URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Submission: On October 30 via api from CH

Summary

This website contacted 69 IPs in 7 countries across 56 domains to perform 353 HTTP transactions. The main IP is 2.18.233.143, located in European Union and belongs to AKAMAI-AS - Akamai Technologies, Inc., US. The main domain is www.zdnet.com.
TLS certificate: Issued by GeoTrust RSA CA 2018 on October 16th 2018. Valid for: 8 months.
This is the only time www.zdnet.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 11 2.18.233.143 16625 (AKAMAI-AS)
61 2.18.233.149 16625 (AKAMAI-AS)
6 92.123.6.233 16625 (AKAMAI-AS)
1 95.100.198.4 16625 (AKAMAI-AS)
5 23.8.11.168 20940 (AKAMAI-ASN1)
2 2a00:1450:400... 15169 (GOOGLE)
1 54.230.93.205 16509 (AMAZON-02)
3 54.152.59.224 14618 (AMAZON-AES)
1 52.16.141.158 16509 (AMAZON-02)
6 2a00:1450:400... 15169 (GOOGLE)
6 2a00:1450:400... 15169 (GOOGLE)
1 17 216.58.210.2 15169 (GOOGLE)
15 68.232.35.180 15133 (EDGECAST)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
5 2400:cb00:204... 13335 (CLOUDFLAR...)
4 64.30.224.172 6623 (CBSI-1)
4 2400:cb00:204... 13335 (CLOUDFLAR...)
2 8 52.31.106.135 16509 (AMAZON-02)
3 23.8.8.176 20940 (AKAMAI-ASN1)
3 2606:4700:20:... 13335 (CLOUDFLAR...)
1 2600:9000:200... 16509 (AMAZON-02)
1 52.5.125.127 14618 (AMAZON-AES)
1 54.208.143.184 14618 (AMAZON-AES)
2 2 104.66.106.214 16625 (AKAMAI-AS)
2 2 54.85.229.0 14618 (AMAZON-AES)
2 2 2.18.233.201 16625 (AKAMAI-AS)
2 2 34.242.39.94 16509 (AMAZON-02)
2 3 35.157.74.177 16509 (AMAZON-02)
1 5 34.247.143.160 16509 (AMAZON-02)
2 54.154.86.186 16509 (AMAZON-02)
3 63.140.43.37 15224 (OMNITURE)
3 54.154.175.204 16509 (AMAZON-02)
1 151.101.2.110 54113 (FASTLY)
3 94.31.29.248 33438 (HIGHWINDS2)
2 108.161.188.128 33438 (HIGHWINDS2)
5 185.33.223.216 29990 (ASN-APPNEXUS)
2 92.123.187.90 16625 (AKAMAI-AS)
1 4 66.117.28.68 15224 (OMNITURE)
1 2a03:2880:f01... 32934 (FACEBOOK)
1 2a05:f500:10:... 14413 (LINKEDIN)
1 162.247.242.21 23467 (NEWRELIC-...)
1 23.77.209.221 20940 (AKAMAI-ASN1)
2 6 23.57.19.23 16625 (AKAMAI-AS)
1 2 18.203.164.211 16509 (AMAZON-02)
2 2a03:2880:f02... 32934 (FACEBOOK)
2 2 66.117.28.86 15224 (OMNITURE)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
1 1 216.58.214.98 15169 (GOOGLE)
1 2 2a00:1450:400... 15169 (GOOGLE)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1288:110... 34010 (YAHOO-IRD)
2 2a00:1450:400... 15169 (GOOGLE)
1 104.98.131.27 16625 (AKAMAI-AS)
12 2a00:1450:400... 15169 (GOOGLE)
3 151.101.120.134 54113 (FASTLY)
2 2a03:2880:f12... 32934 (FACEBOOK)
1 54.76.196.204 16509 (AMAZON-02)
5 54.230.93.121 16509 (AMAZON-02)
10 95.100.199.29 16625 (AKAMAI-AS)
24 2a00:1450:400... 15169 (GOOGLE)
8 104.111.230.142 16625 (AKAMAI-AS)
1 95.100.197.129 16625 (AKAMAI-AS)
4 213.19.162.51 26667 (RUBICONPR...)
4 213.19.162.27 26667 (RUBICONPR...)
1 2a00:1450:400... 15169 (GOOGLE)
8 52.56.60.241 16509 (AMAZON-02)
6 151.101.2.2 54113 (FASTLY)
7 92.123.186.115 16625 (AKAMAI-AS)
20 23.58.219.40 16625 (AKAMAI-AS)
3 2400:cb00:204... 13335 (CLOUDFLAR...)
2 151.101.64.134 54113 (FASTLY)
7 2a00:1450:400... 15169 (GOOGLE)
4 151.101.1.181 54113 (FASTLY)
2 2a00:1450:400... 15169 (GOOGLE)
353 69
Apex Domain
Subdomains
Transfer
61 cbsistatic.com
zdnet1.cbsistatic.com
zdnet3.cbsistatic.com
zdnet2.cbsistatic.com
zdnet4.cbsistatic.com
823 KB
36 googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
1 MB
26 doubleclick.net
securepubads.g.doubleclick.net
cm.g.doubleclick.net
googleads.g.doubleclick.net
191 KB
25 moatads.com
z.moatads.com
geo.moatads.com
px.moatads.com
701 KB
20 moatpixel.com
cbsdfp5832910442.s.moatpixel.com
8 KB
16 rubiconproject.com
ads.rubiconproject.com
optimized-by.rubiconproject.com
beacon-eu-ams3.rubiconproject.com
eus.rubiconproject.com
37 KB
15 tiqcdn.com
tags.tiqcdn.com
90 KB
9 ml314.com
ml314.com
in.ml314.com
15 KB
8 cbsi.com
dw.cbsi.com
saa.cbsi.com
rev.cbsi.com
14 KB
8 viglink.com
cdn.viglink.com
api.viglink.com
86 KB
7 imrworldwide.com
secure-us.imrworldwide.com
cdn-gl.imrworldwide.com
59 KB
7 demdex.net
dpm.demdex.net
cbsi.demdex.net
6 KB
7 google.com
adservice.google.com
www.google.com
1 KB
7 google.de
adservice.google.de
www.google.de
1 KB
6 taboola.com
cdn.taboola.com
trc.taboola.com
images.taboola.com Failed
157 KB
6 scorecardresearch.com
sb.scorecardresearch.com
4 KB
6 everesttech.net
pixel.everesttech.net
cm.everesttech.net
3 KB
6 evidon.com
c.evidon.com
26 KB
6 zdnet.com
www.zdnet.com
68 KB
5 disqus.com
zdnet-1.disqus.com
disqus.com
27 KB
5 adnxs.com
secure.adnxs.com
3 KB
5 cbsinteractive.com
vidtech.cbsinteractive.com
299 KB
4 perfectmarket.com
widget.perfectmarket.com
94 KB
4 pagefair.com
asset.pagefair.com
stats.pagefair.com
6 KB
4 lightboxcdn.com
www.lightboxcdn.com
122 KB
4 go-mpulse.net
c.go-mpulse.net
58 KB
3 disquscdn.com
c.disquscdn.com
196 KB
3 facebook.com
graph.facebook.com
www.facebook.com
801 B
3 eyeota.net
ps.eyeota.net
854 B
3 tru.am
tru.am
beacon.tru.am
15 KB
3 everestjs.net
www.everestjs.net
6 KB
3 betrad.com
l.betrad.com
360 B
2 google-analytics.com
www.google-analytics.com
17 KB
2 2mdn.net
s0.2mdn.net
92 KB
2 facebook.net
connect.facebook.net
33 KB
2 casalemedia.com
as-sec.casalemedia.com
1 KB
2 pagefair.net
asset.pagefair.net
887 B
2 akstat.io
364bf6be.akstat.io
36c3feec.akstat.io
708 B
2 crwdcntrl.net
sync.crwdcntrl.net
1 KB
2 mathtag.com
pixel.mathtag.com
1 KB
2 rlcdn.com
idsync.rlcdn.com
599 B
2 bluekai.com
tags.bluekai.com
1 KB
2 agkn.com
js.agkn.com
d.agkn.com
3 KB
2 googletagservices.com
www.googletagservices.com
18 KB
1 googleapis.com
imasdk.googleapis.com
1 yieldmanager.com
ad.yieldmanager.com
1 KB
1 googleadservices.com
www.googleadservices.com
251 B
1 urbanairship.com
web-sdk.urbanairship.com
17 KB
1 qualtrics.com
zn_3xebfjduss0srw5-cbs.siteintercept.qualtrics.com
13 KB
1 nr-data.net
bam.nr-data.net
261 B
1 linkedin.com
www.linkedin.com
1 KB
1 newrelic.com
js-agent.newrelic.com
9 KB
1 akamaihd.net
iicbsi-a.akamaihd.net
268 B
1 adsrvr.org
match.adsrvr.org
513 B
1 sharethrough.com
native.sharethrough.com
106 KB
1 indexww.com
js-sec.indexww.com
26 KB
353 56
Domain Requested by
24 pagead2.googlesyndication.com securepubads.g.doubleclick.net
optimized-by.rubiconproject.com
pagead2.googlesyndication.com
www.zdnet.com
20 cbsdfp5832910442.s.moatpixel.com
20 zdnet1.cbsistatic.com www.zdnet.com
zdnet2.cbsistatic.com
zdnet3.cbsistatic.com
19 zdnet3.cbsistatic.com www.zdnet.com
zdnet2.cbsistatic.com
zdnet3.cbsistatic.com
16 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
www.zdnet.com
15 tags.tiqcdn.com zdnet2.cbsistatic.com
tags.tiqcdn.com
12 tpc.googlesyndication.com securepubads.g.doubleclick.net
www.zdnet.com
11 zdnet4.cbsistatic.com www.zdnet.com
zdnet2.cbsistatic.com
11 zdnet2.cbsistatic.com www.zdnet.com
zdnet2.cbsistatic.com
10 z.moatads.com securepubads.g.doubleclick.net
9 googleads.g.doubleclick.net 1 redirects pagead2.googlesyndication.com
8 geo.moatads.com z.moatads.com
8 ml314.com 2 redirects tags.tiqcdn.com
ml314.com
www.zdnet.com
7 px.moatads.com
6 sb.scorecardresearch.com 2 redirects tags.tiqcdn.com
cdn.taboola.com
6 adservice.google.com www.googletagservices.com
pagead2.googlesyndication.com
6 adservice.google.de www.googletagservices.com
pagead2.googlesyndication.com
6 c.evidon.com www.zdnet.com
c.evidon.com
6 www.zdnet.com 1 redirects zdnet3.cbsistatic.com
vidtech.cbsinteractive.com
5 cdn-gl.imrworldwide.com vidtech.cbsinteractive.com
cdn-gl.imrworldwide.com
5 secure.adnxs.com js-sec.indexww.com
5 dpm.demdex.net 1 redirects www.zdnet.com
tags.tiqcdn.com
vidtech.cbsinteractive.com
5 vidtech.cbsinteractive.com zdnet2.cbsistatic.com
vidtech.cbsinteractive.com
5 cdn.viglink.com tags.tiqcdn.com
www.zdnet.com
4 widget.perfectmarket.com cdn.taboola.com
widget.perfectmarket.com
4 eus.rubiconproject.com www.zdnet.com
4 beacon-eu-ams3.rubiconproject.com www.zdnet.com
4 optimized-by.rubiconproject.com ads.rubiconproject.com
4 ads.rubiconproject.com www.zdnet.com
4 pixel.everesttech.net 1 redirects
4 www.lightboxcdn.com www.zdnet.com
www.lightboxcdn.com
4 dw.cbsi.com tags.tiqcdn.com
www.zdnet.com
4 c.go-mpulse.net www.zdnet.com
c.go-mpulse.net
zdnet1.cbsistatic.com
3 trc.taboola.com cdn.taboola.com
3 c.disquscdn.com zdnet-1.disqus.com
3 cdn.taboola.com zdnet2.cbsistatic.com
cdn.taboola.com
3 zdnet-1.disqus.com zdnet2.cbsistatic.com
zdnet-1.disqus.com
3 asset.pagefair.com zdnet3.cbsistatic.com
asset.pagefair.com
3 api.viglink.com cdn.viglink.com
3 saa.cbsi.com tags.tiqcdn.com
3 ps.eyeota.net 2 redirects www.zdnet.com
3 www.everestjs.net tags.tiqcdn.com
www.everestjs.net
3 l.betrad.com www.zdnet.com
2 www.google-analytics.com widget.perfectmarket.com
2 disqus.com zdnet-1.disqus.com
2 www.facebook.com connect.facebook.net
2 s0.2mdn.net zdnet2.cbsistatic.com
s0.2mdn.net
2 cm.everesttech.net 2 redirects
2 connect.facebook.net tags.tiqcdn.com
connect.facebook.net
2 secure-us.imrworldwide.com 1 redirects
2 as-sec.casalemedia.com js-sec.indexww.com
2 asset.pagefair.net zdnet3.cbsistatic.com
2 cbsi.demdex.net tags.tiqcdn.com
2 sync.crwdcntrl.net 2 redirects
2 pixel.mathtag.com 2 redirects
2 idsync.rlcdn.com 2 redirects
2 tags.bluekai.com 2 redirects
2 tru.am tags.tiqcdn.com
tru.am
2 www.googletagservices.com www.zdnet.com
rev.cbsi.com
1 imasdk.googleapis.com s0.2mdn.net
1 rev.cbsi.com www.zdnet.com
1 36c3feec.akstat.io c.go-mpulse.net
1 stats.pagefair.com zdnet3.cbsistatic.com
1 ad.yieldmanager.com
1 www.google.de
1 www.google.com 1 redirects
1 www.googleadservices.com 1 redirects
1 web-sdk.urbanairship.com zdnet3.cbsistatic.com
1 cm.g.doubleclick.net 1 redirects
1 zn_3xebfjduss0srw5-cbs.siteintercept.qualtrics.com tags.tiqcdn.com
1 bam.nr-data.net js-agent.newrelic.com
1 www.linkedin.com zdnet3.cbsistatic.com
1 graph.facebook.com zdnet3.cbsistatic.com
1 js-agent.newrelic.com www.zdnet.com
1 364bf6be.akstat.io zdnet1.cbsistatic.com
1 beacon.tru.am tru.am
1 in.ml314.com ml314.com
1 d.agkn.com js.agkn.com
1 js.agkn.com tags.tiqcdn.com
1 iicbsi-a.akamaihd.net tags.tiqcdn.com
1 match.adsrvr.org js-sec.indexww.com
1 native.sharethrough.com www.zdnet.com
1 js-sec.indexww.com www.zdnet.com
0 images.taboola.com Failed
353 84
Subject Issuer Validity Valid
www.cbs.com
GeoTrust RSA CA 2018
2018-10-16 -
2019-06-22
8 months crt.sh
cc.cnetcontent.com
DigiCert SHA2 Secure Server CA
2018-10-05 -
2020-01-04
a year crt.sh
*.evidon.com
DigiCert ECC Secure Server CA
2018-02-02 -
2019-04-02
a year crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2018-04-16 -
2019-02-06
10 months crt.sh
akstat.io
DigiCert ECC Secure Server CA
2018-03-12 -
2019-05-11
a year crt.sh
*.g.doubleclick.net
Google Internet Authority G3
2018-10-09 -
2019-01-01
3 months crt.sh
*.sharethrough.com
Go Daddy Secure Certificate Authority - G2
2017-09-18 -
2018-11-17
a year crt.sh
l.betrad.com
Go Daddy Secure Certificate Authority - G2
2017-04-25 -
2019-06-24
2 years crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2017-02-15 -
2019-04-19
2 years crt.sh
*.google.com
Google Internet Authority G3
2018-10-16 -
2019-01-08
3 months crt.sh
*.tiqcdn.com
DigiCert SHA2 Secure Server CA
2017-10-25 -
2020-05-13
3 years crt.sh
a248.e.akamai.net
DigiCert ECC Secure Server CA
2018-01-23 -
2019-01-19
a year crt.sh
ssl418259.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-09-22 -
2019-03-31
6 months crt.sh
*.cbsi.com
DigiCert SHA2 High Assurance Server CA
2017-11-07 -
2021-02-04
3 years crt.sh
ssl516460.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-10-06 -
2019-04-14
6 months crt.sh
*.ml314.com
Amazon
2018-04-14 -
2019-05-14
a year crt.sh
www.everestjs.net
DigiCert SHA2 Secure Server CA
2018-10-15 -
2020-10-15
2 years crt.sh
ssl389962.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-08-08 -
2019-02-14
6 months crt.sh
*.agkn.com
RapidSSL RSA CA 2018
2018-06-21 -
2020-09-16
2 years crt.sh
www.eyeota.com
COMODO RSA Domain Validation Secure Server CA
2018-02-12 -
2021-02-11
3 years crt.sh
*.demdex.net
DigiCert SHA2 High Assurance Server CA
2018-01-09 -
2021-02-12
3 years crt.sh
saa.cbsi.com
DigiCert SHA2 High Assurance Server CA
2018-05-19 -
2019-08-22
a year crt.sh
viglink.com
Amazon
2018-03-09 -
2019-04-09
a year crt.sh
f4.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2018-10-03 -
2019-04-14
6 months crt.sh
asset.pagefair.com
Let's Encrypt Authority X3
2018-10-29 -
2019-01-27
3 months crt.sh
asset.pagefair.net
Let's Encrypt Authority X3
2018-10-29 -
2019-01-27
3 months crt.sh
*.adnxs.com
DigiCert ECC Secure Server CA
2018-01-25 -
2019-01-25
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2017-12-15 -
2019-03-22
a year crt.sh
www.linkedin.com
DigiCert SHA2 Secure Server CA
2018-05-30 -
2020-09-01
2 years crt.sh
*.nr-data.net
GeoTrust RSA CA 2018
2018-01-11 -
2020-03-17
2 years crt.sh
*.qualtrics.com
DigiCert SHA2 Secure Server CA
2018-10-08 -
2021-01-06
2 years crt.sh
*.scorecardresearch.com
COMODO RSA Organization Validation Secure Server CA
2017-12-06 -
2018-12-26
a year crt.sh
*.imrworldwide.com
DigiCert SHA2 Secure Server CA
2018-02-15 -
2019-07-11
a year crt.sh
*.everesttech.net
DigiCert SHA2 Secure Server CA
2017-04-13 -
2020-04-17
3 years crt.sh
*.urbanairship.com
DigiCert SHA2 Secure Server CA
2018-04-17 -
2019-07-17
a year crt.sh
www.google.de
Google Internet Authority G3
2018-10-09 -
2019-01-01
3 months crt.sh
*.ads.yahoo.com
DigiCert SHA2 High Assurance Server CA
2018-07-05 -
2019-01-10
6 months crt.sh
*.doubleclick.net
Google Internet Authority G3
2018-10-16 -
2019-01-08
3 months crt.sh
tpc.googlesyndication.com
Google Internet Authority G3
2018-10-16 -
2019-01-08
3 months crt.sh
*.disqus.com
DigiCert SHA2 Secure Server CA
2018-03-28 -
2020-04-27
2 years crt.sh
*.pagefair.com
Gandi Standard SSL CA 2
2016-11-02 -
2018-11-20
2 years crt.sh
moatads.com
DigiCert ECC Secure Server CA
2018-01-09 -
2019-01-09
a year crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2016-01-12 -
2019-03-01
3 years crt.sh
*.googleapis.com
Google Internet Authority G3
2018-10-16 -
2019-01-08
3 months crt.sh
*.moatads.com
DigiCert SHA2 Secure Server CA
2018-04-27 -
2019-04-27
a year crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2018-10-10 -
2019-09-07
a year crt.sh
ssl565697.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-10-07 -
2019-04-15
6 months crt.sh
p.ssl.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2018-03-02 -
2018-12-28
10 months crt.sh
*.google-analytics.com
Google Internet Authority G3
2018-10-09 -
2019-01-01
3 months crt.sh

This page contains 40 frames:

Primary Page: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Frame ID: 4826EAAEF3E2EFFF79532FC68284F666
Requests: 245 HTTP requests in this frame

Frame: https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Frame ID: 11B795F67C0AF24CA3B39118469A116A
Requests: 2 HTTP requests in this frame

Frame: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/lightbox.js?cb=1540925450386&lv=1
Frame ID: 2B459D4DEC1CBF6C74E3A0A5E57777B9
Requests: 2 HTTP requests in this frame

Frame: https://d.agkn.com/iframe/8613/?che=804700676&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bpid=cbsinteractive&c=%7B%22bpid%22%3A%22cbsinteractive%22%2C%22loc%22%3A%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F%22%2C%22ref%22%3A%22-1%22%2C%22cid%22%3A%22-1%22%2C%22sid%22%3A%22-1%22%2C%22gen%22%3A%22-1%22%2C%22age%22%3A%22-1%22%2C%22cat%22%3A%22-1%22%2C%22brd%22%3A%22-1%22%7D
Frame ID: 71F13EC21D4C26704E3A5BCE29C5B262
Requests: 1 HTTP requests in this frame

Frame: https://cbsi.demdex.net/dest5.html?d_nsid=undefined
Frame ID: DC626DE88DE0D4EB26AA404454443F78
Requests: 1 HTTP requests in this frame

Frame: https://www.everestjs.net/static/pixel_details.html
Frame ID: 3DD69C66B70E1779F37FCF9830CBE33E
Requests: 1 HTTP requests in this frame

Frame: https://www.lightboxcdn.com/lclst/a1583f50-579b-41d0-8c4e-1cd1790d945c/ls.html?purl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&vid=a1583f50-579b-41d0-8c4e-1cd1790d945c&se=1&prev=0&cb=636752339805538198
Frame ID: 1E9283E476429E52038F822648856FB4
Requests: 1 HTTP requests in this frame

Frame: https://cbsi.demdex.net/dest5.html?d_nsid=0
Frame ID: A3B1C0E2A98BA15A1FA0F2495C1195E0
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Frame ID: 40EADC5BEC290B0F319FE7E278C163F0
Requests: 4 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Frame ID: F0CEF5EB82C096CA3DDDF7AE86C464D5
Requests: 4 HTTP requests in this frame

Frame: https://ads.rubiconproject.com/ad/9818.js
Frame ID: 76DF1C3D4AF55B5239F693B424016537
Requests: 15 HTTP requests in this frame

Frame: https://ads.rubiconproject.com/ad/9818.js
Frame ID: C70B1E54066CA7AD12491BD9E2AD121B
Requests: 15 HTTP requests in this frame

Frame: https://ads.rubiconproject.com/ad/9818.js
Frame ID: 7C852341C2AF7E059887B96A00474249
Requests: 14 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Frame ID: 64303B868AF6B1C538264145F057ECBA
Requests: 4 HTTP requests in this frame

Frame: https://ads.rubiconproject.com/ad/9818.js
Frame ID: 90769E602FADC3DF03B5F4F7749B8D32
Requests: 14 HTTP requests in this frame

Frame: https://rev.cbsi.com/common/js/adKit.min.js?2065881052
Frame ID: 0124A28D10AE863575085AF986CDEB44
Requests: 13 HTTP requests in this frame

Frame: https://www.facebook.com/tr/
Frame ID: DFBDF7349D2F3183276B4FAB0D6C0C2D
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.250.3_en.html
Frame ID: D255E443C5A6861718EA7E8AB9C65B91
Requests: 1 HTTP requests in this frame

Frame: https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Frame ID: 55E2CBCF607DAFA9CB3FB30E955251E0
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Frame ID: 5BA622C932B26BE7366760574552F9FF
Requests: 1 HTTP requests in this frame

Frame: https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Frame ID: BE3185A77B9E251779A071FC725CE714
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Frame ID: 1DFDFCF12D5315B0883D7430C0BCAA97
Requests: 1 HTTP requests in this frame

Frame: https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Frame ID: 38DD9E248AF4E2B8891D4695DA92D22D
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Frame ID: DB11DF7EF16D739957C89FD4AB8DBB7F
Requests: 1 HTTP requests in this frame

