net/gampad/ads?sz=640x480|480x70&iu=/3379/conde.ars/player/information-technology/article&ciu_szs=300x60&gdfp_req=1&env=vp&output=vmap&unviewed_position_start=1&cust_params=m_data%3D1%26m_safety%3Dsafe%26m_categories%3Dmoat_safe%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.31.8%26ctx_page_slug%3Diranian-hackers-have-been-password-spraying-the-us-grid%26cnt_tags%3Diran%252Cmagnallium%252Cutilities%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26vnd_prx_segments%3D300003%252C112200%252C121100%252C131100%252C112216%252C210000%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252Cqx7745%252Cwmhp4i%252Cdcxr0c%252C2hkgm5%252Cap05we%252Cfdf1wd%252C65f9pd%252Cuas8ja%252C_He7NG7ZboLn_%26ctx_line_items%3D%26height%3D304%26muted%3D0%26right_rail%3D0%26sensitive%3D0%26width%3D540&correlator=3360938216049643&description_url=https%3A%2F%2Fthescene.com%2Fwatch%2Farstechnica%2Fcustomizing-mini-4wd-racers-for-high-speeds-on-a-small-scale&vid=5deac57938d0694c4b9da428&cmsid=1495&ppid=f243d0b3aa474216ad43d5b588dec887
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.98 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s45-in-f2.1e100.net
Software
cafe /
Resource Hash
4a00bb33722b6b20a02a073965427026a46041b9f3db52b8459680d6f1c11197
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:49:28 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
1112
x-xss-protection
0
google-lineitem-id
0
pragma
no-cache
server
cafe
google-creative-id
0
content-type
text/xml; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
track
capture.condenastdigital.com/ Frame CCB8
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2020-01-12T12%3A49%3A27.393Z&_c=timedOut&_t=gptData&sID=ba36a5e7-b8e0-4dac-8197-b86402bad473&pID=76414615-0a90-4a69-bce3-ee8fb3e4a7b5&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&dim1=%7B%22adBlocked%22%3Afalse%2C%22adUnits%22%3A%5B%223379%2Fconde.ars%2Finterstitial%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F2%22%2C%223379%2Fconde.ars%2Fmid-content%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars.native%2Flegacy%2Finformation-technology%2Farticle%2F1%22%5D%2C%22embedLocation%22%3A%22arstechnica%22%2C%22error%22%3A%22%22%2C%22lineItems%22%3A%5B%5D%2C%22publicaEnabled%22%3Afalse%2C%22videoId%22%3A%225deac57938d0694c4b9da428%22%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.37.193 Ashburn, United States, ASN (),
Reverse DNS
ec2-52-2-37-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:49:27 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
collect
www.google-analytics.com/r/
35 B
102 B
Other
General
Full URL
https://www.google-analytics.com/r/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:28 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
https://arstechnica.com
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
moatvideo.js
z.moatads.com/condenastjsvideocontent160527792519/ Frame CCB8
282 KB
95 KB
Script
General
Full URL
https://z.moatads.com/condenastjsvideocontent160527792519/moatvideo.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
630a22a3df3c99d429995d3ec480502a97ca958b14fbea98c2b072db3f2a2eae

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:49:28 GMT
Content-Encoding
gzip
Last-Modified
Fri, 10 Jan 2020 16:11:55 GMT
Server
AmazonS3
x-amz-request-id
BE4B6A3217D47DB9
ETag
"6c1a116700f737a304432db863def8fc"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=21570
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
96602
x-amz-id-2
NHEDAu0sXHJR92xyxd409bJ8b+ARIFBC4LO7RT1fO49chsF7BwsADZ3ws4wpaZK70vhP7eG9n/4=
track
capture.condenastdigital.com/ Frame CCB8
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2020-01-12T12%3A49%3A28.587Z&_c=Video%20Ad&_t=Ad%20Call%20Made&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=https%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Fcustomizing-mini-4wd-racers-for-high-speeds-on-a-small-scale%2F&cId=5deac57938d0694c4b9da428&cKe=hobbies%2Crace%20car%2Crace%20cars%2Cracing&cPd=2019-12-10T16%3A00%3A00%2B00%3A00&cTi=Customizing%20Mini%204WD%20Racers%20For%20High%20Speeds%20On%20A%20Small%20Scale&cTy=%2F3379%2Fconde.ars%2Fplayer%2Finformation-technology%2Farticle&mDu=655&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&pID=76414615-0a90-4a69-bce3-ee8fb3e4a7b5&pWw=540&pWh=303.75&sID=ba36a5e7-b8e0-4dac-8197-b86402bad473&uId=dd73c6e0-b003-4490-a4a2-e27a01e07c1f&xid=f243d0b3-aa47-4216-ad43-d5b588dec887&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22gitBranch%22%3A%22master%22%2C%22gitSha%22%3A%227a2672b%22%2C%22guid%22%3A%221192efb3-1d6b-ccc1-f514-939980dadd53%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A3233.9375%2C%22playerType%22%3A%22video-continuous%22%2C%22playsOnPage%22%3A0%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22isRightRail%22%3Afalse%2C%22tabStatus%22%3A%22active%22%2C%22versoPageType%22%3A%22article%7Creport%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3A%22OUT_OF_VIEWPORT%22%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%2C%22podIndex%22%3A%22%22%7D&videoViews=1&adId=&pageType=article%7Creport
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.37.193 Ashburn, United States, ASN (),
Reverse DNS
ec2-52-2-37-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:49:28 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CONDEVIDEOCONTENT1&hp=1&wf=1&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=8&f=0&j=&t=1578833368626&de=443471949366&m=0&ar=0de3535428-clean&iw=cdb8c0c&q=5&cb=0&ym=0&cu=1578833368626&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=Customizing%20Mini%204WD%20Racers%20For%20High%20Speeds%20On%20A%20Small%20Scale%3A%2F3379%2Fconde.ars%2Fplayer%2Finformation-technology%2Farticle%3Aundefined%3Aundefined&zMoatVideoId=5deac57938d0694c4b9da428&zMoatAP=-&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&zMoatDomain=arstechnica.com&zMoatSubdomain=arstechnica.com&gw=condenastjsvideocontent160527792519&fd=1&ac=1&it=500&ti=0&ih=1&fs=175595&na=1717392674&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:28 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:28 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-01-12T12%3A49%3A29.072Z&_t=slot_loaded&cBr=Ars%20Technica&cKe=Iran%7CMagnallium%7Cutilities&cCh=information%20technology&cTi=Iranian%20hackers%20have%20been%20%E2%80%9Cpassword%20spraying%E2%80%9D%20the%20US%20grid&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677&cEnt=dragos%2C%20iranian%2C%20us%2C%20hacker%2C%20iran%2C%20page%20layout%2C%20magnallium%2C%20vpn%2C%20password%2C%20andy%20greenberg%2C%20blackout%2C%20electric%20grid%2C%20general%20qasem%20soleimani%2C%20parisite%2C%20wired.com%2C%20microsoft%2C%20industrial%20control%20system%2C%20lee%2C%20joe%20slowik%2C%20john%20hultquist&cEnw=1%2C%200.9948814740636635%2C%200.993834808488321%2C%200.867972460651954%2C%200.797578388434278%2C%200.6757588854164678%2C%200.6721388482679548%2C%200.5932158592747869%2C%200.5599606313111571%2C%200.5463281960338536%2C%200.5446415036461565%2C%200.5218636787380018%2C%200.508151505482784%2C%200.49947373170459813%2C%200.48667455412573274%2C%200.4864466489493094%2C%200.4853001682566736%2C%200.4477203657351927%2C%200.4451035055823759%2C%200.39094876976574355&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&cCl=1054&cId=1642389&cPd=2020-01-12T12%3A05%3A31.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&pRt=referral&pHp=%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4500&pSw=1600&pSh=1200&uID=e72c538f-66bc-478b-b1b3-79449de9bd28&sID=5ebfb5b7-c1ee-4c9e-8511-81a71bd6eeeb&pID=d80844c3-4df1-4400-a40a-cb5e1091f093&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&xID=f243d0b3-aa47-4216-ad43-d5b588dec887&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22siderail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Atrue%2C%22isFirstImpressionViewable%22%3Atrue%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Atrue%2C%22isFirstMoneyImpressionViewable%22%3Atrue%2C%22isFirstMoneyRequested%22%3Atrue%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22siderail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x600%22%2C%22slug%22%3A%22iranian-hackers-have-been-password-spraying-the-us-grid%22%7D&dim3=%7B%22footerStart%22%3A1578833363192%2C%22headerStart%22%3A1578833363173%2C%22navigationStart%22%3A1578833362611%2C%22pubAdsReady%22%3A1578833363547%2C%22injected%22%3A1578833365043%2C%22viewable%22%3A1578833366282%2C%22viewport%22%3A%22%22%2C%22impression%22%3A1578833369072%7D&dim4=%7B%22pos%22%3A%5B%22rail%22%5D%2C%22ctx_slot_type%22%3A%5B%22siderail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22siderail_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22iranian-hackers-have-been-password-spraying-the-us-grid%22%5D%2C%22cnt_tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_He7NG7ZboLn_%22%5D%7D&cKh=dragos%2Ciranian%2Cus%2Chacker%2Ciran%2Celectric%20utility%2Cpage%20layout%2Cmagnallium%2Cstate-sponsored%20group%2Cvulnerability
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.37.193 Ashburn, United States, ASN (),
Reverse DNS
ec2-52-2-37-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:49:29 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
events
wren.condenastdigital.com/1.0/conde/
0
732 B
Other
General
Full URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.194.193.74 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-194-193-74.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Date
Sun, 12 Jan 2020 12:49:30 GMT
strict-transport-security
max-age=15768000; preload
x-content-type-options
nosniff
Server
nginx/1.15.8
x-download-options
noopen
x-frame-options
DENY
Content-Type
image/gif
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
vary
origin
x-xss-protection
1; mode=block