Frame: https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Frame ID: 947DE019223F92FAB19880E6BC409FF3
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Frame ID: 04E605B6F4C689BB6D04E1A751CCC5A6
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20181024/r20180604/zrt_lookup.html
Frame ID: 3D51707CFC753BF6360D49EAAC2165BE
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=250&slotname=8385808081&adk=1919950094&adf=4077151327&w=300&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1540925453531&bpp=59&bdt=1561&fdt=1289&idt=1286&shv=r20181024&cbv=r20180604&saldr=sa&correlator=919228707162&frm=23&ife=5&pv=2&ga_vid=475339152.1540925455&ga_sid=1540925455&ga_hid=568059610&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1043&ady=513&biw=1585&bih=1200&isw=300&ish=250&ifk=2180882631&scr_x=0&scr_y=0&eid=10573697%2C21060853%2C21070025%2C26835105&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CoeE%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=3832671437&ifi=1&fsb=1&dtd=1318
Frame ID: BD38EC5882D43BB0854BA086A36FCBE5
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Frame ID: 65B2F540108CB4BDBCA60FC6CD4ECD9B
Requests: 3 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Frame ID: D0E918CBC4BC1CD9C4D318AE4F3923DB
Requests: 3 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20181024/r20180604/zrt_lookup.html
Frame ID: 8127D03CC3E5B9A8B5A9A512EB2A9512
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=250&slotname=8385808081&adk=1919950094&adf=4077151324&w=300&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1540925453921&bpp=35&bdt=1951&fdt=1049&idt=1046&shv=r20181024&cbv=r20180604&saldr=sa&correlator=919228707162&frm=23&ife=5&pv=1&ga_vid=1624659841.1540925455&ga_sid=1540925455&ga_hid=61386211&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1043&ady=1501&biw=1585&bih=1200&isw=300&ish=250&ifk=1789179933&scr_x=0&scr_y=0&eid=21060853%2C21070025%2C36998751%2C21061796&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=3832671437&ifi=1&fsb=1&dtd=1066
Frame ID: 3AE2DEADA91A8EA7CB0D4DA95FE63183
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20181024/r20180604/zrt_lookup.html
Frame ID: 048BC860501065B2488FD2BADB9FE666
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=90&slotname=3084619100&adk=3828543735&adf=4077151326&w=728&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1540925453170&bpp=31&bdt=1201&fdt=1827&idt=1825&shv=r20181024&cbv=r20180604&saldr=sa&correlator=919228707162&frm=23&ife=5&pv=1&ga_vid=147091609.1540925455&ga_sid=1540925455&ga_hid=90814564&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=429&ady=393&biw=1585&bih=1200&isw=728&ish=90&ifk=2834320770&scr_x=0&scr_y=0&eid=21060853%2C21070025%2C111541704&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C728%2C90&vis=1&rsz=%7C%7CoeE%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=4066913089&ifi=1&fsb=1&dtd=1836
Frame ID: 7A43948DC40AE93545AF4A12DC0B580A
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20181024/r20180604/zrt_lookup.html
Frame ID: 741BAD5B2F786D7DAA1995911BDD48EE
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=90&slotname=3084619100&adk=3828543735&adf=4077151314&w=728&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1540925454262&bpp=18&bdt=2289&fdt=753&idt=750&shv=r20181024&cbv=r20180604&saldr=sa&correlator=919228707162&frm=23&ife=5&pv=1&ga_vid=793673856.1540925455&ga_sid=1540925455&ga_hid=484703723&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=429&ady=5494&biw=1585&bih=1200&isw=728&ish=90&ifk=1649710351&scr_x=0&scr_y=0&eid=21060853%2C21070025&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C728%2C90&vis=1&rsz=%7C%7CopeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=4066913089&ifi=1&fsb=1&dtd=768
Frame ID: 6E33BD43FF203D2304F6B37A9375B27E
Requests: 1 HTTP requests in this frame

Frame: https://disqus.com/embed/comments/?base=default&f=zdnet-1&t_i=7a12161d-2a5f-4793-b0a4-9fac038733de&t_u=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&t_e=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks&t_d=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks&t_t=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks&s_o=default
Frame ID: 0ECC8D1B62A732D8E3084C29792445BE
Requests: 1 HTTP requests in this frame

Frame: https://cdn-gl.imrworldwide.com/novms/html/ls.html
Frame ID: 7D082F71687FF75713E96651F2E088D7
Requests: 1 HTTP requests in this frame

Frame: https://widget.perfectmarket.com/opt/tboptevent.html?v=2&a=u&d=%7B%22stp%22%3A%7B%22a%22%3A1%7D%7D
Frame ID: 7D1E9C6A6DA74753C05616A29F0988C0
Requests: 1 HTTP requests in this frame

Frame: https://widget.perfectmarket.com/opt/tboptevent.html?v=2&a=u&d=%7B%22stp%22%3A%7B%22v%22%3A1%7D%7D
Frame ID: 77DCB941408D0D08E627E93F4287D56C
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazi... HTTP 301
    https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazi... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • env /^requirejs$/i

Overall confidence: 100%
Detected patterns
  • env /pbjs/i

Overall confidence: 100%
Detected patterns
  • env /^DISQUS/i

Overall confidence: 100%
Detected patterns
  • script /2mdn\.net/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^\/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • script /googlesyndication\.com\//i
  • script /2mdn\.net/i
  • env /^__google_ad_/i
  • env /^Goog_AdSense_/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|(analytics))\.js/i
  • env /^gaGlobal$/i

Overall confidence: 100%
Detected patterns
  • env /^googletag$/i

Overall confidence: 100%
Detected patterns
  • env /^Modernizr$/i

Overall confidence: 100%
Detected patterns
  • env /^NREUM/i

Overall confidence: 100%
Detected patterns
  • env /^optimizely$/i

Overall confidence: 100%
Detected patterns
  • env /^SWFObject$/i

Overall confidence: 100%
Detected patterns
  • env /^s_(?:account|objectID|code|INST)$/i


Overall confidence: 100%
Detected patterns
  • html /<iframe[^>]* (?:id="comscore"|scr=[^>]+comscore)|\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • script /\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • env /^_?COMSCORE$/i

Overall confidence: 100%
Detected patterns
  • env /^jQuery$/i

Page Statistics

353
Requests

97 %
HTTPS

32 %
IPv6

56
Domains

84
Subdomains

69
IPs

7
Countries

4505 kB
Transfer

14442 kB
Size

32
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks HTTP 301
    https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 99
  • https://tags.bluekai.com/site/20486?limit=0&id=5978151442409083984&redir=https://ml314.com/csync.ashx%3Ffp=$_BK_UUID%26person_id=5978151442409083984%26eid=50056 HTTP 302
  • https://tags.bluekai.com/site/20486?dt=0&r=772134994&sig=1520996108&bkca=KJpn0zpBnnWND1+1LEVNBnzyBeD61EW01q96LeYt+eOHv6oB0u00puQovuit6+4wpEWtBBanpLdPE0brpWFVu0pm3a9N5ALgLaVJ5dvmeylN5aWN1i+/nugmpTFcqiJxwCDARtOQSQR9dRyMhQ== HTTP 302
  • https://ml314.com/csync.ashx?fp=ENpaHy999991IBCq&person_id=5978151442409083984&eid=50056
Request Chain 100
  • https://idsync.rlcdn.com/395886.gif?partner_uid=5978151442409083984 HTTP 307
  • https://idsync.rlcdn.com/1000.gif?memo=CO6UGBIeChoIARCuXxoTNTk3ODE1MTQ0MjQwOTA4Mzk4NBAAGg0IitDi3gUSBQjoBxAAQgBKAA HTTP 307
  • https://ml314.com/csync.ashx?fp=&person_id=5978151442409083984&eid=50082
Request Chain 101
  • https://pixel.mathtag.com/sync/img?redir=https://ml314.com/csync.ashx%3Ffp=[MM_UUID]%26person_id=5978151442409083984%26eid=50220 HTTP 302
  • https://pixel.mathtag.com/sync/img?redir=https://ml314.com/csync.ashx%3Ffp=[MM_UUID]%26person_id=5978151442409083984%26eid=50220&mm_bnc&mm_bct HTTP 302
  • https://ml314.com/csync.ashx?fp=d0415bd8-9eef-4400-b6de-a5c82e7ff8d8&person_id=5978151442409083984&eid=50220
Request Chain 102
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D5978151442409083984 HTTP 302
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D5978151442409083984 HTTP 302
  • https://ml314.com/csync.ashx?fp=6f47558b63642657a256c2fffef5f385&eid=50146&person_id=5978151442409083984
Request Chain 103
  • https://ps.eyeota.net/pixel?pid=r8hrb20&t=gif HTTP 302
  • https://ps.eyeota.net/pixel/bounce/?pid=r8hrb20&t=gif HTTP 302
  • https://ml314.com/utsync.ashx?eid=50052&et=0&fp=2gD5lv3gtP4Ryo-j3aZeXyC2pWGxOIfv2Q25Ik6hzlDU&return=https%3A%2F%2Fps.eyeota.net%2Fmatch%3Fbid%3Dr8hrb20%26uid%3Dnil HTTP 302
  • https://ml314.com/csync.ashx?fp=2gD5lv3gtP4Ryo-j3aZeXyC2pWGxOIfv2Q25Ik6hzlDU&person_id=5978151442409083984&eid=50052&return=https%3a%2f%2fps.eyeota.net%2fmatch%3fbid%3dr8hrb20%26uid%3dnil HTTP 302
  • https://ps.eyeota.net/match?bid=r8hrb20&uid=nil
Request Chain 104
  • https://dpm.demdex.net/ibs:dpid=22052&dpuuid=5978151442409083984&redir= HTTP 302
  • https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=5978151442409083984&redir=
Request Chain 131
  • https://pixel.everesttech.net/4083/gr?ev_gb=0&url=https%3A%2F%2Fwww.everestjs.net%2Fstatic%2Fpixel_details.html%23google%3D__EFGCK__%26gsurfer%3D__EFGSURFER__%26optout%3D__EFOPTOUT__%26throttleCookie%3D__EFSYNC__%26time%3D__EFTIME__ HTTP 302
  • https://www.everestjs.net/static/pixel_details.html
Request Chain 151
  • https://sb.scorecardresearch.com/b?c1=2&c2=3005086&ns__t=1540925451706&ns_c=UTF-8&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=3005086&ns__t=1540925451706&ns_c=UTF-8&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c9=
Request Chain 152
  • https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-304254h&cg=0&cc=1&si=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp=&ts=compact&rnd=1540925451707 HTTP 302
  • https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-304254h&cg=0&cc=1&si=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp=&ts=compact&rnd=1540925451707&ja=1
Request Chain 156
  • https://cm.everesttech.net/cm HTTP 302
  • https://cm.g.doubleclick.net/pixel?google_nid=everest&google_cm&google_sc&ev_rs=1&url=/1x1&google_hm=Vzlpb0N3QUFCTXJzQkZLaQ HTTP 302
  • https://cm.everesttech.net/cm/ax?cookieid=&ev_rs=1&url=/1x1&google_gid=CAESEJPRLxN4XX32NF9Wpu5McuU&google_cver=1 HTTP 302
  • https://pixel.everesttech.net/1x1
Request Chain 161
  • https://www.googleadservices.com/pagead/conversion/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&amp;guid=ON&amp;script=0 HTTP 302
  • https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&amp;guid=ON&amp;script=0&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&ocp_id=C6jYW8eXMsWE-gbi6ofQBg&random=254921685&sscte=1&crd=CKrPGwiC0BsIidIb&gtd= HTTP 302
  • https://www.google.com/pagead/1p-user-list/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&random=254921685&crd=CKrPGwiJ0hsIhNAb&cdct=2&is_vtc=1&random=3780877198 HTTP 302
  • https://www.google.de/pagead/1p-user-list/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&random=254921685&crd=CKrPGwiJ0hsIhNAb&cdct=2&is_vtc=1&random=3780877198&ipr=y
Request Chain 342
  • https://sb.scorecardresearch.com/b?c1=7&c2=13739933&c3=20121515121&ns__t=1540925455775&ns_c=UTF-8&cv=3.1&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1540925455775&ns_c=UTF-8&cv=3.1&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c9=

353 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Redirect Chain
  • https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks
  • https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
234 KB
60 KB
Document
General
Full URL
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
c1d08240db3c161f1e6730965bc9c527a8c7f138441ac1ddaff43d926544cced
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.zdnet.com
:scheme
https
:path
/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
accept-encoding
gzip, deflate
cookie
GED_PLAYLIST_ACTIVITY=W3sidSI6IlFTR2oiLCJ0c2wiOjE1NDA5MjU0NDgsIm52IjowLCJ1cHQiOjE1NDA5MjU0NDMsImx0IjoxNTQwOTI1NDQzfV0.; fly_device=desktop; fly_geo={"countryCode": "de"}; fly_preferred_edition=eu; fly_default_edition=eu
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
server
nginx
content-type
text/html; charset=UTF-8
set-cookie
ak_bmsc=4CBA7FD9480CE9B3851A895F675C762B0210BAB79817000008A8D85B8CDEA03B~plPWCmAGOVDdm23a8+NpG3VSq9T7inpPAfvtiHeK79FgqtulcnrlmWNeef4f+fFiOGltnClXTEFUuNGyKwORQ+BHo58xD2VO8gIdqjpfcEVMZTloU+p2RfXsgXBCfni+nZhblCT0PbrNydPoVUmyG9hkQKvZx1UJYXES5N/c5jgtIZIx+uSgYIiMm2yBKmaGIRc5hTqSvBuoIzn+R+SebIkB0BR2BlrXvrDnN11FOKO2w=; expires=Tue, 30 Oct 2018 20:50:48 GMT; max-age=7200; path=/; domain=.zdnet.com; HttpOnly nemo_highlander-video_focus=video_focus%3a1%3aexclude; expires=Tue, 06 Nov 2018 07:59:59 GMT; path=/; domain=.zdnet.com; secure; bm_mi=0D6C588F5BA0F926138C32EB65A395D4~hcv6ufrVNTKyevT2cRA/pPPCLU/66lWmbUMhcIiG/bfS5Di/p7upd6efHAv3AgRoXAkpk5QKXCnsRMwB9E97QOuiA5sawOJ2GyU7F30s+NXdQFLc/wPKh0Sxw8i85uVKYaVzm7svkqPVEGTt93Jv+QLcBWDvMYy9kt0N8XF2/+4ovydq3pz5FssAqVWG8aTIJDzIeTVQHFn1P8Y6lNp2Mygtzyykh4IiVVoBo5CQqmJftDdqhiEZ3c+0Wdbbn8Za2dXTqk8QCkixwaWzE5AGXCln6dcZNjdrrOicmDtf+DqKuMkbNSR7cvWDnbpxubTpUucgUqqYj9PKCpyWApqezw==; Domain=.zdnet.com; Path=/; Max-Age=0; HttpOnly bm_mi=0D6C588F5BA0F926138C32EB65A395D4~hcv6ufrVNTKyevT2cRA/pPPCLU/66lWmbUMhcIiG/bfS5Di/p7upd6efHAv3AgRoXAkpk5QKXCnsRMwB9E97QOuiA5sawOJ2GyU7F30s+NUcZ8oNx+LsLsqQrWsiBCqCf+83ofy9TYp8B8D/pWM4lHsK9Ch2XhlHlqKcRNiw0JEeiD9jU9oE+Cl+GsedbakMK3lMuz12KeaxlG2kP6SYYRYoP6CV0qtB6JElBwINT51Asm8cOW5k7svxgT0HRsWhPVpZUUuHcrSJci+pMFaze0eJTTB4qnQuFFemr8gukVXSpUAqLYBBCQNzYM9yzDgiTIdPsNDQHykbF2w0A2t1HA==; Domain=.zdnet.com; Path=/; Max-Age=0; HttpOnly
x-enable-esi
true
strict-transport-security
max-age=63072000; includeSubDomains; preload
vary
Accept-Encoding, User-Agent
x-akamai-transformed
9 2872 0 pmb=mTOE,4
access-control-allow-origin
https://www.zdnet.com
x-frame-options
SAMEORIGIN
content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
expires
Tue, 30 Oct 2018 19:50:51 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
referrer-policy
no-referrer-when-downgrade
x-content-type-options
nosniff
x-xss-protection
1; mode=block
x-tx-id
5dbcfcae-1cd0-44b1-adaf-51a1a1522e31
content-encoding
gzip
date
Tue, 30 Oct 2018 18:50:49 GMT

Redirect headers

status
301
server
nginx
content-type
text/html
content-length
178
location
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
access-control-allow-origin
https://www.zdnet.com
date
Tue, 30 Oct 2018 18:50:47 GMT
set-cookie
fly_device=desktop; expires=Tue, 06-Nov-2018 18:50:47 GMT; path=/; domain=.zdnet.com; secure fly_geo={"countryCode": "de"}; expires=Tue, 06-Nov-2018 18:50:47 GMT; path=/; domain=.zdnet.com; secure fly_preferred_edition=eu; path=/; domain=.zdnet.com; secure fly_default_edition=eu; path=/; domain=.zdnet.com; secure
vary
Accept-Encoding, User-Agent
strict-transport-security
max-age=63072000; includeSubDomains; preload
main-6743c8f11b-rev.css
zdnet1.cbsistatic.com/fly/1531-fly/css/core/
340 KB
62 KB
Stylesheet
General
Full URL
https://zdnet1.cbsistatic.com/fly/1531-fly/css/core/main-6743c8f11b-rev.css
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
1850ed533f7bef263c3b15379882c2ff9a33ac1d097864dd0c600633665f334d

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:41:02 GMT
server
nginx
etag
W/"5bd7462e-5507b"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
63430
expires
Tue, 06 Nov 2018 18:50:49 GMT
controls-ebaf8ad91a-rev.css
zdnet3.cbsistatic.com/fly/css/video/htmlPlayerControls/
42 KB
7 KB
Stylesheet
General
Full URL
https://zdnet3.cbsistatic.com/fly/css/video/htmlPlayerControls/controls-ebaf8ad91a-rev.css
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
b47241eabf30c18bf1761e363bdc9e5b755ea4b60d71ca9d1a0b3c4f7ffefdb7

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:41:16 GMT
server
nginx
etag
W/"5bd7463c-a910"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
6704
expires
Tue, 06 Nov 2018 18:50:49 GMT
catalin-cimpanu.jpg
zdnet3.cbsistatic.com/hub/i/r/2018/08/21/a59867e9-8d75-40af-a87c-690638f8afa4/thumbnail/40x40/e9e4d21a35e101b1402c656cf979114c/
910 B
1 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/08/21/a59867e9-8d75-40af-a87c-690638f8afa4/thumbnail/40x40/e9e4d21a35e101b1402c656cf979114c/catalin-cimpanu.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
ba2fa15976662b87f31dccdd53d415b927f2118760fdafc4ac21dd2c1b234ff3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
content-encoding
gzip
server
nginx
status
200
etag
"c3829e4116c9d009ce51c32b304b9e46"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
public, max-age=26552528, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
868
5b72aa0160b2e1568893d64a-1280x7201aug152018113829poster.jpg
zdnet1.cbsistatic.com/hub/i/r/2018/08/15/691aecd3-728b-47a4-abe2-3742b658b4b1/thumbnail/570x322/444fcf3d71222b689b04787946295715/
7 KB
7 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2018/08/15/691aecd3-728b-47a4-abe2-3742b658b4b1/thumbnail/570x322/444fcf3d71222b689b04787946295715/5b72aa0160b2e1568893d64a-1280x7201aug152018113829poster.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
0d6baa46c3cd463a5d3f967d89f7cf48d5909c34b22f6d671cc9f0c4f929611c

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
content-encoding
gzip
last-modified
Wed, 15 Aug 2018 11:52:32 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=27181217
timing-allow-origin
*
content-length
6765
expires
Tue, 10 Sep 2019 09:11:06 GMT
advertisement.js
zdnet2.cbsistatic.com/fly/bundles/zdnetjs/js/utils/
53 B
280 B
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/bundles/zdnetjs/js/utils/advertisement.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
07b69027231d985f5bdcd4d5a539f120d26003feef6e9dc0a6b77a4b43a9b21f

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
content-encoding
gzip
last-modified
Wed, 20 Jun 2018 16:56:03 GMT
server
nginx
etag
"5b2a8723-35"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
71
expires
Tue, 06 Nov 2018 18:50:49 GMT
brazil-botnet-log.png
zdnet4.cbsistatic.com/hub/i/r/2018/09/30/7555210c-aeb1-48bb-946b-3f8e992d040c/resize/370xauto/40b9a8e2f51fd67c056d19136e0bf20e/
150 KB
150 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/hub/i/r/2018/09/30/7555210c-aeb1-48bb-946b-3f8e992d040c/resize/370xauto/40b9a8e2f51fd67c056d19136e0bf20e/brazil-botnet-log.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
61fdf37d30bf412dd87c52565f2b227ce9c3b57030950437fd0bd650d11bc035

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
content-encoding
gzip
server
nginx
status
200
etag
"c25007eca40e6838db7ef8e80145c70f"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
public, max-age=31496251, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
153106
a-1-dhs.jpg
zdnet4.cbsistatic.com/hub/i/r/2018/07/24/7aa8a1bb-780a-4d41-9464-2427956f7a6d/thumbnail/170x128/67b517226b29a2c342262671913d5966/
8 KB
9 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/hub/i/r/2018/07/24/7aa8a1bb-780a-4d41-9464-2427956f7a6d/thumbnail/170x128/67b517226b29a2c342262671913d5966/a-1-dhs.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
4ab6a27e7fab0d1aa86e5fb3cef44c53865862b2c8d6c076ee44409a12e6b644

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
content-encoding
gzip
last-modified
Tue, 24 Jul 2018 13:43:38 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=23050637
timing-allow-origin
*
content-length
8605
expires
Wed, 24 Jul 2019 13:48:06 GMT
a-2-fedex.jpg
zdnet3.cbsistatic.com/hub/i/r/2018/07/24/dd303a4a-5b12-4709-bef7-a35b361d8799/thumbnail/170x128/340415a9086f0e182e4b49fa34c6e277/
6 KB
6 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/07/24/dd303a4a-5b12-4709-bef7-a35b361d8799/thumbnail/170x128/340415a9086f0e182e4b49fa34c6e277/a-2-fedex.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
d05a0088d1a2c67e0707be3f7ff1823683ba849a3d3d4004d971cb58eb40d08a

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:16 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=23566691
timing-allow-origin
*
content-length
6301
expires
Tue, 30 Jul 2019 13:09:00 GMT
a-3-orbitz.jpg
zdnet1.cbsistatic.com/hub/i/r/2018/07/24/a80ee1f5-4daa-4d79-9f51-e490df5e4e78/thumbnail/170x128/5b7f27009156f63c204e0bb342bf80e2/
5 KB
5 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2018/07/24/a80ee1f5-4daa-4d79-9f51-e490df5e4e78/thumbnail/170x128/5b7f27009156f63c204e0bb342bf80e2/a-3-orbitz.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
6777cc97d90b6e3773b62f12dfc047362dd55f7610369239eafd46c109cd5380

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:16 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=23566692
timing-allow-origin
*
content-length
5115
expires
Tue, 30 Jul 2019 13:09:01 GMT
a-4-aadhaar.jpg
zdnet3.cbsistatic.com/hub/i/r/2018/07/24/3c85daea-5f11-4c91-a118-4fb0e51a1436/thumbnail/170x128/3f448909d2b440331eb0428dccbd624b/
6 KB
6 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/07/24/3c85daea-5f11-4c91-a118-4fb0e51a1436/thumbnail/170x128/3f448909d2b440331eb0428dccbd624b/a-4-aadhaar.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
2651576977d18928324a68a053a929a1acddffbbc6a04c8face239c5b489b34a

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:16 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=23566563
timing-allow-origin
*
content-length
5937
expires
Tue, 30 Jul 2019 13:06:52 GMT
a-5-lexpress.jpg
zdnet2.cbsistatic.com/hub/i/r/2018/07/24/474ea969-3cc4-4e1c-bc66-a98fe8264033/thumbnail/170x128/5aee2ed8558e0adb2c8e84b318597a04/
6 KB
6 KB
Image
General
Full URL
https://zdnet2.cbsistatic.com/hub/i/r/2018/07/24/474ea969-3cc4-4e1c-bc66-a98fe8264033/thumbnail/170x128/5aee2ed8558e0adb2c8e84b318597a04/a-5-lexpress.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
ee58d451d4c826e171525a0fb417343a42ae338fd8afb6b77613235476f89dfe

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:16 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=23566703
timing-allow-origin
*
content-length
5631
expires
Tue, 30 Jul 2019 13:09:12 GMT
decrypted-lock.png
zdnet4.cbsistatic.com/hub/i/r/2018/10/30/c0aa7f70-8c24-47f6-9aad-7b31ad1fba7a/thumbnail/170x128/f6f385351fd9e1f7e90fafeea2c6b906/
19 KB
19 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/hub/i/r/2018/10/30/c0aa7f70-8c24-47f6-9aad-7b31ad1fba7a/thumbnail/170x128/f6f385351fd9e1f7e90fafeea2c6b906/decrypted-lock.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
09ee3d95bf4c05be8568f5214f9b48ff244e6d27e7f95da4d8fb252246bf726e

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
content-encoding
gzip
server
nginx
status
200
etag
"ba01f7779044c1ca322b725274f04d35"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
public, max-age=31528035, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
19001
istock-ransomware-on-laptop.jpg
zdnet1.cbsistatic.com/hub/i/r/2018/01/25/7c8e0e80-0861-41b1-8ec3-fe8f1ca26ae9/thumbnail/170x128/5e4b61e2444c96d583eb0ea0c609adb5/
11 KB
10 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2018/01/25/7c8e0e80-0861-41b1-8ec3-fe8f1ca26ae9/thumbnail/170x128/5e4b61e2444c96d583eb0ea0c609adb5/istock-ransomware-on-laptop.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
f064de9e559cb4483bff51b21a1d7a36ba057126778f6ecd8dca5329c190a9ee

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
content-encoding
gzip
last-modified
Fri, 26 Jan 2018 10:57:50 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=31518599
timing-allow-origin
*
content-length
10209
expires
Wed, 30 Oct 2019 14:00:48 GMT
screen-shot-2018-10-30-at-09-03-28.png
zdnet1.cbsistatic.com/hub/i/r/2018/10/30/9e1fa2a5-fbeb-42c2-bf95-3de40d26d436/thumbnail/170x128/c2d5a3d2ed96418786c9c0347cab075b/
57 KB
57 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2018/10/30/9e1fa2a5-fbeb-42c2-bf95-3de40d26d436/thumbnail/170x128/c2d5a3d2ed96418786c9c0347cab075b/screen-shot-2018-10-30-at-09-03-28.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
9b8a19af975870b49a3d4d941b65613ef40b35ffff646e4667701d9e23e481da

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
content-encoding
gzip
server
nginx
status
200
etag
"2870b16a188ad117f3a892b931401ea5"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
public, max-age=31513587, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
58009
screen-shot-2018-10-26-at-13-37-12.png
zdnet3.cbsistatic.com/hub/i/r/2018/10/26/a5e9cd3f-bb54-4fba-b1ec-23a5af6bf357/thumbnail/170x128/8cc963bbf767eb84937a440fdb69cad4/
35 KB
35 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/10/26/a5e9cd3f-bb54-4fba-b1ec-23a5af6bf357/thumbnail/170x128/8cc963bbf767eb84937a440fdb69cad4/screen-shot-2018-10-26-at-13-37-12.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
ba34757c29dec9b09a7783e13122d0832ea84985249bcd283048eb714a08a426