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-01-12T12%3A49%3A30.611Z&_t=timespent&cBr=Ars%20Technica&cKe=Iran%7CMagnallium%7Cutilities&cCh=information%20technology&cTi=Iranian%20hackers%20have%20been%20%E2%80%9Cpassword%20spraying%E2%80%9D%20the%20US%20grid&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677&cEnt=dragos%2C%20iranian%2C%20us%2C%20hacker%2C%20iran%2C%20page%20layout%2C%20magnallium%2C%20vpn%2C%20password%2C%20andy%20greenberg%2C%20blackout%2C%20electric%20grid%2C%20general%20qasem%20soleimani%2C%20parisite%2C%20wired.com%2C%20microsoft%2C%20industrial%20control%20system%2C%20lee%2C%20joe%20slowik%2C%20john%20hultquist&cEnw=1%2C%200.9948814740636635%2C%200.993834808488321%2C%200.867972460651954%2C%200.797578388434278%2C%200.6757588854164678%2C%200.6721388482679548%2C%200.5932158592747869%2C%200.5599606313111571%2C%200.5463281960338536%2C%200.5446415036461565%2C%200.5218636787380018%2C%200.508151505482784%2C%200.49947373170459813%2C%200.48667455412573274%2C%200.4864466489493094%2C%200.4853001682566736%2C%200.4477203657351927%2C%200.4451035055823759%2C%200.39094876976574355&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&cCl=1054&cId=1642389&cPd=2020-01-12T12%3A05%3A31.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&pRt=referral&pHp=%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4500&pSw=1600&pSh=1200&uID=af6bb0d2-6750-4496-be3d-59a267721316&uNw=1&uUq=1&pID=6464f75d-7b94-4550-8366-4dc2e28c5c0e&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=general&xID=f243d0b3-aa47-4216-ad43-d5b588dec887&_v=5000&cKh=dragos%2Ciranian%2Cus%2Chacker%2Ciran%2Celectric%20utility%2Cpage%20layout%2Cmagnallium%2Cstate-sponsored%20group%2Cvulnerability
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.37.193 Ashburn, United States, ASN (),
Reverse DNS
ec2-52-2-37-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:49:30 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833363488&de=226178751648&rx=783309976117&cu=1578833363488&m=7131&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4517&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=5139&an=1118&gi=1&gf=5139&gg=1118&ix=5139&ic=5139&ez=1&ck=1118&kw=1007&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5139&bx=1118&ci=1118&jz=1007&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5031&cd=1007&ah=5031&am=1007&rf=0&re=1&ft=1908&fv=0&fw=1908&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1513338032&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:30 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:30 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833363488&de=226178751648&rx=783309976117&cu=1578833363488&m=7332&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4517&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=5341&an=5139&gi=1&gf=5341&gg=5139&ix=5341&ic=5341&ez=1&ck=1118&kw=1007&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5341&bx=5139&ci=1118&jz=1007&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5231&cd=5031&ah=5231&am=5031&rf=0&re=1&ft=2110&fv=1908&fw=1908&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=743470383&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:30 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:30 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&rm=1&fy=428.5&gp=80&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833363488&de=187746424991&rx=783309976117&cu=1578833363488&m=7333&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=80&lb=4517&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=5138&an=1119&gi=1&gf=5138&gg=1119&ix=5138&ic=5138&ez=1&ck=1119&kw=1006&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5138&bx=1119&ci=1119&jz=1006&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5027&cd=1006&ah=5027&am=1006&rf=0&re=1&ft=2110&fv=0&fw=2110&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1621966305&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:30 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:30 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&rm=1&fy=428.5&gp=80&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833363488&de=187746424991&rx=783309976117&cu=1578833363488&m=7534&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=80&lb=4517&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=5339&an=5138&gi=1&gf=5339&gg=5138&ix=5339&ic=5339&ez=1&ck=1119&kw=1006&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5339&bx=5138&ci=1119&jz=1006&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5229&cd=5027&ah=5229&am=5027&rf=0&re=1&ft=2311&fv=2110&fw=2110&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=242401931&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:31 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:31 GMT
Cookie set obUserSync.html
widgets.outbrain.com/widgetOBUserSync/ Frame 5D58
0
0
Document
General
Full URL
https://widgets.outbrain.com/widgetOBUserSync/obUserSync.html
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1578833363287
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.250.44 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-44.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash

Request headers

Host
widgets.outbrain.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Accept-Encoding
gzip, deflate, br
Cookie
recs_5f2443890c9c48c1cb6bd7dc46d7bfd4=0B2474727137A1925901673A2472372998A1600723307A2560235356A2492202446ACD1; obuid=0f84535e-c47b-42b4-825d-c5770203adc5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social

Response headers

Accept-Ranges
bytes
Content-Type
text/html
ETag
"f01b8a7bd6b6de45f1ad36ce1d3a30cd:1577003167"
Last-Modified
Sun, 22 Dec 2019 08:23:47 GMT
Server
AkamaiNetStorage
Vary
Accept-Encoding
Content-Encoding
gzip
Cache-Control
max-age=604800
Date
Sun, 12 Jan 2020 12:49:32 GMT
Content-Length
3524
Connection
keep-alive
Timing-Allow-Origin
*
Access-Control-Allow-Credentials
false
Access-Control-Allow-Methods
GET,POST
Access-Control-Allow-Origin
*
Set-Cookie
akacd_widgets_routing=3756286171~rv=55~id=4ae6c8d09388bd63943f0db58d430079; path=/;
l
mcdp-nydc1.outbrain.com/
4 B
377 B
XHR
General
Full URL
https://mcdp-nydc1.outbrain.com/l?token=c6db2b644491a66240c4f557d794dde8_6817_1578833372645&tm=8126&eT=0&wRV=1050109&pVis=0&lsd=0f84535e-c47b-42b4-825d-c5770203adc5&eIdx=&cheq=0&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1578833363287
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.95 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
c48b5b1a9776c84602de2306d7903a7241158a5077e7a8519af75c33441b8334
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

Date
Sun, 12 Jan 2020 12:49:33 GMT
content-encoding
gzip
Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
content-range
Connection
close
X-TraceId
2a6e7d10c90e768f46f10d741697b628
Content-Length
30
eyJpdSI6ImRmNDU1MjljNmZiYTVjOTFjNzhkNzZhMjkyODcyNGVmMGI1YzA5Y2YyZmY0MjA0MDY5NWNmNDg0NTVmMDUyMDMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
5 KB
6 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImRmNDU1MjljNmZiYTVjOTFjNzhkNzZhMjkyODcyNGVmMGI1YzA5Y2YyZmY0MjA0MDY5NWNmNDg0NTVmMDUyMDMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
95.100.198.32 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-198-32.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a489bdf1246e9a4ab79459787bad18f4d2e090c469bdced8fd537594e97921a4
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Wed, 11 Dec 2019 14:24:58 GMT
Date
Sun, 12 Jan 2020 12:49:32 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=884469
Connection
keep-alive
X-TraceId
4a50d9df44e93d36771d21d6d18e9808
Timing-Allow-Origin
*
Content-Length
5496
eyJpdSI6IjlhOWUwMDAwYjBmMmFjNGNiOTY2NjI1NTczNDhjYjRiMzA1NTNiYTkyZDY3NjM4MTdiZTc4YzAyZDVkZTc0YjMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
3 KB
4 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjlhOWUwMDAwYjBmMmFjNGNiOTY2NjI1NTczNDhjYjRiMzA1NTNiYTkyZDY3NjM4MTdiZTc4YzAyZDVkZTc0YjMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
95.100.198.32 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-198-32.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
ec4f9cb92382a86382d7d8be4447c7c97bcec7e8136cdbf4d88a11b2f64e9e30
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Sat, 14 Dec 2019 12:43:41 GMT
Date
Sun, 12 Jan 2020 12:49:32 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1665465
Connection
keep-alive
X-TraceId
8da260ed617c706404e41d77ada895ab
Timing-Allow-Origin
*
Content-Length
3478
eyJpdSI6ImI4ODQ0YmY3NDk0ZTU1NmI3NzBjODhiODRmYTgyYWZiNDY1Njg1YzY0MTEwM2QxMzJkMGNhZWUzMjRkZTMxYjQiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
8 KB
9 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImI4ODQ0YmY3NDk0ZTU1NmI3NzBjODhiODRmYTgyYWZiNDY1Njg1YzY0MTEwM2QxMzJkMGNhZWUzMjRkZTMxYjQiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
95.100.198.32 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-198-32.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
42866c962a32aed7f89bbba9bfd8a39195109c999c6909fc767c6ba6f5a30c77
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Fri, 29 Nov 2019 14:31:33 GMT
Date
Sun, 12 Jan 2020 12:49:32 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=385699
Connection
keep-alive
X-TraceId
2520f99d828138957a86246d2ae6726e
Timing-Allow-Origin
*
Content-Length
8430
eyJpdSI6IjJiMTliY2ZmM2MzZGYxOTUzYjkyNDEzMWJlZjk2OTRhOTFjYTEwNmVhYTdlNmEwNTQ2ZGIzNzI1YjlkM2EzYTAiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
6 KB
6 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjJiMTliY2ZmM2MzZGYxOTUzYjkyNDEzMWJlZjk2OTRhOTFjYTEwNmVhYTdlNmEwNTQ2ZGIzNzI1YjlkM2EzYTAiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
95.100.198.32 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-198-32.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e6823aba66e9885db3c60247e0461762f2246d4ebc44150dc7992637439051a0
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Tue, 17 Dec 2019 10:27:46 GMT
Date
Sun, 12 Jan 2020 12:49:32 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1256557
Connection
keep-alive
X-TraceId
d57f9c03a7706fdf77501c074400d3d1
Timing-Allow-Origin
*
Content-Length
5740
eyJpdSI6ImUxYzE1ZWU3MzUxMTdjMmQ1ODhlZTQ3OTg1MjEyOTU1NDQ4MTkxOTFhZWZiNDBlZjkyZWYyMGNhYjY5NTY4MWIiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
11 KB
12 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImUxYzE1ZWU3MzUxMTdjMmQ1ODhlZTQ3OTg1MjEyOTU1NDQ4MTkxOTFhZWZiNDBlZjkyZWYyMGNhYjY5NTY4MWIiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