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
content-encoding
gzip
server
nginx
status
200
etag
"107aca10b9fd0bb976953ad54c934f05"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
public, max-age=31511533, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
35383
screen-shot-2018-10-30-at-11-06-08.png
zdnet3.cbsistatic.com/hub/i/r/2018/10/30/577f802a-8e0c-41c4-a669-8c26b09114a3/thumbnail/170x128/80d56509d4fb6ee696e60d28b6c59434/
59 KB
59 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/10/30/577f802a-8e0c-41c4-a669-8c26b09114a3/thumbnail/170x128/80d56509d4fb6ee696e60d28b6c59434/screen-shot-2018-10-30-at-11-06-08.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
b35a95a86cc71364688d5c031e3ea4da928c773c564fdbb76ece333ca8f1b3c7

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
content-encoding
gzip
server
nginx
status
200
etag
"51050c73c53b9b04bc45602359b3d0fd"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
public, max-age=31508232, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
60089
burgess-macgibbon.png
zdnet3.cbsistatic.com/hub/i/r/2018/05/30/bfbf0b33-c0c8-41cd-a5f5-f56f66e2972b/thumbnail/170x128/cfe30ce517576a41e1aa67d7124b036a/
38 KB
39 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/05/30/bfbf0b33-c0c8-41cd-a5f5-f56f66e2972b/thumbnail/170x128/cfe30ce517576a41e1aa67d7124b036a/burgess-macgibbon.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
2bb8e607aa914110121eb1e2d4a65514285c78342811558156449443f644cf7b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
content-encoding
gzip
last-modified
Wed, 30 May 2018 02:19:54 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=31470430
timing-allow-origin
*
content-length
39249
expires
Wed, 30 Oct 2019 00:37:59 GMT
recaptchav3.png
zdnet1.cbsistatic.com/hub/i/r/2018/10/30/c23ac0b1-25b8-447a-8425-75e04bce7b0f/thumbnail/170x128/f6737f13d21313c4decedacde0a58f60/
6 KB
6 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2018/10/30/c23ac0b1-25b8-447a-8425-75e04bce7b0f/thumbnail/170x128/f6737f13d21313c4decedacde0a58f60/recaptchav3.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
3988f709c09d423be46f08ad2547895597522365a2ef41a233f6d270d284e5a6

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
content-encoding
gzip
server
nginx
status
200
etag
"17b65afe58c49edc1bdd812c554ee3bb"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
public, max-age=31469051, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
5954
security-privacy-hackers-locks-key-6778.jpg
zdnet3.cbsistatic.com/hub/i/r/2018/01/25/b953bd40-15b0-4720-bcd3-6f29f7a3bb16/thumbnail/170x128/6c6c20d56ceb4c89448ec8c281ff4627/
6 KB
5 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/01/25/b953bd40-15b0-4720-bcd3-6f29f7a3bb16/thumbnail/170x128/6c6c20d56ceb4c89448ec8c281ff4627/security-privacy-hackers-locks-key-6778.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
f158dee56c879e346479ff65c3a3f9135fbae73d8757264df8239dd0e5809e95

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
content-encoding
gzip
last-modified
Fri, 08 Jun 2018 05:16:54 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=31465205
timing-allow-origin
*
content-length
5359
expires
Tue, 29 Oct 2019 23:10:54 GMT
hero-opensource.jpg
zdnet2.cbsistatic.com/hub/i/r/2014/12/29/6c38a8b1-94eb-48fb-abd6-426d6cbb4c85/thumbnail/170x128/d4fee7edc71b7d390eaf564eb7b2960d/
9 KB
8 KB
Image
General
Full URL
https://zdnet2.cbsistatic.com/hub/i/r/2014/12/29/6c38a8b1-94eb-48fb-abd6-426d6cbb4c85/thumbnail/170x128/d4fee7edc71b7d390eaf564eb7b2960d/hero-opensource.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
453cb692f7616556511f28fdf07f53d8e36e149c0e71941b04fed49d3f1ed4b1

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
content-encoding
gzip
last-modified
Tue, 17 Oct 2017 13:24:17 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=31464345
timing-allow-origin
*
content-length
8431
expires
Tue, 29 Oct 2019 22:56:34 GMT
require-2.1.2.js
zdnet2.cbsistatic.com/fly/1531-fly/js/libs/
16 KB
6 KB
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
f96f203f5605c9f56e7f6f97caf6ea84f122872ec3c5ac1f9037a1b508c706ee

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:40:51 GMT
server
nginx
etag
W/"5bd74623-3f09"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
6305
expires
Tue, 06 Nov 2018 18:50:49 GMT
evidon-sitenotice-tag.js
c.evidon.com/sitenotice/
35 KB
10 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
92.123.6.233 , France, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a92-123-6-233.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
89b08981d2dcbbc50524744f8d3beee8e325096b9030f5bbb0244f5e93bc57dc

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:49 GMT
Content-Encoding
gzip
Last-Modified
Thu, 25 Oct 2018 19:32:09 GMT
Server
Apache
ETag
"34aa447057e60d0ba6fc437edc504c4a:1540495929"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=86400, private;max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
9531
Expires
Wed, 31 Oct 2018 18:50:49 GMT
country.js
c.evidon.com/geo/
260 B
490 B
Script
General
Full URL
https://c.evidon.com/geo/country.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
92.123.6.233 , France, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a92-123-6-233.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
f9784f57729f84391b084eed9e944e048f771129d65e9b58f34095fdfba86473

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:49 GMT
Content-Encoding
gzip
Last-Modified
Wed, 30 May 2018 22:23:16 GMT
Server
Apache
ETag
"c1e367d098d326049811561575dbda4a:1527718996"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
165
snthemes.js
c.evidon.com/sitenotice/425/
65 KB
4 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/425/snthemes.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
92.123.6.233 , France, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a92-123-6-233.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
b50a701e3677d3b9810ddf2d0a775c976210f5c433926d515b24e0d62b6e3af4

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:49 GMT
Content-Encoding
gzip
Last-Modified
Mon, 15 Oct 2018 17:28:06 GMT
Server
Apache
ETag
"86a61dd217ea8f7fd69b9bda762e95e6:1539624486"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=86400, private;max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
3602
Expires
Wed, 31 Oct 2018 18:50:49 GMT
settings.js
c.evidon.com/sitenotice/425/zdnet/
15 KB
2 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/425/zdnet/settings.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
92.123.6.233 , France, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a92-123-6-233.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
1b91058b5969c2319ee3f3efb2b91ccf388c64fe22f806e59b0edb43694150d4

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:49 GMT
Content-Encoding
gzip
Last-Modified
Tue, 28 Aug 2018 21:08:55 GMT
Server
Apache
ETag
"09891370db88cdd3a58c49f5cd396b85:1535490535"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=86400, private;max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1239
Expires
Wed, 31 Oct 2018 18:50:49 GMT
truncated
/
917 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d2fe67ecc4354b214728e0a7d75b67536a78f6b575080b589d54a1937fc46b41

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/jpeg
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1724d7fd70903754d6f29172f2ac879dc6dab79df6c4c78ed06f45c0f117e15c

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/jpeg
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ceffb891c3e1891757ead2e7e41497adc13abca0d14d7f58d20e3aa8d5aee108

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/jpeg
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1c0ccb11374e2374cb7a52c792ffe07d9203d28d4ad97623bcf27bc58d2513f9

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/jpeg
mag-white01.png
zdnet2.cbsistatic.com/fly/1540834645-fly/bundles/zdnetcss/images/core/
1 KB
1 KB
Image
General
Full URL
https://zdnet2.cbsistatic.com/fly/1540834645-fly/bundles/zdnetcss/images/core/mag-white01.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
69721aa2f1085046c84d1943a1daa0515be8e2f060c21063024ea117789e425c

Request headers

Referer
https://zdnet1.cbsistatic.com/fly/1531-fly/css/core/main-6743c8f11b-rev.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:37:25 GMT
server
nginx
etag
W/"5bd74555-4f1"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
936
expires
Tue, 06 Nov 2018 18:50:49 GMT
Raleway-Bold.woff2
zdnet1.cbsistatic.com/bundles/zdnetcss/fonts/raleway/
25 KB
25 KB
Font
General
Full URL
https://zdnet1.cbsistatic.com/bundles/zdnetcss/fonts/raleway/Raleway-Bold.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
bf413671ac4278a51bc9621af98e7f5a6cdbb228ecda66602f7e02ea27b28d13

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://zdnet1.cbsistatic.com/fly/1531-fly/css/core/main-6743c8f11b-rev.css
Origin
https://www.zdnet.com

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
last-modified
Wed, 20 Jun 2018 16:56:01 GMT
server
nginx
etag
"5b2a8721-6348"
status
200
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=23821408
accept-ranges
bytes
timing-allow-origin
*
content-length
25416
expires
Fri, 02 Aug 2019 11:54:17 GMT
Raleway-Regular.woff2
zdnet1.cbsistatic.com/bundles/zdnetcss/fonts/raleway/
25 KB
25 KB
Font
General
Full URL
https://zdnet1.cbsistatic.com/bundles/zdnetcss/fonts/raleway/Raleway-Regular.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
6987f5dab3ced7612887b80ca2de81041654a6434970e1cbbb03c293dd47ce0b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://zdnet1.cbsistatic.com/fly/1531-fly/css/core/main-6743c8f11b-rev.css
Origin
https://www.zdnet.com

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
last-modified
Wed, 20 Jun 2018 16:56:01 GMT
server
nginx
etag
"5b2a8721-6398"
status
200
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=23821424
accept-ranges
bytes
timing-allow-origin
*
content-length
25496
expires
Fri, 02 Aug 2019 11:54:33 GMT
Raleway-Light.woff2
zdnet1.cbsistatic.com/bundles/zdnetcss/fonts/raleway/
25 KB
25 KB
Font
General
Full URL
https://zdnet1.cbsistatic.com/bundles/zdnetcss/fonts/raleway/Raleway-Light.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
7017fe26514320eea8b02069a2ec814953fc7f78d3513ab52c4c80108d112b56

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://zdnet1.cbsistatic.com/fly/1531-fly/css/core/main-6743c8f11b-rev.css
Origin
https://www.zdnet.com

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
last-modified
Wed, 20 Jun 2018 16:56:01 GMT
server
nginx
etag
"5b2a8721-63ac"
status
200
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=23821466
accept-ranges
bytes
timing-allow-origin
*
content-length
25516
expires
Fri, 02 Aug 2019 11:55:15 GMT
ring-animated.svg
zdnet3.cbsistatic.com/fly/1540834645-fly/bundles/zdnetcss/images/video/
704 B
576 B
Image
General
Full URL
https://zdnet3.cbsistatic.com/fly/1540834645-fly/bundles/zdnetcss/images/video/ring-animated.svg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
0025565f0cddfceb7ebdbc4b21d2552c894998e443153f97a6e8b353dfd9bebd

Request headers

Referer
https://zdnet3.cbsistatic.com/fly/css/video/htmlPlayerControls/controls-ebaf8ad91a-rev.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:37:25 GMT
server
nginx
status
200
etag
"5bd74555-2c0"
vary
Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
max-age=31452956
accept-ranges
bytes
timing-allow-origin
*
content-length
364
expires
Tue, 29 Oct 2019 19:46:45 GMT
play.svg
zdnet1.cbsistatic.com/fly/1540834645-fly/bundles/zdnetcss/images/video/
299 B
424 B
Image
General
Full URL
https://zdnet1.cbsistatic.com/fly/1540834645-fly/bundles/zdnetcss/images/video/play.svg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
d5e9dfd6066c2872be4f85c25aa0186402b124ea3f80152e2e2b767906793284

Request headers

Referer
https://zdnet3.cbsistatic.com/fly/css/video/htmlPlayerControls/controls-ebaf8ad91a-rev.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:37:25 GMT
server
nginx
status
200
etag
"5bd74555-12b"
vary
Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
max-age=31452976
accept-ranges
bytes
timing-allow-origin
*
content-length
213
expires
Tue, 29 Oct 2019 19:47:05 GMT
en.js
c.evidon.com/sitenotice/425/translations/
205 KB
7 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/425/translations/en.js
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
92.123.6.233 , France, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a92-123-6-233.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
2b4b44954ecddf65e5391cb2df9f86cffc2979ebe88399bac1d61e5e918b8ed6

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:49 GMT
Content-Encoding
gzip
Last-Modified
Tue, 18 Sep 2018 15:06:56 GMT
Server
Apache
ETag
"c0ff937f678b15708f165faee2bf7d8f:1537283216"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=86400, private;max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
6758
Expires
Wed, 31 Oct 2018 18:50:49 GMT
Raleway-Black.woff2
zdnet1.cbsistatic.com/bundles/zdnetcss/fonts/raleway/
25 KB
25 KB
Font
General
Full URL
https://zdnet1.cbsistatic.com/bundles/zdnetcss/fonts/raleway/Raleway-Black.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
c9f9ded1c66d9f290eeb0fadad73f3bba0d8cc2c784b078e9b00eca200eca125

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://zdnet1.cbsistatic.com/fly/1531-fly/css/core/main-6743c8f11b-rev.css
Origin
https://www.zdnet.com

Response headers

date
Tue, 30 Oct 2018 18:50:49 GMT
last-modified
Wed, 20 Jun 2018 16:56:01 GMT
server
nginx
etag
"5b2a8721-624c"
status
200
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=23821489
accept-ranges
bytes
timing-allow-origin
*
content-length
25164
expires
Fri, 02 Aug 2019 11:55:38 GMT
truncated
/
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/gif
logo.png
zdnet4.cbsistatic.com/fly/1540834645-fly/bundles/zdnetcss/images/core/
4 KB
4 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/fly/1540834645-fly/bundles/zdnetcss/images/core/logo.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
ff2ae991ac0efdb5ae8b4428ba8555a0aeb0fd94b8014ce290c484242c524097

Request headers

Referer
https://zdnet1.cbsistatic.com/fly/1531-fly/css/core/main-6743c8f11b-rev.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:37:25 GMT
server
nginx
etag
W/"5bd74555-1009"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
4128
expires
Tue, 06 Nov 2018 18:50:50 GMT
ls-zdnet.js
js-sec.indexww.com/ht/
85 KB
26 KB
Script
General
Full URL
https://js-sec.indexww.com/ht/ls-zdnet.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.100.198.4 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-198-4.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
d6e6bd9d40a807b7402dd2c2b74700d0790e0733718a4343c2a6fa140da3a62e

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:50 GMT
Content-Encoding
gzip
Last-Modified
Tue, 30 Oct 2018 18:20:06 GMT
Server
Apache
ETag
"9041aa-15269-579763c2b7a21"
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=1943
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
text/javascript
Content-Length
26182
Expires
Tue, 30 Oct 2018 19:23:13 GMT
YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
c.go-mpulse.net/boomerang/ Frame 11B7
187 KB
55 KB
Script
General
Full URL
https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.8.11.168 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-8-11-168.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e0b8436d50fb200de76d7a25cf450ea238cd100197f8e9d462e9228153da873f

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:50 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/javascript;charset=UTF-8
Cache-Control
max-age=604800, s-maxage=604800
Transfer-Encoding
chunked
Connection
keep-alive, Transfer-Encoding
Timing-Allow-Origin
*
gpt.js
www.googletagservices.com/tag/js/
24 KB
9 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:824::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cbe1f033ed03b9f1b425c1ad45d6406f019fe8666c20ab24fb6719579f75065b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"9 / 546 of 1000 / last-modified: 1540922836"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
8892
x-xss-protection
1; mode=block
expires
Tue, 30 Oct 2018 18:50:50 GMT
sfp.js
native.sharethrough.com/assets/
365 KB
106 KB
Script
General
Full URL
https://native.sharethrough.com/assets/sfp.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.93.205 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-93-205.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
5a806205548d8298d71adf6a7acf1583179bcc67923b3426aad26c4b2fb0f8fc

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:24:27 GMT
content-encoding
gzip
last-modified
Tue, 30 Oct 2018 18:24:25 GMT
server
AmazonS3
age
1584
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=3600
x-amz-cf-id
mnrgC2d8ISfIGpMgsDW_iLJ0HLZ7grE1vkcSJwx4ejLWeBWB9DzgYA==
via
1.1 60a935292c9892b0b7f9e56f65af863a.cloudfront.net (CloudFront)
expires
Tue, 30 Oct 2018 19:24:23 GMT
evidon-banner.js
c.evidon.com/sitenotice/
8 KB
3 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/evidon-banner.js
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
92.123.6.233 , France, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a92-123-6-233.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
186e5821720593367310d36fc9e71747518897853d453a6823194d0004b51f16

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:50 GMT
Content-Encoding
gzip
Last-Modified
Thu, 25 Oct 2018 19:32:10 GMT
Server
Apache
ETag
"ac8d1520b10feab378ed0c2e13a475a0:1540495931"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=86400, private;max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2507
Expires
Wed, 31 Oct 2018 18:50:50 GMT
2
l.betrad.com/site/v3/425/3445/3/1/2/
0
120 B
Image
General
Full URL
https://l.betrad.com/site/v3/425/3445/3/1/2/2?consent=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.152.59.224 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-152-59-224.compute-1.amazonaws.com
Software
/ Express
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
x-powered-by
Express
etag
W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI"
vary
Accept-Encoding
18863
l.betrad.com/site/v3/425/3445/3/1/2/2/
0
120 B
Image
General
Full URL
https://l.betrad.com/site/v3/425/3445/3/1/2/2/18863?consent=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.152.59.224 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-152-59-224.compute-1.amazonaws.com
Software
/ Express
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
x-powered-by
Express
etag
W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI"
vary
Accept-Encoding
main.default.js
zdnet3.cbsistatic.com/fly/1531-fly/js/
204 KB
69 KB
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/1531-fly/js/main.default.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
6c65a8205295ee9b8a16e60080102aa2125add70f44910fef31523649d252ac0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:40:53 GMT
server
nginx
etag
W/"5bd74625-330a4"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
70573
expires
Tue, 06 Nov 2018 18:50:50 GMT
18863
l.betrad.com/site/v3/425/3445/3/4/2/2/
0
120 B
Image
General
Full URL
https://l.betrad.com/site/v3/425/3445/3/4/2/2/18863?consent=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.152.59.224 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-152-59-224.compute-1.amazonaws.com
Software
/ Express
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
x-powered-by
Express
etag
W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI"
vary
Accept-Encoding
rid
match.adsrvr.org/track/
109 B
513 B
XHR
General
Full URL
https://match.adsrvr.org/track/rid?ttd_pid=casale&fmt=json&p=184216
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.16.141.158 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-16-141-158.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
303082508b1495cc2013dff90830a5f59bb84a6b3dd0793c8154244f92495709

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
x-aspnet-version
4.0.30319
status
200
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.zdnet.com
cache-control
private
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Content-Length, Content-Encoding, Vary, Cache-Control, Accept
content-length
109
expires
Thu, 29 Nov 2018 18:50:50 GMT
integrator.js
adservice.google.de/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:815::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
integrator.js
adservice.google.com/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:820::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
pubads_impl_270.js
securepubads.g.doubleclick.net/gpt/
184 KB
63 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_270.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
sffe /
Resource Hash
516b065177d1546683627fa32c8574fd59edc3eb3bf92cef5882d53e58d7a1f2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 24 Oct 2018 15:56:38 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
64036
x-xss-protection
1; mode=block
expires
Tue, 30 Oct 2018 18:50:50 GMT
require.optional-dependency.js
zdnet4.cbsistatic.com/fly/js/libs/
582 B
518 B
Script
General
Full URL
https://zdnet4.cbsistatic.com/fly/js/libs/require.optional-dependency.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
f27c0c9f284c6959dd7db1e768c6e43a518ea650afc69d7a60383f3a963cde7b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 16:42:46 GMT
server
nginx
etag
"5b5f4006-246"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
307
expires
Tue, 06 Nov 2018 18:50:50 GMT
utag.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
94 KB
19 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/418F) /
Resource Hash
37594bf5cea078e78adfeaee203437d94166b7d2c073b5c3c170a1ba730eca01

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:20:43 GMT
server
ECS (fcn/418F)
etag
"241996515"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=300
accept-ranges
bytes
content-length
19623
expires
Tue, 30 Oct 2018 18:55:50 GMT
isInternalUser.js
iicbsi-a.akamaihd.net/common/js/esi/
28 B
268 B
Script
General
Full URL
https://iicbsi-a.akamaihd.net/common/js/esi/isInternalUser.js?cb=cbsiInternal
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2a02:26f0:6c00::210:ba12 , European Union, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
Apache /
Resource Hash
3c599ef176cecdb3de25c6c36bc2945b92c12bcbc2ab03350729f4de296b53b8

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:50 GMT
Cache-Control
max-age=354243
Server
Apache
Connection
keep-alive
ETag
"fb25287978f1b619e801f164a2dfd9ea:1473886414"
Content-Length
28
Content-Type
application/x-javascript
vglnk.js
cdn.viglink.com/api/
81 KB
28 KB
Script
General
Full URL
https://cdn.viglink.com/api/vglnk.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:a20d , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
009396e873c2f93482891861160df34a0a69bd1beaad7c5fc04d8dd36e4eec44

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
cf-cache-status
HIT
x-amz-request-id
BC4F97BA1F106EBB
status
200
content-length
28397
x-amz-id-2
J8zmvgfNzG4CAbCbuLht/1b8lYutez8aSXvKTUEfg4it7wLnVKLnn+V6bClwRuRWkmHXuBQrHDM=
last-modified
Wed, 24 Oct 2018 20:32:46 GMT
server
cloudflare
etag
"8132bd22613a0bbbdd73866340c33ab1"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=1800
accept-ranges
bytes
cf-ray
472011e09fd0c2d8-FRA
expires
Tue, 30 Oct 2018 19:20:50 GMT
utag.1783.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
1 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1783.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41AA) /
Resource Hash
4d049d83eef469c1f2cc0f5df820144ff6c5eb896b4e4aa2e681a1cba7d622a9

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Wed, 15 Mar 2017 15:25:15 GMT
server
ECS (fcn/41AA)
etag
"3913321605"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1130
expires
Wed, 14 Nov 2018 18:50:50 GMT
utag.1779.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
3 KB
2 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1779.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/4197) /
Resource Hash
cd5e6512fdbb698425174148dba05f72357a3b1944413f8812c55c4025d3d562

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Mon, 11 Jul 2016 20:43:57 GMT
server
ECS (fcn/4197)
etag
"392561602"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1785
expires
Wed, 14 Nov 2018 18:50:50 GMT
utag.1782.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
1 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1782.js?utv=ut4.43.201810291720
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FA) /
Resource Hash
791b7ff5657f9c41e24adaa1f6f5a4dc51046d292b25b01a5a8d152ff4a951ac

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:20:42 GMT
server
ECS (fcn/40FA)
etag
"3447796852+gzip"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1071
expires
Wed, 14 Nov 2018 18:50:50 GMT
utag.1787.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
142 KB
48 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FA) /
Resource Hash
694d40f6c8eb9760993e74b773dbb2cf3822ccb7f14a6d28320927cc5f9bad90

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Wed, 19 Sep 2018 18:08:20 GMT
server
ECS (fcn/40FA)
etag
"2497861228"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
48637
expires
Wed, 14 Nov 2018 18:50:50 GMT
utag.1790.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
920 B
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1790.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/4199) /
Resource Hash
10113bad06fefd5698a45480ffaedd421c6e06f9dbd0d1c772b7128bbea0842d

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Mon, 01 Aug 2016 14:31:10 GMT
server
ECS (fcn/4199)
etag
"2267415266"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
872
expires
Wed, 14 Nov 2018 18:50:50 GMT
utag.1791.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
1 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1791.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/4185) /
Resource Hash
7eae865fd7c820936603897a072b7ddd77b2c74e8022160fd19792291a63fac8

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Mon, 01 Aug 2016 14:31:10 GMT
server
ECS (fcn/4185)
etag
"3334871598"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1196
expires
Wed, 14 Nov 2018 18:50:50 GMT
utag.1792.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
4 KB
2 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1792.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40E2) /
Resource Hash
dabf73474662398f4f686a1b3103542f53384dd6241e6ac13f8ba535c6372aff

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Thu, 28 Jul 2016 14:28:47 GMT
server
ECS (fcn/40E2)
etag
"2022868805"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1664
expires
Wed, 14 Nov 2018 18:50:50 GMT
utag.1797.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
931 B
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1797.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40D6) /
Resource Hash
3ff065de0d90b0510727a72c173d05652c30967c5e6561dbf1d82fa077cabb22

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Wed, 25 Jan 2017 20:07:58 GMT
server
ECS (fcn/40D6)
etag
"1907756232"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
883
expires
Wed, 14 Nov 2018 18:50:50 GMT
utag.1800.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
959 B
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1800.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41A7) /
Resource Hash
e9b3eb7f022396e969766ad5e908b21df0b646c943e149902c64de590e9549d9

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Mon, 07 Aug 2017 22:40:35 GMT
server
ECS (fcn/41A7)
etag
"3890296134"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
912
expires
Wed, 14 Nov 2018 18:50:50 GMT
article-24f3426aea-rev.js
zdnet4.cbsistatic.com/fly/js/pages/
125 KB
35 KB
Script
General
Full URL
https://zdnet4.cbsistatic.com/fly/js/pages/article-24f3426aea-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
b836eb7325ac607513eaacb51a19639451d3fb357168f991c29bd6e9d9f250af