95.100.198.32 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-198-32.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c92570d084e1870955bb8924f0c45c875474ffcbdc21ff0b03aaf286fb3c263f
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Thu, 05 Dec 2019 10:33:28 GMT
Date
Sun, 12 Jan 2020 12:49:32 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1577591
Connection
keep-alive
X-TraceId
8bed0e86b8a0580fa7d3fe28b982960b
Timing-Allow-Origin
*
Content-Length
11398
eyJpdSI6IjBhZGM1N2YzZTkzNjU5ZTg2OGVlYjkxOTVhN2QwYjg4NGUxY2Q2ZmFlZmJjZTYzYzZhNjUyNDQyNGIyYjgwOWYiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
2 KB
3 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjBhZGM1N2YzZTkzNjU5ZTg2OGVlYjkxOTVhN2QwYjg4NGUxY2Q2ZmFlZmJjZTYzYzZhNjUyNDQyNGIyYjgwOWYiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
95.100.198.32 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-198-32.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4b000a082734f0f362602d12e3820de8a5d26195c98ed9f1e3123b6af79eb637
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Wed, 25 Dec 2019 11:10:06 GMT
Date
Sun, 12 Jan 2020 12:49:32 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1521056
Connection
keep-alive
X-TraceId
13e53ae3db86d306da8514a13e9bf484
Timing-Allow-Origin
*
Content-Length
2406
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-01-12T12%3A49%3A32.848Z&_t=slot_loaded&cBr=Ars%20Technica&cKe=Iran%7CMagnallium%7Cutilities&cCh=information%20technology&cTi=Iranian%20hackers%20have%20been%20%E2%80%9Cpassword%20spraying%E2%80%9D%20the%20US%20grid&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677&cEnt=dragos%2C%20iranian%2C%20us%2C%20hacker%2C%20iran%2C%20page%20layout%2C%20magnallium%2C%20vpn%2C%20password%2C%20andy%20greenberg%2C%20blackout%2C%20electric%20grid%2C%20general%20qasem%20soleimani%2C%20parisite%2C%20wired.com%2C%20microsoft%2C%20industrial%20control%20system%2C%20lee%2C%20joe%20slowik%2C%20john%20hultquist&cEnw=1%2C%200.9948814740636635%2C%200.993834808488321%2C%200.867972460651954%2C%200.797578388434278%2C%200.6757588854164678%2C%200.6721388482679548%2C%200.5932158592747869%2C%200.5599606313111571%2C%200.5463281960338536%2C%200.5446415036461565%2C%200.5218636787380018%2C%200.508151505482784%2C%200.49947373170459813%2C%200.48667455412573274%2C%200.4864466489493094%2C%200.4853001682566736%2C%200.4477203657351927%2C%200.4451035055823759%2C%200.39094876976574355&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&cCl=1054&cId=1642389&cPd=2020-01-12T12%3A05%3A31.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&pRt=referral&pHp=%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=af6bb0d2-6750-4496-be3d-59a267721316&sID=cd5228d1-479b-43b4-8555-82f76ba2687a&pID=6464f75d-7b94-4550-8366-4dc2e28c5c0e&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&xID=f243d0b3-aa47-4216-ad43-d5b588dec887&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22post_nav_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Afalse%2C%22isFirstImpressionViewable%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Afalse%2C%22isFirstMoneyImpressionViewable%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22post_nav_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22728x90%22%2C%22slug%22%3A%22iranian-hackers-have-been-password-spraying-the-us-grid%22%7D&dim3=%7B%22footerStart%22%3A1578833363192%2C%22headerStart%22%3A1578833363173%2C%22navigationStart%22%3A1578833362611%2C%22pubAdsReady%22%3A1578833363547%2C%22injected%22%3A1578833365261%2C%22viewable%22%3A1578833366383%2C%22viewport%22%3A%22%22%2C%22impression%22%3A1578833372848%7D&dim4=%7B%22pos%22%3A%5B%22hero%22%5D%2C%22ctx_slot_type%22%3A%5B%22post_nav%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22post_nav_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22iranian-hackers-have-been-password-spraying-the-us-grid%22%5D%2C%22cnt_tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_He7NG7ZboLn_%22%5D%7D&cKh=dragos%2Ciranian%2Cus%2Chacker%2Ciran%2Celectric%20utility%2Cpage%20layout%2Cmagnallium%2Cstate-sponsored%20group%2Cvulnerability
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.37.193 Ashburn, United States, ASN (),
Reverse DNS
ec2-52-2-37-193.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:49:32 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
collect
www.google-analytics.com/r/
35 B
102 B
Other
General
Full URL
https://www.google-analytics.com/r/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:49:32 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
https://arstechnica.com
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
events
wren.condenastdigital.com/1.0/conde/
0
732 B
Other
General
Full URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.194.193.74 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-194-193-74.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Date
Sun, 12 Jan 2020 12:49:33 GMT
strict-transport-security
max-age=15768000; preload
x-content-type-options
nosniff
Server
nginx/1.15.8
x-download-options
noopen
x-frame-options
DENY
Content-Type
image/gif
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
vary
origin
x-xss-protection
1; mode=block
/
srv-2020-01-12-12.pixel.parsely.com/plogger/
43 B
229 B
Image
General
Full URL
https://srv-2020-01-12-12.pixel.parsely.com/plogger/?rand=1578833374620&plid=39844375&idsite=arstechnica.com&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&urlref=&screen=1600x1200%7C1600x1200%7C24&data=%7B%22parsely_uuid%22%3A%22bdf63c77-5a31-4098-b1ae-7cd6f00e19a4%22%2C%22parsely_site_uuid%22%3A%2245afcdc9-0d3f-4e09-9fe0-b1588833d651%22%7D&sid=1&surl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&sref=&sts=1578833374620&slts=0&date=Sun+Jan+12+2020+13%3A49%3A34+GMT%2B0100+(Central+European+Standard+Time)&action=heartbeat&inc=5&tt=4900&pvid=4956339&u=45afcdc9-0d3f-4e09-9fe0-b1588833d651
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.230.243.129 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-230-243-129.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:49:34 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=25&q=2&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsafeframe%2F1-0-37%2Fhtml%2Fcontainer.html&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=6&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833363488&de=226178751648&rx=783309976117&cu=1578833363488&m=12152&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4719&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=10160&an=5341&gi=1&gf=10160&gg=5341&ix=10160&ic=10160&ez=1&ck=1118&kw=1007&aj=1&pg=100&pf=100&ib=0&cc=1&bw=10160&bx=5341&ci=1118&jz=1007&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=10052&cd=5231&ah=10052&am=5231&rf=0&re=1&ft=4822&fv=2110&fw=1908&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1379302552&cs=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:35 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:35 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=25&q=2&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsafeframe%2F1-0-37%2Fhtml%2Fcontainer.html&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=6&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&rm=1&fy=428.5&gp=80&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833363488&de=187746424991&rx=783309976117&cu=1578833363488&m=12353&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=80&lb=4719&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=10159&an=5339&gi=1&gf=10159&gg=5339&ix=10159&ic=10159&ez=1&ck=1119&kw=1006&aj=1&pg=100&pf=100&ib=0&cc=1&bw=10159&bx=5339&ci=1119&jz=1006&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=10048&cd=5229&ah=10048&am=5229&rf=0&re=1&ft=4822&fv=2311&fw=2110&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1227385902&cs=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:35 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:35 GMT
events
wren.condenastdigital.com/1.0/conde/
0
732 B
Other
General
Full URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.194.193.74 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-194-193-74.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Date
Sun, 12 Jan 2020 12:49:38 GMT
strict-transport-security
max-age=15768000; preload
x-content-type-options
nosniff
Server
nginx/1.15.8
x-download-options
noopen
x-frame-options
DENY
Content-Type
image/gif
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
vary
origin
x-xss-protection
1; mode=block
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=3&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=7&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833363488&de=226178751648&rx=783309976117&cu=1578833363488&m=17171&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4719&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=15180&an=10160&gi=1&gf=15180&gg=10160&ix=15180&ic=15180&ez=1&ck=1118&kw=1007&aj=1&pg=100&pf=100&ib=0&cc=1&bw=15180&bx=10160&ci=1118&jz=1007&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=15071&cd=10052&ah=15071&am=10052&rf=0&re=1&ft=4822&fv=4822&fw=1908&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1808211479&cs=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:40 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:40 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=4&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=8&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833363488&de=226178751648&rx=783309976117&cu=1578833363488&m=17372&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4719&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=15381&an=15180&gi=1&gf=15381&gg=15180&ix=15381&ic=15381&ez=1&ck=1118&kw=1007&aj=1&pg=100&pf=100&ib=0&cc=1&bw=15381&bx=15180&ci=1118&jz=1007&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=15272&cd=15071&ah=15272&am=15071&rf=0&re=1&ft=4822&fv=4822&fw=1908&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1698059924&cs=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:40 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:40 