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Thu, 11 Oct 2018 15:17:41 GMT
server
nginx
etag
W/"5bbf6995-1f441"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
35342
expires
Tue, 06 Nov 2018 18:50:50 GMT
config.json
c.go-mpulse.net/api/ Frame 11B7
2 KB
1 KB
XHR
General
Full URL
https://c.go-mpulse.net/api/config.json?key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&d=www.zdnet.com&t=5136418&v=1.571.0&if=&sl=0&si=rxvaju18rs-NaN&plugins=ConfigOverride,Continuity,PageParams,IFrameDelay,AutoXHR,SPA,Angular,Backbone,Ember,History,RT,CrossDomain,BW,PaintTiming,NavigationTiming,ResourceTiming,Memory,CACHE_RELOAD,Errors,TPAnalytics,UserTiming,LOGN&acao=
Requested by
Host: c.go-mpulse.net
URL: https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.8.11.168 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-8-11-168.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
8c798e45417a6641acfcc5467bae80774600012cc3d559ef07dd5434c3d4be5f

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com

Response headers

Date
Tue, 30 Oct 2018 18:50:50 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/json
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
private, max-age=300, stale-while-revalidate=60, stale-if-error=120
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
695
pixel.gif
cdn.viglink.com/images/
43 B
101 B
Image
General
Full URL
https://cdn.viglink.com/images/pixel.gif?ch=1&rn=4.631796973206187
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:a20d , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
89fe0ee6020314794fc2cfeacf3d10c31050cfe56f8ebddf1ed0a33fbe941fa7

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
cf-cache-status
HIT
last-modified
Tue, 10 Feb 2015 03:29:39 GMT
server
cloudflare
x-amz-request-id
16F2CAE6550D8A7A
etag
"221d8352905f2c38b3cb2bd191d630b0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=15, must-revalidate
accept-ranges
bytes
cf-ray
472011e0e8a7c2d8-FRA
content-length
43
x-amz-id-2
kn9W1C5w2RdjvPchL5jhV5QRYPujzpKW6xws+vl851eH3ychyZod7sgg6E5NuBtnLDBs+JbcXHQ=
pixel.gif
cdn.viglink.com/images/
43 B
101 B
Image
General
Full URL
https://cdn.viglink.com/images/pixel.gif?ch=2&rn=4.631796973206187
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:a20d , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
89fe0ee6020314794fc2cfeacf3d10c31050cfe56f8ebddf1ed0a33fbe941fa7

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
cf-cache-status
HIT
last-modified
Tue, 10 Feb 2015 03:29:39 GMT
server
cloudflare
x-amz-request-id
16F2CAE6550D8A7A
etag
"221d8352905f2c38b3cb2bd191d630b0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=15, must-revalidate
accept-ranges
bytes
cf-ray
472011e0e8a8c2d8-FRA
content-length
43
x-amz-id-2
kn9W1C5w2RdjvPchL5jhV5QRYPujzpKW6xws+vl851eH3ychyZod7sgg6E5NuBtnLDBs+JbcXHQ=
ds.js
dw.cbsi.com/js/cbsi/
18 KB
7 KB
Script
General
Full URL
https://dw.cbsi.com/js/cbsi/ds.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1790.js?utv=ut4.43.201805241512
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.30.224.172 Fort Lauderdale, United States, ASN6623 (CBSI-1 - CBS Interactive Inc., US),
Reverse DNS
phx1-dw-cbsi-xw-lb.cnet.com
Software
Apache/2.4.25 /
Resource Hash
d696da403b0169c2191d0ec0b0fcdaa85487b21b19fd58f4b1fb5b9edf40b153

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:50 GMT
Content-Encoding
gzip
Last-Modified
Wed, 13 Sep 2017 19:06:40 GMT
Server
Apache/2.4.25
ETag
"1917-55916dc13f000"
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=43200, s-maxage=1800
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=80, max=356
Content-Length
6423
Expires
Tue, 30 Oct 2018 19:20:50 GMT
lightbox.js
www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/ Frame 2B45
321 B
476 B
Script
General
Full URL
https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/lightbox.js?cb=1540925450386&lv=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:4ea5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
18e110ff918c99541657918aa03e2f59e43e5490ac8f7d7fa84ad19ab622db0c

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
cf-cache-status
HIT
cf-bgj
minify
server
cloudflare
x-powered-by
ASP.NET
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cf-ray
472011e0f9c6c2e7-FRA
tag.aspx
ml314.com/
23 KB
11 KB
Script
General
Full URL
https://ml314.com/tag.aspx?3092018
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1782.js?utv=ut4.43.201810291720
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.31.106.135 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-31-106-135.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
2ccd728594ce65fa7e6651109e3bbd61877e548c4dab5480cafa6965f358a4e0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:49 GMT
Content-Encoding
gzip
Last-Modified
Tue, 30 Oct 2018 18:07:43 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, max-age=83812
Connection
keep-alive
Content-Length
11039
Expires
Wed, 31 Oct 2018 18:07:43 GMT
st.v3.js
www.everestjs.net/static/
17 KB
6 KB
Script
General
Full URL
https://www.everestjs.net/static/st.v3.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.8.8.176 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-8-8-176.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
35733dd71de077b039d2bac6614c78eb3ab7d3879cb307cc10cc1907d2f61eb6

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:50 GMT
Content-Encoding
gzip
Last-Modified
Tue, 09 Oct 2018 10:27:09 GMT
Server
Apache
ETag
"12803d6-4205-577c92e263c39"
Vary
Accept-Encoding
Content-Type
text/javascript
Cache-Control
max-age=30497
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
5509
Expires
Wed, 31 Oct 2018 03:19:07 GMT
cbsinteractive.js
tru.am/scripts/custom/
2 KB
1 KB
Script
General
Full URL
https://tru.am/scripts/custom/cbsinteractive.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1797.js?utv=ut4.43.201805241512
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700:20::6819:a322 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
8a27fab6c5a0b1db438219c7d24ce2fff95e0910378fe4bdeb64b4f970eebccc

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Tue, 23 Jan 2018 19:10:31 GMT
server
cloudflare
etag
"8c3752e674fdabefc911d5c40f71780d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=14400
cf-ray
472011e0fa1997ce-FRA
expires
Tue, 30 Oct 2018 22:50:50 GMT
tag.js
js.agkn.com/prod/v0/
3 KB
3 KB
Script
General
Full URL
https://js.agkn.com/prod/v0/tag.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1800.js?utv=ut4.43.201805241512
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:200c:b600:15:efbc:e300:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
faf50b9ffe58f834c4796d588923150c2a2ed752b0d670e32293827b6038c758

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 18 Oct 2018 23:15:24 GMT
via
1.1 7c2d73d3cd46e357090188fa2946f746.cloudfront.net (CloudFront)
last-modified
Thu, 18 Oct 2018 23:14:55 GMT
server
AmazonS3
age
70522
etag
"3523ddc9e3dce225ce1cfd9244246dc3"
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
3134
x-amz-cf-id
BAJtbi_Oxw3N_aCXGhBBukwDkIqjDTAX_SrPCYdyz-SQwONaqn_dVw==
zdnet-video-62b9e41c43-rev.js
zdnet1.cbsistatic.com/fly/js/components/
23 KB
8 KB
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/components/zdnet-video-62b9e41c43-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
901fc3206be099c4dc64931428fe93dc4a2130063aaba7e94090303ded1397a0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:40:49 GMT
server
nginx
etag
W/"5bd74621-5c35"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
7534
expires
Tue, 06 Nov 2018 18:50:50 GMT
video-playlist-connector-008b49b7a1-rev.js
zdnet2.cbsistatic.com/fly/js/components/
4 KB
2 KB
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/js/components/video-playlist-connector-008b49b7a1-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
a20c788fad1957d4bcd135b761c2ede3fd3ddc4a1b9a5ed0c565be047fe7e3f0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Thu, 30 Aug 2018 18:58:31 GMT
server
nginx
etag
W/"5b883e57-1194"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
1560
expires
Tue, 06 Nov 2018 18:50:50 GMT
anonc.js
dw.cbsi.com/
73 B
620 B
Script
General
Full URL
https://dw.cbsi.com/anonc.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.30.224.172 Fort Lauderdale, United States, ASN6623 (CBSI-1 - CBS Interactive Inc., US),
Reverse DNS
phx1-dw-cbsi-xw-lb.cnet.com
Software
Apache/2.4.25 /
Resource Hash
186d5ae97a3f3a55bfe464a7e19082474f02baac61bfe640a16ec51f9d88ccbb

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:50 GMT
Server
Apache/2.4.25
Etag
fxeDYFvYqAqDMrogHq8.1.dw_anonc
P3P
CP="CAO DSP COR CURa ADMa DEVa PSAa PSDa IVAi IVDi CONi OUR OTRi IND PHY ONL UNI FIN COM NAV INT DEM STA"
Cache-control
private, max-age=43200, s-max-age=0
Connection
Keep-Alive
Content-Type
application/javascript
Keep-Alive
timeout=80, max=224
Content-Length
73
Expires
Mon, 05 Jan 1970 12:12:12 GMT
Cookie set /
d.agkn.com/iframe/8613/ Frame 71F1
0
0
Document
General
Full URL
https://d.agkn.com/iframe/8613/?che=804700676&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bpid=cbsinteractive&c=%7B%22bpid%22%3A%22cbsinteractive%22%2C%22loc%22%3A%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F%22%2C%22ref%22%3A%22-1%22%2C%22cid%22%3A%22-1%22%2C%22sid%22%3A%22-1%22%2C%22gen%22%3A%22-1%22%2C%22age%22%3A%22-1%22%2C%22cat%22%3A%22-1%22%2C%22brd%22%3A%22-1%22%7D
Requested by
Host: js.agkn.com
URL: https://js.agkn.com/prod/v0/tag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.125.127 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-125-127.compute-1.amazonaws.com
Software
Apache-Coyote/1.1 /
Resource Hash

Request headers

Host
d.agkn.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Cache-Control
no-cache, must-revalidate
Content-Type
text/html;charset=UTF-8
Date
Tue, 30 Oct 2018 18:50:50 GMT
Expires
Sat, 01 Jan 2000 00:00:00 GMT
P3P
CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Pragma
no-cache
Server
Apache-Coyote/1.1
Set-Cookie
ab=0001%3AGqHHeQZkIFM5g4b8taohxFk3a75PtiqE;Max-Age=31536000;domain=agkn.com;path=/ u=C|0AEAja2SKI2tkigAAAAAAAg1RAQCADVIBAIA;Max-Age=31536000;domain=agkn.com;path=/
Content-Length
503
Connection
keep-alive
ta-pagesocial-sdk.js
tru.am/scripts/
34 KB
14 KB
Script
General
Full URL
https://tru.am/scripts/ta-pagesocial-sdk.js
Requested by
Host: tru.am
URL: https://tru.am/scripts/custom/cbsinteractive.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700:20::6819:a322 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
fb9007c254c493be4a067de535b19a30f5e5aef3d5b19f58b1c72d2c65a04f79

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Mon, 21 May 2018 10:49:23 GMT
server
cloudflare
etag
"8761e04182a1c11ff30f706f8052c8d6"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
472011e15ab597ce-FRA
expires
Wed, 31 Oct 2018 18:50:50 GMT
uvpjs-0826cffc14-rev.js
zdnet1.cbsistatic.com/fly/js/managers/
800 B
631 B
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/managers/uvpjs-0826cffc14-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
9242cae28bc65d0b14fc566242452e05bdce12813551d6bb027c066d54bbf2f7

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Thu, 24 May 2018 15:16:43 GMT
server
nginx
etag
"5b06d75b-320"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
419
expires
Tue, 06 Nov 2018 18:50:50 GMT
video-28e1825085-rev.js
zdnet1.cbsistatic.com/fly/js/translations/
702 B
650 B
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/translations/video-28e1825085-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
f8ab45ee0969bb98916fa2ba950a26e40d4039a8d402bc661bd99ee0392edbc0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Thu, 12 Jul 2018 13:43:48 GMT
server
nginx
etag
"5b475b14-2be"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
438
expires
Tue, 06 Nov 2018 18:50:50 GMT
video-controls-039169d901-rev.js
zdnet4.cbsistatic.com/fly/js/components/
21 KB
6 KB
Script
General
Full URL
https://zdnet4.cbsistatic.com/fly/js/components/video-controls-039169d901-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
579e81f46017126d8f898dd79dc3930782f6e9e41d0537e9050310cc8dadc73e

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Tue, 16 Oct 2018 16:40:20 GMT
server
nginx
etag
W/"5bc61474-52f1"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
5619
expires
Tue, 06 Nov 2018 18:50:50 GMT
swfobject-c3dea6a493-rev.js
zdnet3.cbsistatic.com/fly/js/components/
9 KB
4 KB
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/js/components/swfobject-c3dea6a493-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
40c707d407e524f6e535fe307be27c3d79067da9cbf8fa9eef3c9ec1933e12df

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Tue, 04 Sep 2018 15:22:12 GMT
server
nginx
etag
W/"5b8ea324-245c"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
3904
expires
Tue, 06 Nov 2018 18:50:50 GMT
user.js
www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/ Frame 2B45
551 KB
120 KB
Script
General
Full URL
https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/user.js?cb=636754604557185965
Requested by
Host: www.lightboxcdn.com
URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/lightbox.js?cb=1540925450386&lv=1
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:4ea5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
3544c18bb4d954e8f42793b40c495a703718155222054639fd3be53139e0a363

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
cf-cache-status
HIT
content-md5
BsS3lyySk0m16t32fpLXVA==
cf-polished
origSize=915904
status
200
last-modified
Mon, 15 Oct 2018 20:59:40 GMT
x-ms-lease-status
unlocked
cf-bgj
minify
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
x-ms-request-id
54cc4450-d01e-00ca-094a-6ac60c000000
cache-control
public, max-age=31536000
x-ms-version
2009-09-19
cf-ray
472011e14ac2c2e7-FRA
expires
Wed, 30 Oct 2019 18:50:50 GMT
utsync.ashx
ml314.com/
906 B
1 KB
Script
General
Full URL
https://ml314.com/utsync.ashx?pub=&adv=&et=0&eid=50070&ct=js&pi=&fp=&clid=&ps=&cl=&mlt=&data=&&cp=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&pv=1540925450448_vz23ofkk9&bl=en-us&cb=6214153&return=https%3A%2F%2Fdpm.demdex.net%2Fibs%3Adpid%3D22052%26dpuuid%3D%5BPersonID%5D%26redir%3D&ht=&d=&dc=&si=1540925450448_vz23ofkk9&cid=7cae3897-1371-4826-8d8e-bfbd8614339a&s=1600x1200&rp=
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?3092018
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.31.106.135 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-31-106-135.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
6667fe8af997ba88c399a7714a82f23f461617aa499a5c8fa0cb198d8b4f8637

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:49 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
p3P
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
Cache-Control
private
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Content-Length
520
Expires
0
ud.ashx
in.ml314.com/
20 B
698 B
Script
General
Full URL
https://in.ml314.com/ud.ashx?topiclimit=&cb=3092018
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?3092018
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.208.143.184 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-208-143-184.compute-1.amazonaws.com
Software
Microsoft-IIS/8.5 / ASP.NET
Resource Hash
d0e4a6372d6fb5ffe9505dbe9e94aee8f1b9b96ec8e5e20684cce8b4c5a88fa7

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:50 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/8.5
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, no-cache="set-cookie"
Connection
keep-alive
Content-Length
138
Expires
Wed, 31 Oct 2018 18:50:50 GMT
mpulse-1.0.2.js
zdnet1.cbsistatic.com/fly/js/libs/
12 KB
5 KB
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/libs/mpulse-1.0.2.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
763fa0bd7eff816d0a5f8c3e4075f9173a5cebf51a1e2c0d1174f841de10b9dd

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Wed, 30 May 2018 18:14:04 GMT
server
nginx
etag
"5b0ee9ec-2fdf"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
4822
expires
Tue, 06 Nov 2018 18:50:50 GMT
ad-ef5cb79eaf-rev.js
zdnet2.cbsistatic.com/fly/js/managers/
7 KB
3 KB
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/js/managers/ad-ef5cb79eaf-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
56bf714084093ce2762a223acbaee3f925b631b6fb24aee9f2f96c09bcc94c66

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Thu, 09 Aug 2018 17:36:29 GMT
server
nginx
etag
W/"5b6c7b9d-1ad5"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
2431
expires
Tue, 06 Nov 2018 18:50:50 GMT
jquery.ui.position-1.9.2.js
zdnet3.cbsistatic.com/fly/js/libs/jquery/ui/
7 KB
3 KB
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/js/libs/jquery/ui/jquery.ui.position-1.9.2.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
ee221041a905f4b0fbe76dc05e44575523fd26a93f9e038bcb19d16e4155ee5b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Tue, 07 Aug 2018 13:46:06 GMT
server
nginx
etag
W/"5b69a29e-1a3e"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
2661
expires
Tue, 06 Nov 2018 18:50:50 GMT
jquery.ui.draggable-1.9.2.js
zdnet4.cbsistatic.com/fly/js/libs/jquery/ui/
18 KB
5 KB
Script
General
Full URL
https://zdnet4.cbsistatic.com/fly/js/libs/jquery/ui/jquery.ui.draggable-1.9.2.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
6d4dc28c491ca7ff1c86fa292821d3174e2c7638170628e1daa411da61d10684

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Tue, 07 Aug 2018 13:46:06 GMT
server
nginx
etag
W/"5b69a29e-48d5"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
4875
expires
Tue, 06 Nov 2018 18:50:50 GMT
CBSI-PLAYER.js
vidtech.cbsinteractive.com/uvpjs/2.8.3/
760 KB
203 KB
Script
General
Full URL
https://vidtech.cbsinteractive.com/uvpjs/2.8.3/CBSI-PLAYER.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
1491a1594a4058a62ea4c08441cfcbbfe82a0916b4f26b55f3605af896766dd7

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Mon, 26 Mar 2018 15:42:34 GMT
server
Apache
etag
"ffe80da4a589534ffbb17f46d6ef50a3:1522078954"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=2592000
accept-ranges
bytes
expires
Thu, 29 Nov 2018 18:50:50 GMT
autoplay-controls-e5333d6243-rev.js
zdnet3.cbsistatic.com/fly/js/components/
3 KB
1 KB
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/js/components/autoplay-controls-e5333d6243-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
40d317f999e71c7635619879cf4c5901505ea487011a00a220e560996f7557b1

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Tue, 16 Oct 2018 16:40:19 GMT
server
nginx
etag
W/"5bc61473-c8d"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
1149
expires
Tue, 06 Nov 2018 18:50:50 GMT
config.json
c.go-mpulse.net/api/v2/
2 KB
1 KB
XHR
General
Full URL
https://c.go-mpulse.net/api/v2/config.json?key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&t=1540925450470&s=e166b373830a7c170498a476003f0473a8cc9f3718e51edde66b62c6716b614b
Requested by
Host: zdnet1.cbsistatic.com
URL: https://zdnet1.cbsistatic.com/fly/js/libs/mpulse-1.0.2.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.8.11.168 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-8-11-168.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
be8e987ae578c972570cee24fd90c5572040dc2d18568a2843e2795459b8b529

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com

Response headers

Date
Tue, 30 Oct 2018 18:50:50 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
private, max-age=300, stale-while-revalidate=60, stale-if-error=120
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
717
jquery.ui.slider-1.9.2.js
zdnet1.cbsistatic.com/fly/js/libs/jquery/ui/
10 KB
3 KB
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/libs/jquery/ui/jquery.ui.slider-1.9.2.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
fa107680c3e0cfd1620aebe62462103703993ada997d84aa6d5f55ce0ea3cba0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Tue, 07 Aug 2018 13:46:06 GMT
server
nginx
etag
W/"5b69a29e-278e"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
2914
expires
Tue, 06 Nov 2018 18:50:50 GMT
ad-2.0.js
zdnet3.cbsistatic.com/fly/bundles/flyjs/js/managers/
19 KB
5 KB
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/bundles/flyjs/js/managers/ad-2.0.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
de749bdbeeb7bb7f79cb31ff00fe6830004064419f73fe9a6ec982e9de8bf19d

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Thu, 19 Apr 2018 09:47:08 GMT
server
nginx
etag
"5ad8659c-4c22"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
4885
expires
Tue, 06 Nov 2018 18:50:50 GMT
jquery.ui.core-1.9.2.js
zdnet3.cbsistatic.com/fly/js/libs/jquery/ui/
5 KB
2 KB
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/js/libs/jquery/ui/jquery.ui.core-1.9.2.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
965b325924d7bd803f6fb1007b982eeb412ebfd696a20986fd4e6bc221daf413

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Tue, 07 Aug 2018 13:46:06 GMT
server
nginx
etag
W/"5b69a29e-128b"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
2096
expires
Tue, 06 Nov 2018 18:50:50 GMT
jquery.ui.mouse-1.9.2.js
zdnet4.cbsistatic.com/fly/js/libs/jquery/ui/
3 KB
1 KB
Script
General
Full URL
https://zdnet4.cbsistatic.com/fly/js/libs/jquery/ui/jquery.ui.mouse-1.9.2.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
ddfc91f954a7df70ddb1b6d0265eb1792d1c7922d50463d968159e7a4403fb1c

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Tue, 07 Aug 2018 13:46:06 GMT
server
nginx
etag
W/"5b69a29e-bca"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
1002
expires
Tue, 06 Nov 2018 18:50:50 GMT
beacon
beacon.tru.am/
17 B
213 B
Fetch
General
Full URL
https://beacon.tru.am/beacon
Requested by
Host: tru.am
URL: https://tru.am/scripts/ta-pagesocial-sdk.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700:20::6819:a322 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
27676ea482895bdddd3f3796f430a812e11364efc224227c86973a52398966c2

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded;charset=UTF-8

Response headers

pragma
no-cache
date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
server
cloudflare
status
200
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, private, max-age=0
cf-ray
472011e199629720-FRA
content-length
41
expires
Thu, 01 Jan 1970 00:00:00 UTC
csync.ashx
ml314.com/
Redirect Chain
  • https://tags.bluekai.com/site/20486?limit=0&id=5978151442409083984&redir=https://ml314.com/csync.ashx%3Ffp=$_BK_UUID%26person_id=5978151442409083984%26eid=50056
  • https://tags.bluekai.com/site/20486?dt=0&r=772134994&sig=1520996108&bkca=KJpn0zpBnnWND1+1LEVNBnzyBeD61EW01q96LeYt+eOHv6oB0u00puQovuit6+4wpEWtBBanpLdPE0brpWFVu0pm3a9N5ALgLaVJ5dvmeylN5aWN1i+/nugmpTFc...
  • https://ml314.com/csync.ashx?fp=ENpaHy999991IBCq&person_id=5978151442409083984&eid=50056
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=ENpaHy999991IBCq&person_id=5978151442409083984&eid=50056
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.31.106.135 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-31-106-135.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:50 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Wed, 31 Oct 2018 14:50:50 GMT

Redirect headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:50 GMT
P3P
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV", policyref="http://tags.bluekai.com/w3c/p3p.xml"
Location
https://ml314.com/csync.ashx?fp=ENpaHy999991IBCq&person_id=5978151442409083984&eid=50056
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Content-Length
0
BK-Server
5561
Expires
Thu, 01 Dec 1994 16:00:00 GMT
csync.ashx
ml314.com/
Redirect Chain
  • https://idsync.rlcdn.com/395886.gif?partner_uid=5978151442409083984
  • https://idsync.rlcdn.com/1000.gif?memo=CO6UGBIeChoIARCuXxoTNTk3ODE1MTQ0MjQwOTA4Mzk4NBAAGg0IitDi3gUSBQjoBxAAQgBKAA
  • https://ml314.com/csync.ashx?fp=&person_id=5978151442409083984&eid=50082
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=&person_id=5978151442409083984&eid=50082
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.31.106.135 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-31-106-135.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:50 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Wed, 31 Oct 2018 14:50:50 GMT

Redirect headers

status
307
date
Tue, 30 Oct 2018 18:50:50 GMT
cache-control
no-cache, no-store
timing-allow-origin
*
content-length
0
location
https://ml314.com/csync.ashx?fp=&person_id=5978151442409083984&eid=50082
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
csync.ashx
ml314.com/
Redirect Chain
  • https://pixel.mathtag.com/sync/img?redir=https://ml314.com/csync.ashx%3Ffp=[MM_UUID]%26person_id=5978151442409083984%26eid=50220
  • https://pixel.mathtag.com/sync/img?redir=https://ml314.com/csync.ashx%3Ffp=[MM_UUID]%26person_id=5978151442409083984%26eid=50220&mm_bnc&mm_bct
  • https://ml314.com/csync.ashx?fp=d0415bd8-9eef-4400-b6de-a5c82e7ff8d8&person_id=5978151442409083984&eid=50220
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=d0415bd8-9eef-4400-b6de-a5c82e7ff8d8&person_id=5978151442409083984&eid=50220
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.31.106.135 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-31-106-135.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:50 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Wed, 31 Oct 2018 14:50:50 GMT

Redirect headers

Date
Tue, 30 Oct 2018 18:50:50 GMT
Server
MT3 1.26.12.0 f85fe72 RELEASE zrh-pixel-x16
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Location
https://ml314.com/csync.ashx?fp=d0415bd8-9eef-4400-b6de-a5c82e7ff8d8&person_id=5978151442409083984&eid=50220
Cache-Control
no-cache
Connection
keep-alive
Content-Type
image/gif
Content-Length
0
Expires
Tue, 30 Oct 2018 18:50:49 GMT
csync.ashx
ml314.com/
Redirect Chain
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D5978151442409083984
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D5978151442409083984
  • https://ml314.com/csync.ashx?fp=6f47558b63642657a256c2fffef5f385&eid=50146&person_id=5978151442409083984
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=6f47558b63642657a256c2fffef5f385&eid=50146&person_id=5978151442409083984
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.31.106.135 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-31-106-135.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:50 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Wed, 31 Oct 2018 14:50:50 GMT

Redirect headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:50 GMT
P3P
CP=NOI DSP COR NID PSAa PSDa OUR UNI COM NAV
Location
https://ml314.com/csync.ashx?fp=6f47558b63642657a256c2fffef5f385&eid=50146&person_id=5978151442409083984
Cache-Control
no-cache
X-Server
10.26.14.86
Connection
keep-alive
Content-Length
0
Expires
Thu, 01 Jan 1970 00:00:00 GMT
match
ps.eyeota.net/
Redirect Chain
  • https://ps.eyeota.net/pixel?pid=r8hrb20&t=gif
  • https://ps.eyeota.net/pixel/bounce/?pid=r8hrb20&t=gif
  • https://ml314.com/utsync.ashx?eid=50052&et=0&fp=2gD5lv3gtP4Ryo-j3aZeXyC2pWGxOIfv2Q25Ik6hzlDU&return=https%3A%2F%2Fps.eyeota.net%2Fmatch%3Fbid%3Dr8hrb20%26uid%3Dnil
  • https://ml314.com/csync.ashx?fp=2gD5lv3gtP4Ryo-j3aZeXyC2pWGxOIfv2Q25Ik6hzlDU&person_id=5978151442409083984&eid=50052&return=https%3a%2f%2fps.eyeota.net%2fmatch%3fbid%3dr8hrb20%26uid%3dnil
  • https://ps.eyeota.net/match?bid=r8hrb20&uid=nil
70 B
171 B
Image
General
Full URL
https://ps.eyeota.net/match?bid=r8hrb20&uid=nil
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
35.157.74.177 Frankfurt, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-157-74-177.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
de9d3fd0eb948bd294477d0eda60a73b85caff1794803530d0463193a113da98

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:50 GMT
Content-Length
70
Content-Type
image/gif

Redirect headers

Date
Tue, 30 Oct 2018 18:50:49 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
text/html; charset=utf-8
Location
https://ps.eyeota.net/match?bid=r8hrb20&uid=nil
Cache-Control
private
Connection
keep-alive
Content-Length
168
Expires
Wed, 31 Oct 2018 14:50:50 GMT
demconf.jpg
dpm.demdex.net/
Redirect Chain
  • https://dpm.demdex.net/ibs:dpid=22052&dpuuid=5978151442409083984&redir=
  • https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=5978151442409083984&redir=
42 B
769 B
Image
General
Full URL
https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=5978151442409083984&redir=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.247.143.160 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-247-143-160.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

DCS
dcs-prod-irl1-v006-0f1850aa8.edge-irl1.demdex.com 5.41.0.20181011114220 5ms
Pragma
no-cache
X-TID
yeeQ22MkT34=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT

Redirect headers

Pragma
no-cache
X-TID
w+GLwN1jSXk=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Location
https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=5978151442409083984&redir=
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Length
0
Expires
Thu, 01 Jan 1970 00:00:00 GMT
gpt-4.3.js
zdnet4.cbsistatic.com/fly/bundles/flyjs/js/managers/
52 KB
10 KB
Script
General
Full URL
https://zdnet4.cbsistatic.com/fly/bundles/flyjs/js/managers/gpt-4.3.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
d48e0904f1b40972f1fc6dac3f358719e080fab3291d13d2ca4a60405707a88b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
last-modified
Thu, 19 Apr 2018 09:47:08 GMT
server
nginx
etag
"5ad8659c-d143"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
10133
expires
Tue, 06 Nov 2018 18:50:50 GMT
fb_digioh.2.1.5.css
www.lightboxcdn.com/static/
4 KB
1 KB
Stylesheet
General
Full URL
https://www.lightboxcdn.com/static/fb_digioh.2.1.5.css?cb=636752339805538198
Requested by
Host: www.lightboxcdn.com
URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/user.js?cb=636754604557185965
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:4ea5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
802446cd0aefe1f43030cf3e02eddbbbec61e27e62479d990d8889266943a650

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Tue, 30 Oct 2018 18:50:50 GMT
content-encoding
gzip
cf-cache-status
HIT
content-md5
SPXkOHRrmvkdtUVAkMsWtg==
cf-polished
origSize=5365
status
200
last-modified
Thu, 22 Jun 2017 21:54:44 GMT
x-ms-lease-status
unlocked
cf-bgj
minify
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
x-ms-request-id
80c90c48-e01e-00e0-4e47-65b349000000
cache-control
public, max-age=31536000
x-ms-version
2009-09-19
cf-ray
472011e1dc8fc2e7-FRA
expires
Wed, 30 Oct 2019 18:50:50 GMT
id
dpm.demdex.net/
2 KB
1 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=2.3.0&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_orgid=10D31225525FF5790A490D4D%40AdobeOrg&d_nsid=0&ts=1540925450685
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.247.143.160 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-247-143-160.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
6f80ea30fb31632d52c828138baf8578d07da8b27a6145511cca96c16834f258

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v006-01312766b.edge-irl1.demdex.com 5.41.0.20181011114220 5ms
Pragma
no-cache
Content-Encoding
gzip
X-TID
VMf0QR16SUs=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
701
Expires
Thu, 01 Jan 1970 00:00:00 GMT
utag.v.js
tags.tiqcdn.com/utag/tiqapp/
2 B
69 B
Script
General
Full URL
https://tags.tiqcdn.com/utag/tiqapp/utag.v.js?a=cbsi/zdnetglobalsite/201810291711&cb=1540925450687
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FB) /
Resource Hash
a2c2339691fc48fbd14fb307292dff3e21222712d9240810742d7df0c6d74dfb

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:50 GMT
last-modified
Thu, 14 Apr 2016 16:59:33 GMT
server
ECS (fcn/40FB)
etag
"2243872957"
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=600
accept-ranges
bytes
content-length
2
expires
Tue, 30 Oct 2018 19:00:50 GMT
c.gif
dw.cbsi.com/clear/
42 B
346 B
Image
General
Full URL
https://dw.cbsi.com/clear/c.gif?rsid=cnetzdnetglobalsite&sid=2&siteid=2&pagetype=article&assetguid=7a12161d-2a5f-4793-b0a4-9fac038733de&assettitle=gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20brazilian%20banks&assettype=content_article&pubdate=2018-10-01%2004%3A20%3A22&viewguid=7cae3897-1371-4826-8d8e-bfbd8614339a&devicetype=desktop&sitetype=responsive%20web&author=catalin%20cimpanu&authorid=85fd8691-f525-4ea2-a601-af296f629f7f&topicguid=113c25b6-ec91-11e3-95d2-02911863765e&topic=security&topicbrcrm=security&ts=1540925450563&ld=www.zdnet.com&ldc=30a3f4c2-beb4-4744-8a81-f73f949d4ccc&brwinsz=1600x1200&brscrsz=1600x1200&brlang=en-US&tcset=utf8&im=dsjs&clgf=fxeDYFvYqAqDMrogHq8&srcurl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&title=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.30.224.172 Fort Lauderdale, United States, ASN6623 (CBSI-1 - CBS Interactive Inc., US),
Reverse DNS
phx1-dw-cbsi-xw-lb.cnet.com
Software
Apache/2.4.25 /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:50 GMT
Server
Apache/2.4.25
Vary
*
Content-Type
image/gif
Cache-control
no-cache, must-revalidate, no-transform
Connection
Keep-Alive
Keep-Alive
timeout=80, max=666
Content-Length
42
Expires
Mon, 05 Jan 1970 12:12:12 GMT
Cookie set dest5.html
cbsi.demdex.net/ Frame DC62
0
0
Document
General
Full URL
https://cbsi.demdex.net/dest5.html?d_nsid=undefined
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.86.186 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-86-186.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash

Request headers

Host
cbsi.demdex.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Cookie
demdex=42368779027364773391084610354461960579
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Accept-Ranges
bytes
Cache-Control
max-age=21600
Content-Encoding
gzip
Content-Type
text/html
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified
Tue, 23 Oct 2018 15:19:14 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Pragma
no-cache
Set-Cookie
demdex=42368779027364773391084610354461960579;Path=/;Domain=.demdex.net;Expires=Sun, 28-Apr-2019 18:50:50 GMT;Max-Age=15552000
Vary
Accept-Encoding, User-Agent
X-TID
DVTI5BdzTD4=
Content-Length
2766
Connection
keep-alive
id
saa.cbsi.com/
90 B
711 B
XHR
General
Full URL
https://saa.cbsi.com/id?d_visid_ver=2.3.0&d_fieldgroup=A&mcorgid=10D31225525FF5790A490D4D%40AdobeOrg&mid=42232163989227135711106414016823143675&ts=1540925450728
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.140.43.37 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
cbsi.com.ssl.sc.omtrdc.net
Software
Omniture DC /
Resource Hash
6f572e99bf7e449f7e0876367eff1d67b183c9c51c8ed159c4232c8f5deedf44
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Date
Tue, 30 Oct 2018 18:50:50 GMT
X-Content-Type-Options
nosniff
Server
Omniture DC
xserver
www296
Vary
Origin
X-C
ms-6.5.1
P3P
CP="This is not a P3P policy"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/x-javascript
Keep-Alive
timeout=15
Content-Length
90
X-XSS-Protection
1; mode=block
id
dpm.demdex.net/
2 KB
1 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=2.3.0&d_fieldgroup=AAM&d_rtbd=json&d_ver=2&d_orgid=10D31225525FF5790A490D4D%40AdobeOrg&d_nsid=0&d_mid=42232163989227135711106414016823143675&d_blob=RKhpRz8krg2tLO6pguXWp5olkAcUniQYPHaMWWgdJ3xzPWQmdj0y&d_cid_ic=AVID%012DEC540505313241-6000012C00000455&ts=1540925450754
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.247.143.160 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-247-143-160.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
412ad62e10bff6c9114872d49d6611403306831606413770eb3958a9f584c94e

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v006-04ace4aa1.edge-irl1.demdex.com 5.41.0.20181011114220 8ms
Pragma
no-cache
Content-Encoding
gzip
X-TID
/3h+EEgtTgE=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
702
Expires
Thu, 01 Jan 1970 00:00:00 GMT
s86291141901077
saa.cbsi.com/b/ss/cnetzdnetglobalsite/10/JS-2.3.0/
2 KB
2 KB
Script
General
Full URL
https://saa.cbsi.com/b/ss/cnetzdnetglobalsite/10/JS-2.3.0/s86291141901077?AQB=1&ndh=1&pf=1&callback=s_c_il[0].doPostbacks&et=1&t=30%2F9%2F2018%2018%3A50%3A50%202%200&d.&nsid=0&jsonv=1&.d&mid=42232163989227135711106414016823143675&aid=2DEC540505313241-6000012C00000455&aamlh=6&ce=UTF-8&ns=cbsinteractive&pageName=zdnet%3A%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&g=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&cc=USD&ch=editorial&server=www.zdnet.com&aamb=RKhpRz8krg2tLO6pguXWp5olkAcUniQYPHaMWWgdJ3xzPWQmdj0y&c1=zdnet&v1=zdnet&h1=editorial%7Carticle&c2=D%3Dv2&v2=eu&l2=113c25b6-ec91-11e3-95d2-02911863765e%7C54795830-f620-4b12-bd83-5740537be838&c3=D%3Dv3&v3=responsive%20web%7Cdesktop&l3=85fd8691-f525-4ea2-a601-af296f629f7f&c4=D%3Dv4&c5=D%3Dv5&v5=cnetzdnetglobalsite&c6=D%3Dv6&v6=editorial%7Carticle&c7=D%3Dv7&v7=D%3Dg&c8=D%3Dv8&v8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c9=D%3DUser-Agent&c10=D%3Dv10&v10=article&c11=D%3Dv11&v11=D%3Dch%2B%22%3A%22%2Bv10&v15=not%20authenticated%7Canon&c20=D%3Dv20&v20=gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20brazilian%20banks&c22=D%3Dv22&v22=content_article&c23=D%3Dv23&v23=113c25b6-ec91-11e3-95d2-02911863765e&c24=D%3Dv24&v24=7cae3897-1371-4826-8d8e-bfbd8614339a&c25=D%3Dv25&c26=D%3Dv26&v26=bfccdd23-ed4a-11e3-95d2-02911863765e&c28=D%3Dv28&c30=D%3Dv30&v30=7a12161d-2a5f-4793-b0a4-9fac038733de&c31=D%3Dv31&c33=D%3Dv33&c34=D%3Dv34&c35=D%3Dv35&v35=fxeDYFvYqAqDMrogHq8&v44=zdnet&c50=D%3Dv50&v50=2%3A30PM&c51=D%3Dv51&v51=Tuesday&c52=D%3Dv52&v52=1&c53=D%3Dv53&v53=New&c54=D%3Dv54&v54=First%20Visit&c65=D%3Dv65&v65=discover&c69=D%3Dv69&v85=true&s=1600x1200&c=24&j=1.6&v=N&k=Y&bw=1600&bh=1200&mcorgid=10D31225525FF5790A490D4D%40AdobeOrg&AQE=1
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.140.43.37 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
cbsi.com.ssl.sc.omtrdc.net
Software
Omniture DC/2.0.0 /
Resource Hash
1435a8c1ac21709df67640c785b93fb59be338b45d5d7e0045016d6a1e5a7037
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

X-AAM-TID
KWu2GA5dQx0=
Date
Tue, 30 Oct 2018 18:50:50 GMT
X-Content-Type-Options
nosniff
X-C
ms-6.5.1
P3P
CP="This is not a P3P policy"
Connection
Keep-Alive
Content-Length
1721
X-XSS-Protection
1; mode=block
DCS
dcs-prod-irl1-v006-0c00c14d5.edge-irl1.demdex.com 5.41.0.20181011114220 20ms
Pragma
no-cache
Last-Modified
Wed, 31 Oct 2018 18:50:50 GMT
Server
Omniture DC/2.0.0
xserver
www248
ETag
"3309112206749138944-4803618030892358200"
Vary
*
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Keep-Alive
timeout=15
Expires
Mon, 29 Oct 2018 18:50:50 GMT
ping
api.viglink.com/api/
265 B
711 B
XHR
General
Full URL
https://api.viglink.com/api/ping
Requested by
Host: cdn.viglink.com
URL: https://cdn.viglink.com/api/vglnk.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.175.204 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-175-204.eu-west-1.compute.amazonaws.com
Software
Apache-Coyote/1.1 /
Resource Hash
04eb8536ca0f58241bbbe420e464d93a1f33f40b3e8b55fb7ae0c9c2bd6efda5

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:50 GMT
Server
Apache-Coyote/1.1
P3P
CP="ALL IND DSP COR CUR ADM TAIo PSDo OUR COM INT NAV PUR STA UNI"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript;charset=UTF-8
Content-Length
265
Expires
Thu, 01 Jan 1970 00:00:00 GMT
/
364bf6be.akstat.io/
0
354 B
XHR
General
Full URL
https://364bf6be.akstat.io/?h.pg=article&when=1540925450912&t_other=custom4%7C2317&d=zdnet.com&h.key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&h.d=zdnet.com&h.cr=23b1e492ee59f57a6b1b97c2a455e1725abb6c91&h.t=1540925450488&http.initiator=api&rt.start=api&rt.si=e879c837-78e3-4f89-84d2-6e21f4c2f54e&rt.ss=1540925453501&rt.sl=0&api=1&api.v=2&api.l=js&api.lv=0.0.1
Requested by
Host: zdnet1.cbsistatic.com
URL: https://zdnet1.cbsistatic.com/fly/js/libs/mpulse-1.0.2.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.8.11.168 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-8-11-168.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:50 GMT
Content-Type
image/gif
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
X-XSS-Protection
0
Expires
Tue, 30 Oct 2018 18:50:50 GMT
domains
api.viglink.com/api/
76 B
521 B
XHR
General
Full URL
https://api.viglink.com/api/domains
Requested by
Host: cdn.viglink.com
URL: https://cdn.viglink.com/api/vglnk.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.175.204 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-175-204.eu-west-1.compute.amazonaws.com
Software
Apache-Coyote/1.1 /
Resource Hash
b67b7666322361718a9521f0dad769bc8dc0ff61fa2dcaf4768ad69dd76ba0f1

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:50 GMT
Server
Apache-Coyote/1.1
P3P
CP="ALL IND DSP COR CUR ADM TAIo PSDo OUR COM INT NAV PUR STA UNI"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript;charset=UTF-8
Content-Length
76
Expires
Thu, 01 Jan 1970 00:00:00 GMT
nr-1099.min.js
js-agent.newrelic.com/
23 KB
9 KB
Script
General
Full URL
https://js-agent.newrelic.com/nr-1099.min.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.110 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
685e511070d7d36ad071ea39c387547c95bf064727890a3e9abf1d0283184794

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
x-amz-request-id
0F91A44CB8BB51BA
x-cache
HIT
status
200
content-length
9139
x-amz-id-2
1kVBDajyPe9yNfvcIt7CQoQq0Tgjcvk5nnkBUcfzhmZSMr1SxtHUg5CkTFq+7J8h180I4bkn1Zg=
x-served-by
cache-fra19138-FRA
last-modified
Tue, 02 Oct 2018 02:58:53 GMT
server
AmazonS3
x-timer
S1540925451.468620,VS0,VE0
etag
"eed931ffe2a555a310715cf8678d32f5"
vary
Accept-Encoding
content-type
application/javascript
via
1.1 varnish
cache-control
public, max-age=7200, stale-if-error=604800
accept-ranges
bytes
x-cache-hits
7260
measure.min.js
asset.pagefair.com/
11 KB
4 KB
Script
General
Full URL
https://asset.pagefair.com/measure.min.js?_=1540925451466
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1531-fly/js/main.default.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
94.31.29.248 , United Kingdom, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
94.31.29.248.IPYX-077437-ZYO.above.net
Software
NetDNA-cache/2.2 /
Resource Hash
6ac72fa11e76ea6fdbb1b310f67b3b9b24c11da94774a89323b71930ae544eee

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
last-modified
Mon, 11 Jun 2018 11:42:29 GMT
server
NetDNA-cache/2.2
x-amz-request-id
D66C4294114FE1E2
etag
W/"5631e8df5abfee420cd07a2737665a78"
x-cache
MISS
content-type
application/x-javascript
status
200
cache-control
max-age=86400
x-amz-id-2
vr3dkbOw2A7OdxYZ+FHXcegfC1GZ5TYqVoxe211Qdkxm+HyJc0tLyx8TK44az1vhMKhMiBjNPyg=
expires
Wed, 31 Oct 2018 18:50:51 GMT
ads.min.js
asset.pagefair.net/
0
347 B
Script
General
Full URL
https://asset.pagefair.net/ads.min.js?_=1540925451466
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1531-fly/js/main.default.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.161.188.128 Los Angeles, United States, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
last-modified
Fri, 09 Mar 2018 17:19:02 GMT
server
NetDNA-cache/2.2
x-amz-request-id
1ED30B214515E918
etag
"263dfc0b0e2e32b880781aa6f238a031"
x-cache
MISS
content-type
application/x-javascript
status
200
cache-control
max-age=7200
accept-ranges
bytes
content-length
31
x-amz-id-2
miizruzem0XUQxgXB3dbTFu081m36gm8W7tKe+aPNJ4Ihoy5fPNDkQr+tGq9kRlzrnD2PiPsbv8=
jpt
secure.adnxs.com/
0
683 B
XHR
General
Full URL
https://secure.adnxs.com/jpt?id=11834629&size=728x90&callback=headertag.AppNexusHtb.adResponseCallback&callback_uid=OkdMKRYj&psa=0&promo_sizes=970x250&referrer=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.216 , European Union, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
Software
nginx/1.13.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:53 GMT
X-Proxy-Origin
148.251.45.254; 148.251.45.254; 312.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.223.84:80
AN-X-Request-Uuid
093fc1a3-f486-48cd-ae42-77cede41633b
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
jpt
secure.adnxs.com/
0
683 B
XHR
General
Full URL
https://secure.adnxs.com/jpt?id=11834625&size=300x250&callback=headertag.AppNexusHtb.adResponseCallback&callback_uid=xSCRGlxW&psa=0&referrer=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.216 , European Union, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
Software
nginx/1.13.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:53 GMT
X-Proxy-Origin
148.251.45.254; 148.251.45.254; 312.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.75:80
AN-X-Request-Uuid
a391f2b6-9ad6-4a0c-8315-1c30c6682218
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
jpt
secure.adnxs.com/
0
684 B
XHR
General
Full URL
https://secure.adnxs.com/jpt?id=11834627&size=300x250&callback=headertag.AppNexusHtb.adResponseCallback&callback_uid=WVqkxJmQ&psa=0&referrer=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.216 , European Union, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
Software
nginx/1.13.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:53 GMT
X-Proxy-Origin
148.251.45.254; 148.251.45.254; 312.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.116:80
AN-X-Request-Uuid
ed8b28e5-6b94-4009-9977-e42c28fa3740
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
jpt
secure.adnxs.com/
0
684 B
XHR
General
Full URL
https://secure.adnxs.com/jpt?id=11834631&size=300x250&callback=headertag.AppNexusHtb.adResponseCallback&callback_uid=HsFQE15o&psa=0&promo_sizes=300x600&referrer=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.216 , European Union, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
Software
nginx/1.13.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:53 GMT
X-Proxy-Origin
148.251.45.254; 148.251.45.254; 312.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.223.239:80
AN-X-Request-Uuid
3378f137-3265-4689-923c-af7cf22319f4
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
jpt
secure.adnxs.com/
0
683 B
XHR
General
Full URL
https://secure.adnxs.com/jpt?id=11834632&size=728x90&callback=headertag.AppNexusHtb.adResponseCallback&callback_uid=exlhMgLt&psa=0&promo_sizes=970x250&referrer=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.216 , European Union, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
Software
nginx/1.13.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:53 GMT
X-Proxy-Origin
148.251.45.254; 148.251.45.254; 312.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.75:80
AN-X-Request-Uuid
a9bf7ba2-baea-43a7-acbd-86eef7836681
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
cygnus
as-sec.casalemedia.com/
66 B
1001 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=182823&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A31213603%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22202%22%2C%22siteID%22%3A%22182829%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22220%22%2C%22siteID%22%3A%22183316%22%7D%2C%22id%22%3A%222%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22209%22%2C%22siteID%22%3A%22182828%22%7D%2C%22id%22%3A%223%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22210%22%2C%22siteID%22%3A%22182826%22%7D%2C%22id%22%3A%224%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22208%22%2C%22siteID%22%3A%22182824%22%7D%2C%22id%22%3A%225%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22222%22%2C%22siteID%22%3A%22182825%22%7D%2C%22id%22%3A%226%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22219%22%2C%22siteID%22%3A%22183315%22%7D%2C%22id%22%3A%227%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22201%22%2C%22siteID%22%3A%22182823%22%7D%2C%22id%22%3A%228%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%2C%22user%22%3A%7B%22eids%22%3A%5B%7B%22source%22%3A%22adserver.org%22%2C%22uids%22%3A%5B%7B%22id%22%3A%22c3242e8f-16bd-43f3-aeb5-697f563918da%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID%22%7D%7D%2C%7B%22id%22%3A%22FALSE%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_LOOKUP%22%7D%7D%2C%7B%22id%22%3A%222018-10-30T18%3A50%3A50%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_CREATED_AT%22%7D%7D%5D%7D%5D%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.123.187.90 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a92-123-187-90.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
8438345dd543d64907f9002b7f41cb4f883112e17f5de43d49d9f7a286b16c43

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:51 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript
Content-Length
86
Expires
Tue, 30 Oct 2018 18:50:51 GMT
vglnk.js
cdn.viglink.com/api/
81 KB
28 KB
Script
General
Full URL
https://cdn.viglink.com/api/vglnk.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:a20d , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
009396e873c2f93482891861160df34a0a69bd1beaad7c5fc04d8dd36e4eec44

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
cf-cache-status
HIT
x-amz-request-id
BC4F97BA1F106EBB
status
200
content-length
28397
x-amz-id-2
J8zmvgfNzG4CAbCbuLht/1b8lYutez8aSXvKTUEfg4it7wLnVKLnn+V6bClwRuRWkmHXuBQrHDM=
last-modified
Wed, 24 Oct 2018 20:32:46 GMT
server
cloudflare
etag
"8132bd22613a0bbbdd73866340c33ab1"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=1800
accept-ranges
bytes
cf-ray
472011e7fdffc2d8-FRA
expires
Tue, 30 Oct 2018 19:20:51 GMT
utag.1775.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
26 KB
9 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1775.js?utv=ut4.43.201810291720
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41AA) /
Resource Hash
0f4176807e149be9c6cc0e583699fffe630cccb37e57242ce5a7b1f7d63d859d

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
last-modified
Thu, 10 Nov 2016 20:41:55 GMT
server
ECS (fcn/41AA)
etag
"1112944691+gzip"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
8960
expires
Wed, 14 Nov 2018 18:50:51 GMT
utag.277.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
983 B
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.277.js?utv=ut4.43.201810291720
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40F9) /
Resource Hash
0e13cd6845611f0c419398a75b85ba014a7fffb1b9e9575c2e1b4cfefebd0017

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
last-modified
Mon, 11 Jul 2016 20:43:58 GMT
server
ECS (fcn/40F9)
etag
"461771432+gzip"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
863
expires
Wed, 14 Nov 2018 18:50:51 GMT
utag.1772.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
1012 B
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1772.js?utv=ut4.43.201810291720
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40B3) /
Resource Hash
e482ba089d973ca257acfd70b2d7541447d5d333449b106d5c3dffebe322566a