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=3&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=7&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&rm=1&fy=428.5&gp=80&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833363488&de=187746424991&rx=783309976117&cu=1578833363488&m=17373&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=80&lb=4719&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=15178&an=10159&gi=1&gf=15178&gg=10159&ix=15178&ic=15178&ez=1&ck=1119&kw=1006&aj=1&pg=100&pf=100&ib=0&cc=1&bw=15178&bx=10159&ci=1119&jz=1006&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=15068&cd=10048&ah=15068&am=10048&rf=0&re=1&ft=4822&fv=4822&fw=2110&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=2054446203&cs=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:40 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:40 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=4&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=8&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&rm=1&fy=428.5&gp=80&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833363488&de=187746424991&rx=783309976117&cu=1578833363488&m=17574&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=80&lb=4719&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=15379&an=15178&gi=1&gf=15379&gg=15178&ix=15379&ic=15379&ez=1&ck=1119&kw=1006&aj=1&pg=100&pf=100&ib=0&cc=1&bw=15379&bx=15178&ci=1119&jz=1006&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=15269&cd=15068&ah=15269&am=15068&rf=0&re=1&ft=4822&fv=4822&fw=2110&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=613367223&cs=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:49:41 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:49:41 GMT

Verdicts & Comments Add Verdict or Comment

139 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| ars object| dataLayer object| googletag object| cns object| sparrowQueue object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken boolean| apstagLOADED object| apstag object| cnBus function| moatYieldReady object| _perfRefForUserTimingPolyfill object| __core-js_shared__ object| core object| fastdom object| BOOMR_mq object| regeneratorRuntime object| headertag object| Twig object| Arrive function| FPCountdown function| $ function| jQuery function| moment function| UAParser function| purl function| twig function| EvEmitter function| imagesLoaded function| easydropdown function| m function| transitionEnd string| $queryString function| arsVideoModulePlayerReady22326257 object| CN object| __SKIM_JS_GLOBAL__ object| skimlinksAPI object| _cne function| __cmp object| google_tag_manager function| postscribe string| hash object| PolarConde object| NATIVEADS object| NATIVEADS_QUEUE object| ActionButton object| Criteo function| headertag_render object| rubicontag boolean| include string| referrer object| urlParams string| queryString string| fullUrl string| myParam string| GoogleAnalyticsObject function| ga string| b object| h function| getVisitNumCustom number| d undefined| ct undefined| et undefined| hourElapsed undefined| msg undefined| pixelDomain undefined| isDomless undefined| documentReferrer undefined| isBeta undefined| viewHash undefined| pxSrc undefined| px object| Moat#G26 object| MoatSuperV26 object| MoatNadoAllJsonpRequest_96301246 object| Moat#PML#26#1.2 boolean| Moat#EVA object| moatPrebidApi number| google_srt undefined| google_measure_js_timing boolean| google_noFetch number| __google_ad_urls_id function| gotSegmentData number| google_unique_id object| gaGlobal object| PARSELY object| SparrowConfigV2 object| google_tag_data object| gaplugins object| OneTrustStub string| OnetrustActiveGroups string| OptanonActiveGroups function| OptanonWrapper object| criteo_pubtag object| NATIVEADS_STORE object| gaData object| SparrowCache function| Sparrow boolean| sparrowInitialize object| _4d object| sparrow function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter object| __google_ad_urls object| otStubData boolean| ab_isEventListenerAddedForWidgetVisible_action-button-react-iframe function| jsonFeed object| _google_rum_ns_ object| google_persistent_state_async number| google_global_correlator object| closure_lm_618348 object| google object| Optanon object| OneTrust object| otIabModule object| closure_lm_118127 object| OBR string| OB_releaseVer function| OBR$ object| outbrain object| outbrain_rater object| ampInaboxIframes object| ampInaboxPendingMessages boolean| google_osd_loaded boolean| google_onload_fired undefined| ad function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb function| arrive function| unbindArrive function| leave function| unbindLeave

8 Cookies

Domain/Path Name / Value
widgets.outbrain.com/ Name: akacd_widgets_routing
Value: 3756286171~rv=55~id=4ae6c8d09388bd63943f0db58d430079
.outbrain.com/ Name: recs_5f2443890c9c48c1cb6bd7dc46d7bfd4
Value: 0B2474727137A1925901673A2472372998A1600723307A2560235356A2492202446ACD1
arstechnica.com/ Name: GED_PLAYLIST_ACTIVITY
Value: W3sidSI6IjZFYkoiLCJ0c2wiOjE1Nzg4MzMzNzMsIm52IjowLCJ1cHQiOjE1Nzg4MzMzNjQsImx0IjoxNTc4ODMzMzY0fV0.