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
last-modified
Mon, 11 Jul 2016 20:43:58 GMT
server
ECS (fcn/40B3)
etag
"4198895974+gzip"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
959
expires
Wed, 14 Nov 2018 18:50:51 GMT
utag.1796.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
8 KB
3 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1796.js?utv=ut4.43.201810291720
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40F9) /
Resource Hash
9337d4f2ef8a00759da573e178e302712fec944ac54cfd808f48c526b9816d3b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
last-modified
Mon, 28 Nov 2016 15:09:53 GMT
server
ECS (fcn/40F9)
etag
"931235332+gzip"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
2762
expires
Wed, 14 Nov 2018 18:50:51 GMT
pixel_details.html
www.everestjs.net/static/ Frame 3DD6
Redirect Chain
  • https://pixel.everesttech.net/4083/gr?ev_gb=0&url=https%3A%2F%2Fwww.everestjs.net%2Fstatic%2Fpixel_details.html%23google%3D__EFGCK__%26gsurfer%3D__EFGSURFER__%26optout%3D__EFOPTOUT__%26throttleCook...
  • https://www.everestjs.net/static/pixel_details.html
0
0
Document
General
Full URL
https://www.everestjs.net/static/pixel_details.html
Requested by
Host: www.everestjs.net
URL: https://www.everestjs.net/static/st.v3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.8.8.176 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-8-8-176.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Host
www.everestjs.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Server
Apache
Last-Modified
Tue, 04 Oct 2011 16:14:21 GMT
ETag
"8623-a6-4ae7b62583140"
Accept-Ranges
bytes
Content-Type
text/html
Content-Encoding
gzip
Content-Length
146
Cache-Control
max-age=63846
Expires
Wed, 31 Oct 2018 12:34:57 GMT
Date
Tue, 30 Oct 2018 18:50:51 GMT
Connection
keep-alive
Vary
Accept-Encoding

Redirect headers

Date
Tue, 30 Oct 2018 18:50:51 GMT
Server
Apache
Set-Cookie
everest_session_v2=W9ioCwAABMrsBFKi; path=/; domain=.everesttech.net everest_g_v2=g_surferid~W9ioCwAABMrsBFKi; path=/; domain=.everesttech.net; expires=Thu, 24-Sep-2020 05:30:51 GMT
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Cache-Control
no-cache
Location
https://www.everestjs.net/static/pixel_details.html#google=W9ioCwAABMrsBFKi&gsurfer=W9ioCwAABMrsBFKi&optout=0&throttleCookie=&time=20181030185051
Content-Length
345
Keep-Alive
timeout=15, max=988299
Connection
Keep-Alive
Content-Type
text/html; charset=iso-8859-1
ls.html
www.lightboxcdn.com/lclst/a1583f50-579b-41d0-8c4e-1cd1790d945c/ Frame 1E92
0
0
Document
General
Full URL
https://www.lightboxcdn.com/lclst/a1583f50-579b-41d0-8c4e-1cd1790d945c/ls.html?purl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&vid=a1583f50-579b-41d0-8c4e-1cd1790d945c&se=1&prev=0&cb=636752339805538198
Requested by
Host: www.lightboxcdn.com
URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/user.js?cb=636754604557185965
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:4ea5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

:method
GET
:authority
www.lightboxcdn.com
:scheme
https
:path
/lclst/a1583f50-579b-41d0-8c4e-1cd1790d945c/ls.html?purl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&vid=a1583f50-579b-41d0-8c4e-1cd1790d945c&se=1&prev=0&cb=636752339805538198
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
cookie
__cfduid=d32500329a5767de4faa1a8fb987255e81540925450
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
date
Tue, 30 Oct 2018 18:50:51 GMT
content-type
text/html
content-md5
2QlVA6sVmgJp4XZ5c8SrrQ==
last-modified
Mon, 15 Oct 2018 20:59:40 GMT
x-ms-request-id
237ee6fc-601e-0097-6887-693608000000
x-ms-version
2009-09-19
x-ms-lease-status
unlocked
x-ms-blob-type
BlockBlob
cf-cache-status
HIT
expires
Wed, 30 Oct 2019 18:50:51 GMT
cache-control
public, max-age=31536000
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
server
cloudflare
cf-ray
472011e81ea2c2e7-FRA
content-encoding
gzip
Cookie set dest5.html
cbsi.demdex.net/ Frame A3B1
0
0
Document
General
Full URL
https://cbsi.demdex.net/dest5.html?d_nsid=0
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.86.186 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-86-186.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash

Request headers

Host
cbsi.demdex.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Cookie
demdex=42368779027364773391084610354461960579; dextp=269-1-1540925450781|3-1-1540925450883|477-1-1540925450984|771-1-1540925451085|22052-1-1540925451186|30646-1-1540925451287|121998-1-1540925451388|127444-1-1540925451489
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Accept-Ranges
bytes
Cache-Control
max-age=21600
Content-Encoding
gzip
Content-Type
text/html
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified
Tue, 23 Oct 2018 15:17:08 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Pragma
no-cache
Set-Cookie
demdex=42368779027364773391084610354461960579;Path=/;Domain=.demdex.net;Expires=Sun, 28-Apr-2019 18:50:51 GMT;Max-Age=15552000
Vary
Accept-Encoding, User-Agent
X-TID
1AUCstzFQUQ=
Content-Length
2766
Connection
keep-alive
/
www.zdnet.com/components/breaking-news/xhr/
1 KB
1 KB
XHR
General
Full URL
https://www.zdnet.com/components/breaking-news/xhr/?slug=breaking-news-banner
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1531-fly/js/main.default.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
bbf03c4e25d86bbfa6c5bc4bb0f26a17602f93576366ec5d19d7e1c142522ba5
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/components/breaking-news/xhr/?slug=breaking-news-banner
pragma
no-cache
cookie
fly_device=desktop; fly_geo={"countryCode": "de"}; fly_preferred_edition=eu; fly_default_edition=eu; trc_cookie_storage=cbsinteractive-zdnet%253Asession-data%3Dv2_6cac2f81339b17ffba55fc0c94d5d0c2_5bffbdbd-b331-42d1-b8b0-3e3363fc2579-tuct2d22d87_1540925447_1540925447_CNawjgYQzro_GIG3wbLsLCABKAEwODib4wlAgooQSJjEF1Cl7BBYAWAA%7Ctaboola%2520global%253Alocal-storage-keys%3D%255B%2522cbsinteractive-zdnet%253Asession-data%2522%252C%2522taboola%2520global%253Auser-id%2522%255D%7Ctaboola%2520global%253Auser-id%3D5bffbdbd-b331-42d1-b8b0-3e3363fc2579-tuct2d22d87; ak_bmsc=4CBA7FD9480CE9B3851A895F675C762B0210BAB79817000008A8D85B8CDEA03B~plPWCmAGOVDdm23a8+NpG3VSq9T7inpPAfvtiHeK79FgqtulcnrlmWNeef4f+fFiOGltnClXTEFUuNGyKwORQ+BHo58xD2VO8gIdqjpfcEVMZTloU+p2RfXsgXBCfni+nZhblCT0PbrNydPoVUmyG9hkQKvZx1UJYXES5N/c5jgtIZIx+uSgYIiMm2yBKmaGIRc5hTqSvBuoIzn+R+SebIkB0BR2BlrXvrDnN11FOKO2w=; nemo_highlander-video_focus=video_focus%3a1%3aexclude; _ccmsi=1540925450448_vz23ofkk9|1540925450450; _ccmaid=5978151442409083984; zdnet_ad=%7B%22type%22%3A%22gpt%22%2C%22region%22%3A%22uk%22%2C%22session%22%3A%22e%22%2C%22subSession%22%3A%225%22%7D; first_page_today=false; LDCLGFbrowser=30a3f4c2-beb4-4744-8a81-f73f949d4ccc; GED_PLAYLIST_ACTIVITY=W3sidSI6IlFTR2oiLCJ0c2wiOjE1NDA5MjU0NTEsIm52IjowLCJ1cHQiOjE1NDA5MjU0NDMsImx0IjoxNTQwOTI1NDQzfV0.; XCLGFbrowser=fxeDYFvYqAqDMrogHq8; s_vnum=1543517450673%26vn%3D1; s_invisit=true; s_getNewRepeat=1540925450676-New; s_lv_zdnet=1540925450679; s_lv_zdnet_s=First%20Visit; AMCVS_10D31225525FF5790A490D4D%40AdobeOrg=1; AMCV_10D31225525FF5790A490D4D%40AdobeOrg=-894706358%7CMCMID%7C42232163989227135711106414016823143675%7CMCAAMLH-1541530250%7C6%7CMCAAMB-1541530250%7CRKhpRz8krg2tLO6pguXWp5olkAcUniQYPHaMWWgdJ3xzPWQmdj0y%7CMCOPTOUT-1540932650s%7CNONE%7CMCAID%7C2DEC540505313241-6000012C00000455%7CvVersion%7C2.3.0; s_cc=true; aam_uuid=42368779027364773391084610354461960579; viewGuid=7cae3897-1371-4826-8d8e-bfbd8614339a; utag_main=v_id:0166c65068590097e3aeb117dec800078006d07000b08$_sn:1$_ss:0$_st:1540927251514$ses_id:1540925450330%3Bexp-session$_pn:1%3Bexp-session$linktag:undefined%3Bexp-session; RT="dm=zdnet.com&si=90837c7d-2e7b-48b0-8cd4-ec0b522482af&ss=1540925441417&sl=2&tt=7828&obo=0&sh=1540925451541%3D2%3A0%3A7828%2C1540925445192%3D1%3A0%3A3732&bcn=%2F%2F36c3feec.akstat.io%2F&ld=1540925451541"
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
application/json, text/javascript, */*; q=0.01
cache-control
no-cache
:authority
www.zdnet.com
x-requested-with
XMLHttpRequest
:scheme
https
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
:method
GET
Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Accept-Encoding, User-Agent
content-length
496
x-xss-protection
1; mode=block
referrer-policy
no-referrer-when-downgrade
last-modified
Tue, 30 Oct 2018 18:31:51 GMT
server
nginx
x-frame-options
SAMEORIGIN
date
Tue, 30 Oct 2018 18:50:51 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-tx-id
3f3ca41f-1c7a-44e5-af7b-b276bbacda38
content-type
application/json
access-control-allow-origin
https://www.zdnet.com
cache-control
max-age=5400, private
set-cookie
bm_sv=BBFD4BF85708B698519F22C38C4D00D9~XAZWOsyr6xzUaelM6FgMr7VMLtVPX5REw/xl7lCtG8VelEU4fnTBGd6zHvqC49/42AOI7Aj9tG9QsNbmX/l+PO5X7gYlGHeVkMOhNHLEaZCIWm4xh2U1A7T2qvlx+xw9WYTuOXTaJ+iG+/u+9l+Uj0/Ky1fcwWi28Xc7GP21DSo=; Domain=.zdnet.com; Path=/; Max-Age=7200; HttpOnly
accept-ranges
bytes
expires
Tue, 30 Oct 2018 20:01:51 GMT
/
graph.facebook.com/
572 B
557 B
Script
General
Full URL
https://graph.facebook.com/?id=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&callback=jQuery183022267492917479226_1540925450248&_=1540925451656
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1531-fly/js/main.default.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a03:2880:f01a:1:face:b00c:0:1 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
5f6ddd85abc37449d7021895e6aca67c45702fb38d8a47189e3137de6ad83a48
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=15552000; preload
content-encoding
gzip
etag
"d02ac05ebd5993e9c0a869d6686d6e2e6fdb0096"
x-app-usage
{"call_count":0,"total_cputime":0,"total_time":0}
status
200
x-fb-rev
4477994
content-length
369
pragma
no-cache
x-fb-debug
YW2kwraE51WWBgOMKjMdf0he4+zsGffYVEXDr5VYTKGR/p4tqqxaCiaRtcbSTvXdT63JxMA4oqnNF9L+FRvPKA==
x-fb-trace-id
DN8e1MYzZih
date
Tue, 30 Oct 2018 18:50:51 GMT
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, no-cache, no-store, must-revalidate
facebook-api-version
v2.8
expires
Sat, 01 Jan 2000 00:00:00 GMT
share
www.linkedin.com/countserv/count/
207 B
1 KB
Script
General
Full URL
https://www.linkedin.com/countserv/count/share?url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&callback=jQuery183022267492917479226_1540925450249&_=1540925451656
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1531-fly/js/main.default.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:f500:10:101::b93f:9101 , Ireland, ASN14413 (LINKEDIN - LinkedIn Corporation, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
23cbd5ea00e37dfad26a62a94d25953798274a026b6544f35783e75ab1961f87
Security Headers
Name Value
Content-Security-Policy default-src *; connect-src 'self' static.licdn.com media.licdn.com static-exp1.licdn.com static-exp2.licdn.com media-exp1.licdn.com media-exp2.licdn.com https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' platform.linkedin.com spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'; report-uri https://www.linkedin.com/platform-telemetry/csp?f=l
Strict-Transport-Security max-age=2592000
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Accept-Encoding
x-li-uuid
3eJ9u4h3YhXgITJkkisAAA==
server
Apache-Coyote/1.1
pragma
no-cache
x-li-pop
prod-efr5
x-frame-options
sameorigin
strict-transport-security
max-age=2592000
content-type
text/javascript;charset=UTF-8
x-xss-protection
1; mode=block
cache-control
no-cache, no-store
content-security-policy
default-src *; connect-src 'self' static.licdn.com media.licdn.com static-exp1.licdn.com static-exp2.licdn.com media-exp1.licdn.com media-exp2.licdn.com https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' platform.linkedin.com spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'; report-uri https://www.linkedin.com/platform-telemetry/csp?f=l
x-li-proto
http/2
x-li-fabric
prod-lva1
expires
Thu, 01 Jan 1970 00:00:00 GMT
36c1ca5070
bam.nr-data.net/1/
57 B
261 B
Script
General
Full URL
https://bam.nr-data.net/1/36c1ca5070?a=138637741&v=1099.d27c17c&to=NV1TZ0MHXxUFWxBYWQwXcFBFD14IS1kWRV8BVFRsQg9fAQhd&rst=4221&ref=https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&ap=754&be=2322&fe=4023&dc=2658&perf=%7B%22timing%22:%7B%22of%22:1540925447439,%22n%22:0,%22r%22:0,%22re%22:579,%22f%22:579,%22dn%22:579,%22dne%22:579,%22c%22:579,%22ce%22:579,%22rq%22:579,%22rp%22:2313,%22rpe%22:2320,%22dl%22:2315,%22di%22:2658,%22ds%22:2658,%22de%22:2670,%22dc%22:4023,%22l%22:4023,%22le%22:4096%7D,%22navigation%22:%7B%22rc%22:1%7D%7D&at=GRpEEQsdExIcZw1VFFgaVQBXXggABlxJBQVUWRwHUwdVSwYJUQUbVg5UVgMAVVBWDQBSFB8UE1ITXEobGQ%3D%3D&jsonp=NREUM.setToken
Requested by
Host: js-agent.newrelic.com
URL: https://js-agent.newrelic.com/nr-1099.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
162.247.242.21 , United States, ASN23467 (NEWRELIC-AS-1 - New Relic, US),
Reverse DNS
bam-9.nr-data.net
Software
/
Resource Hash
d10c94b6cdb747904baee9070f003bb45849da46f8100b1320f286c21cbcaaa1

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Expires
Thu, 01 Jan 1970 00:00:00 GMT
Content-Length
57
Content-Type
text/javascript;charset=ISO-8859-1
disqus-count-5922ea1c53-rev.js
zdnet2.cbsistatic.com/fly/js/components/
406 B
480 B
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/js/components/disqus-count-5922ea1c53-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
b8c15c61feffdfe68b168cf2ac8cf58867f38547da3b15d7971a75c44f16bc26

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 16:42:34 GMT
server
nginx
etag
"5b5f3ffa-196"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
270
expires
Tue, 06 Nov 2018 18:50:51 GMT
/
zn_3xebfjduss0srw5-cbs.siteintercept.qualtrics.com/WRSiteInterceptEngine/
51 KB
13 KB
Script
General
Full URL
https://zn_3xebfjduss0srw5-cbs.siteintercept.qualtrics.com/WRSiteInterceptEngine/?Q_ZID=ZN_3xeBFJDuSs0SRW5&Q_LOC=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.277.js?utv=ut4.43.201810291720
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.77.209.221 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-77-209-221.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
9acc0eb4103d7b741c330849d8234002afa518fd931f8dc964dd3824298d41a1
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
server
Apache
vary
Accept-Encoding
p3p
CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
status
200
cache-control
public, max-age=60
strict-transport-security
max-age=31536000; includeSubDomains; preload
servershortname
content-type
application/javascript
content-length
12663
expires
Tue, 30 Oct 2018 18:51:51 GMT
controls-ebaf8ad91a-rev.css
zdnet3.cbsistatic.com/fly/css/video/htmlPlayerControls/
42 KB
7 KB
Stylesheet
General
Full URL
https://zdnet3.cbsistatic.com/fly/css/video/htmlPlayerControls/controls-ebaf8ad91a-rev.css
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1531-fly/js/main.default.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
b47241eabf30c18bf1761e363bdc9e5b755ea4b60d71ca9d1a0b3c4f7ffefdb7

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:41:16 GMT
server
nginx
etag
W/"5bd7463c-a910"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
6704
expires
Tue, 06 Nov 2018 18:50:51 GMT
image-gallery-modal-6c21b7dcbf-rev.js
zdnet1.cbsistatic.com/fly/js/components/
5 KB
2 KB
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/components/image-gallery-modal-6c21b7dcbf-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
b34a764a54cd042f769a2e1a002a27c14132167d8ab9967bc49419c87b694d99

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 16:42:34 GMT
server
nginx
etag
W/"5b5f3ffa-1503"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
2003
expires
Tue, 06 Nov 2018 18:50:51 GMT
a-6-cambridge.jpg
zdnet3.cbsistatic.com/hub/i/r/2018/07/24/7846cf7a-419e-4111-8a58-6119d0635e38/thumbnail/170x128/374809ede18d88b93f6aaa16332611b4/
4 KB
4 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/07/24/7846cf7a-419e-4111-8a58-6119d0635e38/thumbnail/170x128/374809ede18d88b93f6aaa16332611b4/a-6-cambridge.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
3abead375bb8d384d18dd455d548fa9d94dfd5a876dd8be9b3a5235c771abfec

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:18 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=23566743
timing-allow-origin
*
content-length
4321
expires
Tue, 30 Jul 2019 13:09:54 GMT
a-7-twitter.jpg
zdnet1.cbsistatic.com/hub/i/r/2018/07/24/43d0ec30-3aa9-4aa6-a680-9d91b6093b8d/thumbnail/170x128/9bd5990d0c901cf70c41161c1762e64b/
6 KB
6 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2018/07/24/43d0ec30-3aa9-4aa6-a680-9d91b6093b8d/thumbnail/170x128/9bd5990d0c901cf70c41161c1762e64b/a-7-twitter.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
31f2502985cd82156618c2842decdd66226091e4f616c8cd3867a9ead2c8a9e3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
last-modified
Fri, 27 Jul 2018 14:03:05 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=23311009
timing-allow-origin
*
content-length
5716
expires
Sat, 27 Jul 2019 14:07:40 GMT
a-8-tmobile.jpg
zdnet2.cbsistatic.com/hub/i/r/2018/07/24/c7a2b93b-8e6f-4c7e-a63c-7b4301d2a618/thumbnail/170x128/0d2049ff0b22993517383a83b1615952/
8 KB
8 KB
Image
General
Full URL
https://zdnet2.cbsistatic.com/hub/i/r/2018/07/24/c7a2b93b-8e6f-4c7e-a63c-7b4301d2a618/thumbnail/170x128/0d2049ff0b22993517383a83b1615952/a-8-tmobile.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
b2816ae41889388360482588c8af317634fce4179e6cfdad21f26e23ab6a9f7e

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:18 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=23566736
timing-allow-origin
*
content-length
7820
expires
Tue, 30 Jul 2019 13:09:47 GMT
b-1-jira.jpg
zdnet4.cbsistatic.com/hub/i/r/2018/07/24/0d4315b4-d3f1-49b0-85f5-b29eeacbd413/thumbnail/170x128/feaaa90fe1d813c719d7f9508ea15efe/
3 KB
4 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/hub/i/r/2018/07/24/0d4315b4-d3f1-49b0-85f5-b29eeacbd413/thumbnail/170x128/feaaa90fe1d813c719d7f9508ea15efe/b-1-jira.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
2dbd42e5d6b936274e0cf1688678f567784f89ae4f350d3eaee2dd6b86f65075

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:18 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=23566697
timing-allow-origin
*
content-length
3425
expires
Tue, 30 Jul 2019 13:09:08 GMT
b-2-raileurope.jpg
zdnet3.cbsistatic.com/hub/i/r/2018/07/24/6f624ea0-dabf-4ae6-a828-b863f83d7f07/thumbnail/170x128/5040b91fae3f612b107fbd27ad2cb882/
7 KB
7 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/07/24/6f624ea0-dabf-4ae6-a828-b863f83d7f07/thumbnail/170x128/5040b91fae3f612b107fbd27ad2cb882/b-2-raileurope.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
35c04e5b7a4044d3d19a6ccd99871a0e7d999570e2c5cfca5c91837e54ebfc9f

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:18 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=23566677
timing-allow-origin
*
content-length
6847
expires
Tue, 30 Jul 2019 13:08:48 GMT
/
www.zdnet.com/newsletter/xhr/widget-login/
2 KB
2 KB
XHR
General
Full URL
https://www.zdnet.com/newsletter/xhr/widget-login/?topic=security
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1531-fly/js/main.default.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
bc8377f48feca021b70b69821375fef6a75953bd9d42fcefdc15766eee0ef1d7
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/newsletter/xhr/widget-login/?topic=security
pragma
no-cache
cookie
fly_device=desktop; fly_geo={"countryCode": "de"}; fly_preferred_edition=eu; fly_default_edition=eu; trc_cookie_storage=cbsinteractive-zdnet%253Asession-data%3Dv2_6cac2f81339b17ffba55fc0c94d5d0c2_5bffbdbd-b331-42d1-b8b0-3e3363fc2579-tuct2d22d87_1540925447_1540925447_CNawjgYQzro_GIG3wbLsLCABKAEwODib4wlAgooQSJjEF1Cl7BBYAWAA%7Ctaboola%2520global%253Alocal-storage-keys%3D%255B%2522cbsinteractive-zdnet%253Asession-data%2522%252C%2522taboola%2520global%253Auser-id%2522%255D%7Ctaboola%2520global%253Auser-id%3D5bffbdbd-b331-42d1-b8b0-3e3363fc2579-tuct2d22d87; ak_bmsc=4CBA7FD9480CE9B3851A895F675C762B0210BAB79817000008A8D85B8CDEA03B~plPWCmAGOVDdm23a8+NpG3VSq9T7inpPAfvtiHeK79FgqtulcnrlmWNeef4f+fFiOGltnClXTEFUuNGyKwORQ+BHo58xD2VO8gIdqjpfcEVMZTloU+p2RfXsgXBCfni+nZhblCT0PbrNydPoVUmyG9hkQKvZx1UJYXES5N/c5jgtIZIx+uSgYIiMm2yBKmaGIRc5hTqSvBuoIzn+R+SebIkB0BR2BlrXvrDnN11FOKO2w=; nemo_highlander-video_focus=video_focus%3a1%3aexclude; _ccmsi=1540925450448_vz23ofkk9|1540925450450; _ccmaid=5978151442409083984; zdnet_ad=%7B%22type%22%3A%22gpt%22%2C%22region%22%3A%22uk%22%2C%22session%22%3A%22e%22%2C%22subSession%22%3A%225%22%7D; first_page_today=false; LDCLGFbrowser=30a3f4c2-beb4-4744-8a81-f73f949d4ccc; GED_PLAYLIST_ACTIVITY=W3sidSI6IlFTR2oiLCJ0c2wiOjE1NDA5MjU0NTEsIm52IjowLCJ1cHQiOjE1NDA5MjU0NDMsImx0IjoxNTQwOTI1NDQzfV0.; XCLGFbrowser=fxeDYFvYqAqDMrogHq8; s_vnum=1543517450673%26vn%3D1; s_invisit=true; s_getNewRepeat=1540925450676-New; s_lv_zdnet=1540925450679; s_lv_zdnet_s=First%20Visit; AMCVS_10D31225525FF5790A490D4D%40AdobeOrg=1; AMCV_10D31225525FF5790A490D4D%40AdobeOrg=-894706358%7CMCMID%7C42232163989227135711106414016823143675%7CMCAAMLH-1541530250%7C6%7CMCAAMB-1541530250%7CRKhpRz8krg2tLO6pguXWp5olkAcUniQYPHaMWWgdJ3xzPWQmdj0y%7CMCOPTOUT-1540932650s%7CNONE%7CMCAID%7C2DEC540505313241-6000012C00000455%7CvVersion%7C2.3.0; s_cc=true; aam_uuid=42368779027364773391084610354461960579; viewGuid=7cae3897-1371-4826-8d8e-bfbd8614339a; utag_main=v_id:0166c65068590097e3aeb117dec800078006d07000b08$_sn:1$_ss:0$_st:1540927251514$ses_id:1540925450330%3Bexp-session$_pn:1%3Bexp-session$linktag:undefined%3Bexp-session; RT="dm=zdnet.com&si=90837c7d-2e7b-48b0-8cd4-ec0b522482af&ss=1540925441417&sl=2&tt=7828&obo=0&sh=1540925451541%3D2%3A0%3A7828%2C1540925445192%3D1%3A0%3A3732&bcn=%2F%2F36c3feec.akstat.io%2F&ld=1540925451541"
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
application/json, text/javascript, */*; q=0.01
cache-control
no-cache
:authority
www.zdnet.com
x-requested-with
XMLHttpRequest
:scheme
https
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
:method
GET
Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Accept-Encoding, User-Agent
content-length
734
x-xss-protection
1; mode=block
pragma
no-cache
referrer-policy
no-referrer-when-downgrade
server
nginx
x-frame-options
SAMEORIGIN
date
Tue, 30 Oct 2018 18:50:52 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-tx-id
694a6520-4374-4e57-b906-9cea1647e58f
content-type
application/json
access-control-allow-origin
https://www.zdnet.com
cache-control
max-age=0, no-cache, no-store
set-cookie
fly_session=06qdjiad2uo6fb6dptkd8ogeg6; path=/; domain=.zdnet.com; secure; HttpOnly bm_sv=BDDC5581E53D19A061ACAB7FB2A4B40A~XAZWOsyr6xzUaelM6FgMrw1VNdaSgNiYMJi3M/VQIoYOaAEnM7vqmnaetcLDlz0GyJCuJj1+x/PxAqpqoIzsgs5ttVoHspK4Erd2ir/w8wPJIZu6GrQhufKViMmNzUMolgVH0LqD9F7uv0+RHA7mbOCBFlN6mlAvT6LtZ8LoxKE=; Domain=.zdnet.com; Path=/; Max-Age=7199; HttpOnly
accept-ranges
bytes
expires
Tue, 30 Oct 2018 18:50:52 GMT
front-door-carousel-56427878d9-rev.js
zdnet1.cbsistatic.com/fly/js/components/
5 KB
2 KB
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/components/front-door-carousel-56427878d9-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
5ecc6a93ec2939faa8dbf80084346c7d940f5a2181ee69343810da52902eb92d

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
last-modified
Thu, 16 Aug 2018 13:35:07 GMT
server
nginx
etag
W/"5b757d8b-124a"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
cneonction
close
timing-allow-origin
*
content-length
1564
expires
Tue, 06 Nov 2018 18:50:51 GMT
urban-airship-29ae327ed0-rev.js
zdnet3.cbsistatic.com/fly/js/components/
1 KB
1 KB
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/js/components/urban-airship-29ae327ed0-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
fa33d1db535d783b0baf4e74bdc7ce9e54633f87a03669b2803e567088d64ccb

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
last-modified
Wed, 29 Aug 2018 13:13:23 GMT
server
nginx
etag
W/"5b869bf3-514"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
827
expires
Tue, 06 Nov 2018 18:50:51 GMT
cs.js
sb.scorecardresearch.com/c2/3005086/
0
400 B
Script
General
Full URL
https://sb.scorecardresearch.com/c2/3005086/cs.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1775.js?utv=ut4.43.201810291720
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.57.19.23 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-57-19-23.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:51 GMT
Content-Encoding
gzip
Last-Modified
Fri, 08 Apr 2011 23:11:26 GMT
ETag
"d41d8cd98f00b204e9800998ecf8427e:1349196464"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=259200
Connection
keep-alive
Content-Length
20
Expires
Fri, 02 Nov 2018 18:50:51 GMT
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=3005086&ns__t=1540925451706&ns_c=UTF-8&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZD...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=3005086&ns__t=1540925451706&ns_c=UTF-8&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20Z...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=3005086&ns__t=1540925451706&ns_c=UTF-8&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c9=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.57.19.23 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-57-19-23.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:51 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=3005086&ns__t=1540925451706&ns_c=UTF-8&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c9=
Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:51 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
m
secure-us.imrworldwide.com/cgi-bin/
Redirect Chain
  • https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-304254h&cg=0&cc=1&si=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp=&ts=compac...
  • https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-304254h&cg=0&cc=1&si=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp=&ts=compac...
44 B
332 B
Image
General
Full URL
https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-304254h&cg=0&cc=1&si=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp=&ts=compact&rnd=1540925451707&ja=1
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.203.164.211 Cambridge, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-203-164-211.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
5ecb58845a9ac30e4eb4b18eb0e7431ba1fb195ce035309735efaee67421c7a3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 30 Oct 2018 18:50:51 GMT
server
nginx
status
200
access-control-allow-methods
POST, OPTIONS
p3p
P3P policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
access-control-allow-origin
*
cache-control
no-cache
content-type
image/gif
content-length
44
expires
Thu, 01 Dec 1994 16:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 30 Oct 2018 18:50:51 GMT
server
nginx
status
302
location
https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-304254h&cg=0&cc=1&si=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp=&ts=compact&rnd=1540925451707&ja=1
access-control-allow-methods
POST, OPTIONS
p3p
P3P policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
access-control-allow-origin
*
cache-control
no-cache
content-length
0
expires
Thu, 01 Dec 1994 16:00:00 GMT
fbevents.js
connect.facebook.net/en_US/
45 KB
14 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
8896bd9aad2399ee52a9878c7ada2e49df2f66ba91afd102244018c25ffd88e2
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
14136
x-xss-protection
0
pragma
public
x-fb-debug
r+nAQUBf5ruZUAAHpaPm9z2QslcHm57Kw/rdpwqAJDQ4YGY/XtzoSh0c0fBrmU4G/rPKostwdm+q4KTr9GQsmw==
x-frame-options
DENY
date
Tue, 30 Oct 2018 18:50:51 GMT
strict-transport-security
max-age=31536000; preload; includeSubDomains
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
expires
Sat, 01 Jan 2000 00:00:00 GMT
4083-12969.js
www.everestjs.net/dl/4083/
484 B
655 B
Script
General
Full URL
https://www.everestjs.net/dl/4083/4083-12969.js
Requested by
Host: www.everestjs.net
URL: https://www.everestjs.net/static/st.v3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.8.8.176 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-8-8-176.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
1d4d518e1da495fb6d6d8b3d86bba79d7597b61b466e71c45cdb09ed79659c53

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:51 GMT
Content-Encoding
gzip
Last-Modified
Mon, 25 Nov 2013 14:23:10 GMT
Server
Apache
ETag
"4a5a49-1e4-4ec011a776f80"
Vary
Accept-Encoding
Content-Type
text/javascript
Cache-Control
max-age=60353
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
288
Expires
Wed, 31 Oct 2018 11:36:44 GMT
v
pixel.everesttech.net/4083/
128 B
716 B
Image
General
Full URL
https://pixel.everesttech.net/4083/v?ev___loc=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ev___ref=%2F%2F
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_CBC
Server
66.117.28.68 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
bf94db5c7d218f9a2a2edfff6c01bf65f5946a32000cd41835fee5b564efa62f

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:51 GMT
Last-Modified
Wed, 19 Oct 2016 22:11:25 GMT
Server
Apache
ETag
"9c37b1-80-53f3f17013d40"
Vary
Cookie
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Cache-Control
no-cache
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
image/png
Keep-Alive
timeout=15, max=999752
Content-Length
128
1x1
pixel.everesttech.net/
Redirect Chain
  • https://cm.everesttech.net/cm
  • https://cm.g.doubleclick.net/pixel?google_nid=everest&google_cm&google_sc&ev_rs=1&url=/1x1&google_hm=Vzlpb0N3QUFCTXJzQkZLaQ
  • https://cm.everesttech.net/cm/ax?cookieid=&ev_rs=1&url=/1x1&google_gid=CAESEJPRLxN4XX32NF9Wpu5McuU&google_cver=1
  • https://pixel.everesttech.net/1x1
128 B
407 B
Image
General
Full URL
https://pixel.everesttech.net/1x1
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_CBC
Server
66.117.28.68 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
bf94db5c7d218f9a2a2edfff6c01bf65f5946a32000cd41835fee5b564efa62f

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:52 GMT
Last-Modified
Wed, 19 Oct 2016 22:11:25 GMT
Server
Apache
ETag
"143362-80-53f3f17013d40"
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=15, max=991825
Content-Length
128

Redirect headers

Date
Tue, 30 Oct 2018 18:50:51 GMT
Server
AMO-cookiemap/1.1
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Location
https://pixel.everesttech.net/1x1
Cache-Control
no-cache
Connection
Keep-Alive
Keep-Alive
timeout=15,max=100
Content-Length
0
advertisement-d41d8cd98f-rev.js
zdnet2.cbsistatic.com/fly/js/utils/
0
178 B
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/js/utils/advertisement-d41d8cd98f-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
last-modified
Fri, 10 Aug 2018 18:33:06 GMT
server
nginx
etag
"5b6dda62-0"
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
0
expires
Tue, 06 Nov 2018 18:50:51 GMT
comscore.streaming.6.1.1.171219.min.js
vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/comscore/
104 KB
19 KB
Script
General
Full URL
https://vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/comscore/comscore.streaming.6.1.1.171219.min.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
081873caa83744b6d819ab294b08927e20b60841dd8f23a87c2a57e15f65591c

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
last-modified
Mon, 26 Mar 2018 15:42:35 GMT
server
Apache
etag
"c3c30c0ebfc35a9426296256fc3133d8:1522078959"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=2592000
accept-ranges
bytes
content-length
18881
expires
Thu, 29 Nov 2018 18:50:51 GMT
fly-disqus-count-1f604770a3-rev.js
zdnet2.cbsistatic.com/fly/js/components/
882 B
671 B
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/js/components/fly-disqus-count-1f604770a3-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
b2ab8784d5ca4bc5e4e1990ba55c6d9f041b8fe8cf41ad9afa37bc1c3dd12756

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
last-modified
Fri, 25 May 2018 17:24:03 GMT
server
nginx
etag
"5b0846b3-372"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
460
expires
Tue, 06 Nov 2018 18:50:51 GMT
ua-sdk.min.js
web-sdk.urbanairship.com/notify/v1/
78 KB
17 KB
Script
General
Full URL
https://web-sdk.urbanairship.com/notify/v1/ua-sdk.min.js
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/js/components/urban-airship-29ae327ed0-rev.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:19d::e3d , European Union, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
UploadServer /
Resource Hash
1ff53412e0f7149ee0e54173d5681958ad656643e3213acdd588941c89642f9e

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
x-goog-meta-goog-reserved-file-mtime
1538677181
x-guploader-uploadid
AEnB2UqqNR4wk19g2tb73nuacsujibGNsep56eyKg2AAQHmN9zM-JuHosoBENlEbE24CHAOLBA7mSn6E37SJiiFRs5XWCq1sUA
x-goog-storage-class
MULTI_REGIONAL
status
200
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-length
16960
last-modified
Thu, 04 Oct 2018 18:57:14 GMT
server
UploadServer
etag
"66b301ea9923f38e2300df3d9e6b1156"
vary
Accept-Encoding
x-goog-hash
crc32c=1WWWOQ==, md5=ZrMB6pkj844jAN89nmsRVg==
x-goog-generation
1538679434316060
cache-control
public, max-age=300
x-goog-stored-content-length
79839
accept-ranges
bytes
content-type
application/x-javascript
expires
Tue, 30 Oct 2018 18:55:51 GMT
/
www.google.de/pagead/1p-user-list/1036174608/
Redirect Chain
  • https://www.googleadservices.com/pagead/conversion/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&amp;guid=ON&amp;script=0
  • https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&amp;guid=ON&amp;script=0&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&ocp_id=C6jYW8eXMsWE-g...
  • https://www.google.com/pagead/1p-user-list/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&random=254921685&crd=CKrPGwiJ0hsIhNAb&cdct=2&is_vtc=1&random=3780877198
  • https://www.google.de/pagead/1p-user-list/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&random=254921685&crd=CKrPGwiJ0hsIhNAb&cdct=2&is_vtc=1&random=37808771...
42 B
109 B
Image
General
Full URL
https://www.google.de/pagead/1p-user-list/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&random=254921685&crd=CKrPGwiJ0hsIhNAb&cdct=2&is_vtc=1&random=3780877198&ipr=y
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:821::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 30 Oct 2018 18:50:52 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 30 Oct 2018 18:50:52 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
image/gif
location
https://www.google.de/pagead/1p-user-list/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&random=254921685&crd=CKrPGwiJ0hsIhNAb&cdct=2&is_vtc=1&random=3780877198&ipr=y
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel
ad.yieldmanager.com/
0
1 KB
Image
General
Full URL
https://ad.yieldmanager.com/pixel?id=2447099&t=2
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1288:110:422::3000 , United Kingdom, ASN34010 (YAHOO-IRD, GB),
Reverse DNS
Software
ATS /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:51 GMT
X-Content-Type-Options
nosniff
Server
ATS
Age
0
Expect-CT
max-age=31536000, report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only"
Strict-Transport-Security
max-age=31536000
Public-Key-Pins-Report-Only
max-age=2592000; pin-sha256="2fRAUXyxl4A1/XHrKNBmc8bTkzA7y4FB/GLJuNAzCqY="; pin-sha256="I/Lt/z7ekCWanjD0Cvj5EqXls2lOaThEA0H2Bg4BT/o="; pin-sha256="K87oWBWM9UZfyddvDfoxL+8lpNyoUB2ptGtn0fv6G2Q="; pin-sha256="Wd8xe/qfTwq3ylFNd3IpaqLHZbh2ZNCLluVzmeNkcpw="; pin-sha256="WoiWRyIOVNa9ihaBciRSC7XHjliYS9VwUGOIud4PB18="; pin-sha256="cGuxAXyFXFkWm61cF4HPWX8S0srS9j0aSqN0k4AP+4A="; pin-sha256="dolnbtzEBnELx/9lOEQ22e6OZO/QNb6VSSX2XHA3E7A="; pin-sha256="i7WTqTvh0OioIruIfFR4kMPnBqrS2rdiVPl/s2uC/CY="; pin-sha256="r/mIkG3eEpVdm+u/ko/cwxzOMo1bk4TyHIlByibiA5E="; pin-sha256="uUwZgwDOxcBXrQcntwu+kYFpkiVkOaezL0WYEZ3anJc="; includeSubdomains; report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-hpkp-report-only"
Connection
keep-alive
Content-Length
0
X-XSS-Protection
1; mode=block
s
pixel.everesttech.net/4083/
128 B
716 B
Image
General
Full URL
https://pixel.everesttech.net/4083/s?s=12969
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_CBC
Server
66.117.28.68 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
bf94db5c7d218f9a2a2edfff6c01bf65f5946a32000cd41835fee5b564efa62f

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:51 GMT
Last-Modified
Wed, 19 Oct 2016 22:11:25 GMT
Server
Apache
ETag
"9c37b1-80-53f3f17013d40"
Vary
Cookie
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Cache-Control
no-cache
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
image/png
Keep-Alive
timeout=15, max=999743
Content-Length
128
309391486091569
connect.facebook.net/signals/config/
104 KB
19 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/309391486091569?v=2.8.30&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
78e6c9bd32bac30d3171f0257ad9961c141202694725e96d005fd11a8281f556
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
19056
x-xss-protection
0
pragma
public
x-fb-debug
/qJnKsYe1G4udrIEStLdwSF/kC0YxpIE3xfp/jwUIifdORtq90CLreFGxTZCXWl0s2AkpmSBaMrDB8ENUTSUTg==
x-frame-options
DENY
date
Tue, 30 Oct 2018 18:50:51 GMT
strict-transport-security
max-age=31536000; preload; includeSubDomains
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
expires
Sat, 01 Jan 2000 00:00:00 GMT
ima3.js
s0.2mdn.net/instream/html5/
239 KB
82 KB
Script
General
Full URL
https://s0.2mdn.net/instream/html5/ima3.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2006 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
196cf7096a620f542f2560e5c4f17e2e453a546c1c9b6d6fc4730e773595af59
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
83782
x-xss-protection
1; mode=block
expires
Tue, 30 Oct 2018 18:50:51 GMT
config.json
c.go-mpulse.net/api/v2/
2 KB
1 KB
XHR
General
Full URL
https://c.go-mpulse.net/api/v2/config.json?key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&t=1540925451823&s=6cf2b500d8bd03d6f19ba5f62e4f3802f32b6ac5b1e53afb8108cbd1a4160bd2
Requested by
Host: zdnet1.cbsistatic.com
URL: https://zdnet1.cbsistatic.com/fly/js/libs/mpulse-1.0.2.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.98.131.27 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-98-131-27.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
aeb368bdab83d56bd0248b2f7713fe965e8dfe01b799c06a4519c220d7d4b47a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com

Response headers

Date
Tue, 30 Oct 2018 18:50:51 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
private, max-age=300, stale-while-revalidate=60, stale-if-error=120
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
715
ads
securepubads.g.doubleclick.net/gampad/
113 KB
16 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2360243499334543&correlator=3584384635184827&output=json_html&callback=googletag.impl.pubads.callbackProxy1&impl=fifs&adsid=NT&json_a=1&eid=21061803&vrg=270&guci=1.2.0.0.2.2.0&plat=1%3A32776%2C2%3A32776&sc=1&sfv=1-0-30&iu_parts=8264%2Cuk-zdnet%2Csecurity&enc_prev_ius=%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2&prev_iu_szs=7x7%7C5x5%2C1x1%2C1600x1000%2C728x90%7C970x66%7C970x250%2C300x250%7C300x600%7C300x1050%2C300x250%2C300x250%2C728x90%7C970x66%7C970x250%2C371x771&ists=128&prev_scp=pos%3Dnav%7C%7Cpos%3Dtop%7Cpos%3Dtop%7Cpos%3Dtop%7Cpos%3Dmiddle%7Cpos%3Dbottom%7Cpos%3Dbottom%7Cpos%3Dtop&eri=1&cust_params=buyingcycle%3Ddiscover%26topic%3Dsecurity%252Cinternet-of-things%26device%3Ddesktop%26ptype%3Darticle%26cid%3Dgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%26env%3Dprod%26firstpg%3D1%26vguid%3D7cae3897-1371-4826-8d8e-bfbd8614339a%26session%3De%26subses%3D5&cookie_enabled=1&bc=7&abxe=1&lmt=1540925451&dt=1540925451867&dlt=1540925449754&idt=521&frm=20&biw=1585&bih=1200&oid=3&adxs=0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0&adys=0%2C116%2C0%2C0%2C0%2C0%2C0%2C0%2C0&adks=653809195%2C4050810744%2C3139038935%2C2359688258%2C3490184630%2C3306054293%2C587979890%2C949982068%2C1835970030&ucis=1%7C2%7C3%7C4%7C5%7C6%7C7%7C8%7C9&gut=v2&ifi=1&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&dssz=96&icsg=0&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1585x5621%7C1585x0%7C1585x-1%7C1585x-1%7C370x-1%7C370x-1%7C370x-1%7C1210x-1%7C370x-1&msz=7x30%7C1585x0%7C1600x-1%7C688x-1%7C300x-1%7C300x-1%7C300x-1%7C728x-1%7C371x-1&ga_vid=1826892963.1540925452&ga_sid=1540925452&ga_hid=2130951802&fws=128%2C4%2C128%2C128%2C128%2C128%2C128%2C128%2C128
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_270.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
058ea8a82df4b7c0f1ab29a248c20562d0e9ab56d8eceb96f48f0afe5e26f412
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com

Response headers

date
Tue, 30 Oct 2018 18:50:52 GMT
content-encoding
gzip
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2,-2,-2,-2,-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
16510
x-xss-protection
1; mode=block
google-lineitem-id
4745699004,-2,4745166436,253246569,253246569,241984809,130394889,241984809,4825966980
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138245072116,-2,138239321298,75374362809,75375443409,75375443409,43343691249,75374362809,138247024569
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_270.js
securepubads.g.doubleclick.net/gpt/
54 KB
20 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_270.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_270.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
sffe /
Resource Hash
f7739b424d4acd048d584bf1bfa99a1ea5481989d1abb8948e9bf571729f2c72
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 24 Oct 2018 15:56:38 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
20717
x-xss-protection
1; mode=block
expires
Tue, 30 Oct 2018 18:50:51 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-30/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-30/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_270.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Purpose
prefetch
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

expires
Sat, 12 Oct 2019 19:46:32 GMT
cache-control
public, immutable, max-age=31536000
last-modified
Fri, 12 Oct 2018 04:28:13 GMT
content-type
text/html
adsense.js
asset.pagefair.com/adimages/
0
377 B
Script
General
Full URL
https://asset.pagefair.com/adimages/adsense.js
Requested by
Host: asset.pagefair.com
URL: https://asset.pagefair.com/measure.min.js?_=1540925451466
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
94.31.29.248 , United Kingdom, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
94.31.29.248.IPYX-077437-ZYO.above.net
Software
NetDNA-cache/2.2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
last-modified
Fri, 09 Mar 2018 17:19:01 GMT
server
NetDNA-cache/2.2
x-amz-request-id
2710969232C88FD9
etag
"8193452d6ae440ec23eff2e1559d5461"
x-cache
HIT
content-type
application/x-javascript
status
200
cache-control
max-age=86400
accept-ranges
bytes
content-length
31
x-amz-id-2
N58qsKobAtW8GF7lHIpkGMSfSvjVesd6ZGlqF4jNgh4zBodoG5Gs0V/4TUAGl73bQPdYvEeNk5o=
expires
Wed, 31 Oct 2018 18:50:51 GMT
textlink-ads.jpg
asset.pagefair.net/adimages/
518 B
540 B
Image
General
Full URL
https://asset.pagefair.net/adimages/textlink-ads.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.161.188.128 Los Angeles, United States, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
87bc265dda5e31597442c420def76eeadb5c516d016213a47f570c65d5558b72

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
last-modified
Fri, 09 Mar 2018 17:19:02 GMT
server
NetDNA-cache/2.2
x-amz-request-id
E17B31B952B346AB
etag
"262857636d8f02be18171bed8e10c82b"
x-cache
HIT
content-type
image/jpeg
status
200
cache-control
max-age=2592000
accept-ranges
bytes
content-length
229
x-amz-id-2
0c0Jadcy4863JsOsVxRBN1dnrHwY0gGkgn+IvIq6QYjrMoRbaFgTXqcLprTJN4PS5OAkt+h6bOk=
textlink-ads.jpg
asset.pagefair.com/adimages/
518 B
568 B
Image
General
Full URL
https://asset.pagefair.com/adimages/textlink-ads.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
94.31.29.248 , United Kingdom, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
94.31.29.248.IPYX-077437-ZYO.above.net
Software
NetDNA-cache/2.2 /
Resource Hash
87bc265dda5e31597442c420def76eeadb5c516d016213a47f570c65d5558b72

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:51 GMT
content-encoding
gzip
last-modified
Fri, 09 Mar 2018 17:19:02 GMT
server
NetDNA-cache/2.2
x-amz-request-id
151BA16F428B5E12
etag
"262857636d8f02be18171bed8e10c82b"
x-cache
HIT
content-type
image/jpeg
status
200
cache-control
max-age=86400
accept-ranges
bytes
content-length
229
x-amz-id-2
A7s1JJDViF4zew9OvRn9QoRNkAWfBwOwwmH0svIplay09NP/144VpCMw7Kv+mpD8DWa4eT+lNJA=
expires
Wed, 31 Oct 2018 18:50:51 GMT
headerstats
as-sec.casalemedia.com/
0
337 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=182823&u=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.123.187.90 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a92-123-187-90.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:52 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Tue, 30 Oct 2018 18:50:52 GMT
count.js
zdnet-1.disqus.com/
1 KB
1 KB
Script
General
Full URL
https://zdnet-1.disqus.com/count.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.120.134 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
3487ef2baf0c08ba660a8a143cdeb8ebeec961eea04bccd7c49096b4eb26b875
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:52 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Age
1510050
P3P
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Connection
keep-alive
Content-Length
871
X-XSS-Protection
1; mode=block
Last-Modified
Fri, 12 Oct 2018 17:48:14 GMT
Server
nginx
ETag
"5bc0de5e-367"
Strict-Transport-Security
max-age=300; includeSubdomains
Content-Type
application/javascript; charset=utf-8
Cache-Control
max-age=2592000
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
Expires
Mon, 12 Nov 2018 07:23:22 GMT
/
www.facebook.com/tr/
44 B
244 B
Image
General
Full URL
https://www.facebook.com/tr/?id=309391486091569&ev=PageView&dl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&rl=&if=false&ts=1540925452033&sw=1600&sh=1200&v=2.8.30&r=stable&a=tmtealium&ec=0&o=30&fbp=fb.1.1540925452031.181729493&it=1540925451820&coo=false
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:52 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Tue, 30 Oct 2018 18:50:52 GMT
a.js
stats.pagefair.com/stats/page_view_event/3393B7A52D1447DD/
25 B
722 B
XHR
General
Full URL
https://stats.pagefair.com/stats/page_view_event/3393B7A52D1447DD/a.js?wl_div_hid_t0=0&div_hid_t0=0&s_blk=0&wl_i_blk=0&i_blk=0&is_ab=0&is_wl=1&new_monthly=1&new_daily=1&_=1540925452047
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1531-fly/js/main.default.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.76.196.204 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-76-196-204.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
2671d72b96d6d9a1b8bbc1429048505ea6dbc3514daf22ab6dd6dfc8a70ce8d3

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:51:27 GMT
Server
nginx
Access-Control-Allow-Methods
GET, POST, OPTIONS
P3P
CP="NID DSP ALL COR"
Access-Control-Allow-Origin
https://www.zdnet.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/javascript
Access-Control-Allow-Headers
Authorization,Content-Type,Accept,Origin,User-Agent,Cache-Control,Keep-Alive,X-Requested-With,If-Modified-Since,X-CSRF-TOKEN
Content-Length
25
count-data.js
zdnet-1.disqus.com/
243 B
769 B
Script
General
Full URL
https://zdnet-1.disqus.com/count-data.js?1=7a12161d-2a5f-4793-b0a4-9fac038733de
Requested by
Host: zdnet-1.disqus.com
URL: https://zdnet-1.disqus.com/count.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.120.134 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
ebff5e526eaecb20e91c2af0476f72cdae479b8e36b89f4e3068ce46dd1db96f
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:52 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Server
nginx
Age
3641
X-Frame-Options
SAMEORIGIN
Connection
keep-alive
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Vary
Accept-Encoding
Cache-Control
public, max-age=600
Strict-Transport-Security
max-age=300; includeSubdomains
Content-Type
application/javascript; charset=UTF-8
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
Content-Length
205
X-XSS-Protection
1; mode=block
mux.js
vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/
70 KB
22 KB
Script
General
Full URL
https://vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/mux.js
Requested by
Host: vidtech.cbsinteractive.com
URL: https://vidtech.cbsinteractive.com/uvpjs/2.8.3/CBSI-PLAYER.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
3ae5d0f70dfeb1308462aaaa19d8326a6bd2d41781323b07db04cccffc09cf5f