.arstechnica.com/ Name: sID
Value: cd5228d1-479b-43b4-8555-82f76ba2687a
arstechnica.com/ Name: pID
Value: 6464f75d-7b94-4550-8366-4dc2e28c5c0e
arstechnica.com/ Name: CN_su
Value: e17e17da-37fb-411a-89b4-69353f8502f4
.outbrain.com/ Name: obuid
Value: 0f84535e-c47b-42b4-825d-c5770203adc5
arstechnica.com/ Name: CN_sp
Value: af6bb0d2-6750-4496-be3d-59a267721316

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

4d.condenastdigital.com
adserver-us.adtech.advertising.com
adservice.google.com
adservice.google.de
ampcid.google.com
ampcid.google.de
an.facebook.com
api.cnevids.com
api.rlcdn.com
api.skimlinks.mgr.consensu.org
arstechnica.com
as-sec.casalemedia.com
bidder.criteo.com
c.amazon-adsystem.com
capture.condenastdigital.com
cdn.arstechnica.net
cdn.cookielaw.org
cdn.mediavoice.com
connect.facebook.net
d1z2jf7jlzjs58.cloudfront.net
d2c8v52ll5s99u.cloudfront.net
dp8hsntg6do36.cloudfront.net
dwgyu36up6iuz.cloudfront.net
embed.actionbutton.co
fastlane.rubiconproject.com
geolocation.onetrust.com
images.outbrainimg.com
imasdk.googleapis.com
infinityid.condenastdigital.com
js-sec.indexww.com
log.outbrainimg.com
match.adsrvr.org
mb.moatads.com
mcdp-nydc1.outbrain.com
mid.rkdms.com
odb.outbrain.com
p.skimresources.com
pixel.condenastdigital.com
player.cnevids.com
plugin.mediavoice.com
polarcdn-terrax.com
prod-native.actionbutton.co
pubads.g.doubleclick.net
px.moatads.com
r.skimresources.com
s.skimresources.com
s0.2mdn.net
securepubads.g.doubleclick.net
segment-data.zqtk.net
srv-2020-01-12-12.config.parsely.com
srv-2020-01-12-12.pixel.parsely.com
static.criteo.net
stats.g.doubleclick.net
t.skimresources.com
tcheck.outbrainimg.com
tpc.googlesyndication.com
widgets.outbrain.com
wren.condenastdigital.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
z.moatads.com
13.225.84.169
13.225.84.173
13.225.84.221
13.225.86.250
143.204.101.13
143.204.101.48
143.204.101.91
143.204.101.95
151.101.114.2
151.101.12.239
151.139.128.10
152.195.132.202
152.199.21.89
172.217.23.98
178.250.2.130
178.250.2.152
205.234.175.175
23.210.249.164
23.210.250.213
23.210.250.44
2600:9000:2156:2400:11:8cf6:b500:93a1
2606:4700:10::6814:b844
2606:4700::6811:4032
2606:4700::6813:d983
2a00:1450:4001:800::2002
2a00:1450:4001:806::2006
2a00:1450:4001:816::2008
2a00:1450:4001:816::200e
2a00:1450:4001:819::2001
2a00:1450:4001:819::2002
2a00:1450:4001:819::200a
2a00:1450:4001:819::200e
2a00:1450:4001:81a::2003
2a00:1450:4001:81c::2004
2a00:1450:4001:821::200e
2a00:1450:400c:c00::9b
2a03:2880:f02d:12:face:b00c:0:3
2a03:2880:f02d:e:face:b00c:0:2
34.194.193.74
34.196.100.8
34.206.220.9
34.230.243.129
34.231.252.38
35.177.62.3
35.190.40.172
35.190.59.101
35.201.67.47
35.244.174.68
50.31.169.131
52.19.1.241
52.2.37.193
52.208.195.87
64.202.112.95
69.173.144.141
70.42.32.95
95.100.198.32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