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:52 GMT
content-encoding
gzip
last-modified
Mon, 26 Mar 2018 15:42:36 GMT
server
Apache
etag
"6ff5de35d5b5d1d667e341d5109a9c19:1522078959"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=2592000
accept-ranges
bytes
content-length
21978
expires
Thu, 29 Nov 2018 18:50:52 GMT
ggcmb510.js
cdn-gl.imrworldwide.com/novms/js/2/
12 KB
5 KB
Script
General
Full URL
https://cdn-gl.imrworldwide.com/novms/js/2/ggcmb510.js
Requested by
Host: vidtech.cbsinteractive.com
URL: https://vidtech.cbsinteractive.com/uvpjs/2.8.3/CBSI-PLAYER.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.93.121 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-93-121.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
f68ec7cf550e86cb14e4d992724157c4f625ea3f0cd7d06e9e533c17c735401d

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 04 Oct 2018 18:49:05 GMT
Content-Encoding
gzip
Last-Modified
Wed, 03 Oct 2018 17:26:15 GMT
Server
AmazonS3
Age
104
x-amz-server-side-encryption
AES256
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
x-amz-version-id
DqBXYNAeWk9c9ecQe6fCjbgUkjUpFyFY
Via
1.1 6e761598d9637d0090f3661d0d27be14.cloudfront.net (CloudFront)
Cache-Control
max-age=86400
Transfer-Encoding
chunked
Connection
keep-alive
Content-Type
application/javascript
X-Amz-Cf-Id
Sj2VNL0hh1KJqckvXfHag-UtkJ0h5K_CFB7fzVzKweMVlnHInAbFDQ==
AppMeasurement-2.3.0.min.js
vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/adobe/
77 KB
27 KB
Script
General
Full URL
https://vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/adobe/AppMeasurement-2.3.0.min.js
Requested by
Host: vidtech.cbsinteractive.com
URL: https://vidtech.cbsinteractive.com/uvpjs/2.8.3/CBSI-PLAYER.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
4974c54f5183f50fd1f3c3d49c496fd79602f8159b6d393d3fab09e4433555dd

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:52 GMT
content-encoding
gzip
last-modified
Mon, 26 Mar 2018 15:42:35 GMT
server
Apache
etag
"d71ba6c9a930b6864408830c3e2705f9:1522078958"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=2592000
accept-ranges
bytes
content-length
27260
expires
Thu, 29 Nov 2018 18:50:52 GMT
VideoHeartbeat-2.0.2.min.js
vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/adobe/
143 KB
29 KB
Script
General
Full URL
https://vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/adobe/VideoHeartbeat-2.0.2.min.js
Requested by
Host: vidtech.cbsinteractive.com
URL: https://vidtech.cbsinteractive.com/uvpjs/2.8.3/CBSI-PLAYER.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e08209b44a15fd9f6b9977d2580034e8d3da36542235802c2722ff8db4c0a461

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:52 GMT
content-encoding
gzip
last-modified
Mon, 26 Mar 2018 15:42:35 GMT
server
Apache
etag
"215943f0e77b4fcc9cc72b98a8ea1cfc:1522078958"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=2592000
accept-ranges
bytes
content-length
28977
expires
Thu, 29 Nov 2018 18:50:52 GMT
/
36c3feec.akstat.io/
0
354 B
Other
General
Full URL
https://36c3feec.akstat.io/
Requested by
Host: c.go-mpulse.net
URL: https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.8.11.168 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-8-11-168.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:52 GMT
Content-Type
image/gif
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
X-XSS-Protection
0
Expires
Tue, 30 Oct 2018 18:50:52 GMT
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
truncated
/
2 KB
0
Media
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7e9696aabfbb60803028b14636581f459404cea187d0c0c50b7d4d5cf8e1a3b1

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
video/mp4
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/ Frame 40EA
73 KB
27 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
13112639ea5d320063c21803f0172ec3273678f4d8a6215df67c4774659a233e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 24 Oct 2018 17:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
524242
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27234
x-xss-protection
1; mode=block
server
cafe
etag
10801174140179827322
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 07 Nov 2018 17:13:30 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame 40EA
282 KB
87 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_270.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
95.100.199.29 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-199-29.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2b28e861a4e45fd1f546a63afabd2f757f8f9e18ec13a5316812237d02a74ecc

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:52 GMT
Content-Encoding
gzip
Last-Modified
Tue, 16 Oct 2018 15:02:25 GMT
Server
AmazonS3
x-amz-request-id
5DA367EBA3BC986D
ETag
"de2606cae8bdc1e40ebf6e50b8adf558"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=35710
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88514
x-amz-id-2
SCylKO0dapbxpVhLg5v7zBl6YgBsoGs4cCRduNC7JRMCd5MWia67iP1mc8n66uXsRPO/UgH7vdA=
osd.js
pagead2.googlesyndication.com/pagead/
73 KB
27 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/osd.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_270.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
cce5c991fc672328e8eb7e5f9026496acd4fa608d26d0df95c54b7f16a8e5cc4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:22:25 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1707
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27406
x-xss-protection
1; mode=block
server
cafe
etag
6345757217691752979
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=3600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 19:22:25 GMT
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/ Frame F0CE
73 KB
27 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
13112639ea5d320063c21803f0172ec3273678f4d8a6215df67c4774659a233e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 24 Oct 2018 17:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
524242
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27234
x-xss-protection
1; mode=block
server
cafe
etag
10801174140179827322
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 07 Nov 2018 17:13:30 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame F0CE
282 KB
87 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_270.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
95.100.199.29 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-199-29.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2b28e861a4e45fd1f546a63afabd2f757f8f9e18ec13a5316812237d02a74ecc

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:52 GMT
Content-Encoding
gzip
Last-Modified
Tue, 16 Oct 2018 15:02:25 GMT
Server
AmazonS3
x-amz-request-id
5DA367EBA3BC986D
ETag
"de2606cae8bdc1e40ebf6e50b8adf558"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=35710
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88514
x-amz-id-2
SCylKO0dapbxpVhLg5v7zBl6YgBsoGs4cCRduNC7JRMCd5MWia67iP1mc8n66uXsRPO/UgH7vdA=
9818.js
ads.rubiconproject.com/ad/ Frame 76DF
26 KB
8 KB
Script
General
Full URL
https://ads.rubiconproject.com/ad/9818.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache / PHP/5.3.3
Resource Hash
d02197080b9680999381b5f5337fedd92674e5a1550ddfcc0c70612d3170a5e3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:52 GMT
Content-Encoding
gzip
Server
Apache
X-Powered-By
PHP/5.3.3
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=4860
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
7558
Expires
Tue, 30 Oct 2018 20:11:52 GMT
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/ Frame 76DF
73 KB
27 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
13112639ea5d320063c21803f0172ec3273678f4d8a6215df67c4774659a233e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 24 Oct 2018 17:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
524242
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27234
x-xss-protection
1; mode=block
server
cafe
etag
10801174140179827322
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 07 Nov 2018 17:13:30 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame 76DF
282 KB
87 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_270.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
95.100.199.29 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-199-29.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2b28e861a4e45fd1f546a63afabd2f757f8f9e18ec13a5316812237d02a74ecc

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:52 GMT
Content-Encoding
gzip
Last-Modified
Tue, 16 Oct 2018 15:02:25 GMT
Server
AmazonS3
x-amz-request-id
5DA367EBA3BC986D
ETag
"de2606cae8bdc1e40ebf6e50b8adf558"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=35710
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88514
x-amz-id-2
SCylKO0dapbxpVhLg5v7zBl6YgBsoGs4cCRduNC7JRMCd5MWia67iP1mc8n66uXsRPO/UgH7vdA=
9818.js
ads.rubiconproject.com/ad/ Frame C70B
26 KB
8 KB
Script
General
Full URL
https://ads.rubiconproject.com/ad/9818.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache / PHP/5.3.3
Resource Hash
d02197080b9680999381b5f5337fedd92674e5a1550ddfcc0c70612d3170a5e3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:52 GMT
Content-Encoding
gzip
Server
Apache
X-Powered-By
PHP/5.3.3
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=4860
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
7558
Expires
Tue, 30 Oct 2018 20:11:52 GMT
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/ Frame C70B
73 KB
27 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
13112639ea5d320063c21803f0172ec3273678f4d8a6215df67c4774659a233e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 24 Oct 2018 17:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
524242
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27234
x-xss-protection
1; mode=block
server
cafe
etag
10801174140179827322
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 07 Nov 2018 17:13:30 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame C70B
282 KB
87 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_270.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
95.100.199.29 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-199-29.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2b28e861a4e45fd1f546a63afabd2f757f8f9e18ec13a5316812237d02a74ecc

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:52 GMT
Content-Encoding
gzip
Last-Modified
Tue, 16 Oct 2018 15:02:25 GMT
Server
AmazonS3
x-amz-request-id
5DA367EBA3BC986D
ETag
"de2606cae8bdc1e40ebf6e50b8adf558"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=35710
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88514
x-amz-id-2
SCylKO0dapbxpVhLg5v7zBl6YgBsoGs4cCRduNC7JRMCd5MWia67iP1mc8n66uXsRPO/UgH7vdA=
9818.js
ads.rubiconproject.com/ad/ Frame 7C85
26 KB
8 KB
Script
General
Full URL
https://ads.rubiconproject.com/ad/9818.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache / PHP/5.3.3
Resource Hash
d02197080b9680999381b5f5337fedd92674e5a1550ddfcc0c70612d3170a5e3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:52 GMT
Content-Encoding
gzip
Server
Apache
X-Powered-By
PHP/5.3.3
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=4860
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
7558
Expires
Tue, 30 Oct 2018 20:11:52 GMT
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/ Frame 7C85
73 KB
27 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
13112639ea5d320063c21803f0172ec3273678f4d8a6215df67c4774659a233e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 24 Oct 2018 17:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
524242
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27234
x-xss-protection
1; mode=block
server
cafe
etag
10801174140179827322
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 07 Nov 2018 17:13:30 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame 7C85
282 KB
87 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_270.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
95.100.199.29 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-199-29.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2b28e861a4e45fd1f546a63afabd2f757f8f9e18ec13a5316812237d02a74ecc

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:52 GMT
Content-Encoding
gzip
Last-Modified
Tue, 16 Oct 2018 15:02:25 GMT
Server
AmazonS3
x-amz-request-id
5DA367EBA3BC986D
ETag
"de2606cae8bdc1e40ebf6e50b8adf558"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=35710
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88514
x-amz-id-2
SCylKO0dapbxpVhLg5v7zBl6YgBsoGs4cCRduNC7JRMCd5MWia67iP1mc8n66uXsRPO/UgH7vdA=
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/ Frame 6430
73 KB
27 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
13112639ea5d320063c21803f0172ec3273678f4d8a6215df67c4774659a233e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 24 Oct 2018 17:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
524242
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27234
x-xss-protection
1; mode=block
server
cafe
etag
10801174140179827322
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 07 Nov 2018 17:13:30 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame 6430
282 KB
87 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_270.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
95.100.199.29 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-199-29.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2b28e861a4e45fd1f546a63afabd2f757f8f9e18ec13a5316812237d02a74ecc

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:52 GMT
Content-Encoding
gzip
Last-Modified
Tue, 16 Oct 2018 15:02:25 GMT
Server
AmazonS3
x-amz-request-id
5DA367EBA3BC986D
ETag
"de2606cae8bdc1e40ebf6e50b8adf558"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=35710
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88514
x-amz-id-2
SCylKO0dapbxpVhLg5v7zBl6YgBsoGs4cCRduNC7JRMCd5MWia67iP1mc8n66uXsRPO/UgH7vdA=
9818.js
ads.rubiconproject.com/ad/ Frame 9076
26 KB
8 KB
Script
General
Full URL
https://ads.rubiconproject.com/ad/9818.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache / PHP/5.3.3
Resource Hash
d02197080b9680999381b5f5337fedd92674e5a1550ddfcc0c70612d3170a5e3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:52 GMT
Content-Encoding
gzip
Server
Apache
X-Powered-By
PHP/5.3.3
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=4860
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
7558
Expires
Tue, 30 Oct 2018 20:11:52 GMT
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/ Frame 9076
73 KB
27 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
13112639ea5d320063c21803f0172ec3273678f4d8a6215df67c4774659a233e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 24 Oct 2018 17:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
524242
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27234
x-xss-protection
1; mode=block
server
cafe
etag
10801174140179827322
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 07 Nov 2018 17:13:30 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame 9076
282 KB
87 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_270.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
95.100.199.29 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-199-29.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2b28e861a4e45fd1f546a63afabd2f757f8f9e18ec13a5316812237d02a74ecc

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:52 GMT
Content-Encoding
gzip
Last-Modified
Tue, 16 Oct 2018 15:02:25 GMT
Server
AmazonS3
x-amz-request-id
5DA367EBA3BC986D
ETag
"de2606cae8bdc1e40ebf6e50b8adf558"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=35710
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88514
x-amz-id-2
SCylKO0dapbxpVhLg5v7zBl6YgBsoGs4cCRduNC7JRMCd5MWia67iP1mc8n66uXsRPO/UgH7vdA=
adKit.min.js
rev.cbsi.com/common/js/ Frame 0124
6 KB
2 KB
Script
General
Full URL
https://rev.cbsi.com/common/js/adKit.min.js?2065881052
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.100.197.129 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-197-129.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
576e8bf4510a62d7cdcfedd8b749f3039d0c5aa8b2bdfe2e38a44645e0f982e4

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:52 GMT
Content-Encoding
gzip
Last-Modified
Mon, 07 Nov 2016 21:14:51 GMT
Server
Apache
ETag
"61acd092be7016e54f2dac81f3076225:1478553291"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2158
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/ Frame 0124
73 KB
27 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
13112639ea5d320063c21803f0172ec3273678f4d8a6215df67c4774659a233e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 24 Oct 2018 17:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
524242
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27234
x-xss-protection
1; mode=block
server
cafe
etag
10801174140179827322
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 07 Nov 2018 17:13:30 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame 0124
282 KB
87 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_270.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
95.100.199.29 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-199-29.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2b28e861a4e45fd1f546a63afabd2f757f8f9e18ec13a5316812237d02a74ecc

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:52 GMT
Content-Encoding
gzip
Last-Modified
Tue, 16 Oct 2018 15:02:25 GMT
Server
AmazonS3
x-amz-request-id
5DA367EBA3BC986D
ETag
"de2606cae8bdc1e40ebf6e50b8adf558"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=35710
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88514
x-amz-id-2
SCylKO0dapbxpVhLg5v7zBl6YgBsoGs4cCRduNC7JRMCd5MWia67iP1mc8n66uXsRPO/UgH7vdA=
view
securepubads.g.doubleclick.net/pcs/ Frame 40EA
0
63 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvOyqzMGE20prX4sRo7W-a2o7_dPM-ytk4AGraHEeuGSlO5eD37zgXyqgu6wVqB1YVGN0HTIsT9ye7DdWTsto1ESLnrs1Yno1W0kXqWkED8GKh28EfnqK8kJvAy3GegAcPDF8vfHnTqemwA5PEUb0iceMkFmqsgCjWfqonJq78ZV7nbKGjimtne5BGdwcDlf2jdOgMGCVyHir4UPfAmV0i8-3buSrGmMpiDJ3V8ZhSU7ppWDwRJl6RsET9zj9view&sai=AMfl-YQN-s3_RuDoxtoT9ayBv4M-FgozDNzWZ1DqojoDfscThOHHT2eTqH5lHVtOVpkecxKevTmT2vwH0R43tVoOvfZFz9QYOedUBfWnoizlrhfNoSaOV6IJIbkuI4g&sig=Cg0ArKJSzKweY2OrsfvVEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 18:50:52 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame F0CE
0
63 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuWKjLZqn4Ay50Klr1jEjhvpU3jYMWLvHrRheYbmDbM0VpzYd5taejAfbscTOQOQ0HLQIlJwaX29d6i56tk2y9fH41qmmk5gSgfg3yFHSVwh7yPpbuhJ9YKz7WHplbOCsLtQlzgwjUCsUmqqE4oDGoNUycIG2FmdB10ueMAwXmaGZNmyGNrfM5SwbmfephUNf1_MRzM9M4z-a4YEqadCIhsZ4wFVSZWxR8X-x6vLvx_ywDjKGgU1LMkycQLAKStww&sai=AMfl-YT2Le_RdKz3mswoC7zovRz9so4apTg2zgR3LZatAombKB0MQDF_dfn_8mQaQt8jZRyRZ8Z8_7ekvs0x4yckO241sb3O0waMLQKlK3HlFM6YOKQNidtUTKh49Ow&sig=Cg0ArKJSzBxfWU5Wn4S5EAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 18:50:52 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame 76DF
0
54 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsulR_ffBVHRyulzBoSJmDD5DIUYZ_-dmWvWKHG4DbGFLKpejd0WbrxOCD0oHH6Lyv9mnlT6tO0em6-TBBeFEOnQ7vLh8IX_VYCfewiGECLnUtri56SHTVO0L88XATyL6gejGgcPg4iNdw5j3bSo_nVmbOmwf3g_82OI2NnEnPDiHpiRw_A2H2cl7byZdqA3iaOubUL_zDr00scPwlqaVhKEYmmaWdr1gVZ007wsmsSzBg941iOUetvodKjR&sai=AMfl-YRgiNSd25SgnoFlstoyXL2kXk1fygxWZSxREm5YKtY-CkkPh14QN_eumJtFci0hTgr7YHfD5zyCrLaanIbrwXq--rPisY-rnzXXhkhFCHhf4yqh6B91XmlQjsI&sig=Cg0ArKJSzDtVZfCFBZhQEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 18:50:52 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame C70B
0
63 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvQcBYgLlOaMzrTWfLsKpzemXkeoei8umhBxxONmij-50ArHtM2qRw4NZ63JGOUHUfZup-JRDrAjMB3dklKmybUcwCBZNyqzvaHgGfdCMBy_FRsnC1LjfKzBhzoHoZR8TqaAFZgwa45HNGOQ0Ak-7n66skAPqZ8CAjWM8GfyRer9rTiOGFty0E8wilbxTOwt14e0mgg8C6LlNh87XeCU6UirGJxLU3Cbwp9z4NKmBHMQKz-fF3T2U-_wGAw&sai=AMfl-YRCTLoKA_n4XCo6Bbln9Gp6jkVWEsKd1O3182XMcuMtkRKpV_1D5q-8lrsvcnPI18-OdMAqXpDhy6yB_Od6dIRvn17nHNIy2pYtkNhusdzAiFSbQn2Y6w6-KQM&sig=Cg0ArKJSzIZKPqqRz-eWEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 18:50:52 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame 7C85
0
63 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvliX4pgseYgcdOW8Gmu7ZBb-X0S1pSd-iDVkOdOg3KIXj8U-7G6WyhZGEp3qyFPDtQ-EkqK8mAAOr7bdYyqV7go9lsZi-eQZ8qulTP9n4gfVKbYrrq14KF10K-sRa6injh83j_HFi_EBmt6WW72T_zyd0ToiTVMihIcfsDokHlDX5vw7Yaa0EvdzlaawzTk1WoygjL2DabZBPyRRBHQsvZvQ2NhrtJPuaaDqL_OHHVwIpQGQoKWbujgaGV&sai=AMfl-YT9ge0gKp9Xk9NBRVpl8CCX9ojR_yrVql_enEjdYDFS5Kzl9vxQVzLGF22-pBsdhEhor0G9eKngAgMTUgPEeNAzCJu5bamYyFvppzEFPZcNljNiP0GQtjVc0n8&sig=Cg0ArKJSzLzIimpXpYEMEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 18:50:52 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame 6430
0
63 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsviWY94e6-T5FiUMhHhtP7vOBUSYV-aG1TOerOMJkDs64lCBF-68bb3SookIUDxsPxiiTv5Us4xZlRxfFPS9xG6qUT_L9JwtOSbUJ7cEgGD2KU7PHsuTBJ4NJr74wg-OF9xPMH6-uo6Q2FS52-R4nwQrO4Z1dyuAbJGGJs3aWfEJafSDBnX2ZJPmZjimADHCLPJ80TYy3h4fFpoFsFOYjfyhT9A3QttYjFI10wJc22U1_bw-mLToNC86cP9ou-C&sai=AMfl-YRYvRXDx1s-0ofCZ-FawkIlgVsxT40ojnICLfyx4TTRcYipjsEL8XTbT7uSE4W8uyneNDw9hPnU_jGBReYNG-0H3VdPb5ujVwQgN-9fstagfImdEEXvp-h7u_A&sig=Cg0ArKJSzPNsGB009sQ1EAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 18:50:52 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame 9076
0
63 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsud_uWQuXXpPh9zbyYWfaeGEcCBTUxKfUcvHgwxAhNXBHqvbvrgZI2yXKV4g3drq7KFs4dxEudX450ldzg4ndS8bHZclOMVMLyCvoZ4vhmBnvFFCl4lvXCRCJG9MUOPDTqzWppWrbo_NZstZ_amgMk0wStqiwVXKZSP5jor0GLXqLJsUJ3qC1Y1ZcWWbz3n3dahxTLWooL9vuWlWVrXjk4Jaz0Mdu4ZlmIIgaK0aeMTS1XylWQi_NYmkmy2&sai=AMfl-YT1bjBLEMVilY_QqYkK5MueLvYrhsFZ610kpwiZoBtSUOP6VSnSP7PHLstEiJ78wXp3fg7BzTN3jQrCi3jP7PaoatLFypS9cXwCatqZbGlXcOyWRMdwdE_3AxI&sig=Cg0ArKJSzARtTOW2mK3pEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 18:50:52 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame 0124
0
54 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstscInEAaKCQBktYF9qO2ccsvrwI_sqzW6SDKeptSdXgdPS8bLSkQOcBw8Ok1sdZWMIfNHcJE1u2VEEQeyZItCEjZ5oAHJKPuDpVvToCoBNEriu7ojU_zdwTEgYR6HOCokUHNj-Prwg4sAtBp8hEIZ7USxobcJdTROwp-PpT07QB63l0qEIGfeJdAzC00pLLi1LFxNrzNmY4dt-SYyrmak3788ia01CXKMVTZt9xSFW9biZ8556arcYKsCSi4FQVg&sai=AMfl-YQH9ODFg8WZQRCeuo7xhMLYpN_jHU6wnRlh7sOAZoNlOtYpBtC_l8d7AsXYxu996xNBF0B7TlIs4pR08HErdLAiGapJ-aYkoAko_I7Gox-4god3S9kwP9UC4m4&sig=Cg0ArKJSzGlXtNGaNUWFEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 18:50:52 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
283812-2.js
optimized-by.rubiconproject.com/a/9818/59604/ Frame 76DF
2 KB
1 KB
Script
General
Full URL
https://optimized-by.rubiconproject.com/a/9818/59604/283812-2.js?&cb=0.34251928042669966&tk_st=1&rf=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp_s=c&p_pos=atf&p_screen_res=1600x1200&ad_slot=59604_2&rp_secure=1
Requested by
Host: ads.rubiconproject.com
URL: https://ads.rubiconproject.com/ad/9818.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.51 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
98234c157dab2505ce55b62f4f575262778d7c52ba4ecb11b0ae600e9e294d4f

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:52 GMT
Content-Encoding
gzip
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Connection
Keep-Alive
Content-Type
text/javascript
Keep-Alive
timeout=0, max=6
Content-Length
917
Expires
Wed, 17 Sep 1975 21:32:10 GMT
283812-15.js
optimized-by.rubiconproject.com/a/9818/59604/ Frame C70B
2 KB
1 KB
Script
General
Full URL
https://optimized-by.rubiconproject.com/a/9818/59604/283812-15.js?&cb=0.24171904733558836&tk_st=1&rf=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp_s=c&p_pos=atf&p_screen_res=1600x1200&ad_slot=59604_15&rp_secure=1
Requested by
Host: ads.rubiconproject.com
URL: https://ads.rubiconproject.com/ad/9818.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.51 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
836494094ab0330b69e4560b9acbf53fcdd7bcba0c27d4fc654c2527cf797a62

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:52 GMT
Content-Encoding
gzip
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Connection
Keep-Alive
Content-Type
text/javascript
Keep-Alive
timeout=0, max=4
Content-Length
922
Expires
Wed, 17 Sep 1975 21:32:10 GMT
283812-15.js
optimized-by.rubiconproject.com/a/9818/59604/ Frame 7C85
2 KB
1 KB
Script
General
Full URL
https://optimized-by.rubiconproject.com/a/9818/59604/283812-15.js?&cb=0.5749016206260387&tk_st=1&rf=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp_s=c&p_pos=btf&p_screen_res=1600x1200&ad_slot=59604_15&rp_secure=1
Requested by
Host: ads.rubiconproject.com
URL: https://ads.rubiconproject.com/ad/9818.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.51 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
6b9a89c48f2401d3a4d69b0e437e5ea5e958c4b2a271f63403b3561852d9353d

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:52 GMT
Content-Encoding
gzip
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Connection
Keep-Alive
Content-Type
text/javascript
Keep-Alive
timeout=0, max=8
Content-Length
920
Expires
Wed, 17 Sep 1975 21:32:10 GMT
283812-2.js
optimized-by.rubiconproject.com/a/9818/59604/ Frame 9076
2 KB
1 KB
Script
General
Full URL
https://optimized-by.rubiconproject.com/a/9818/59604/283812-2.js?&cb=0.411942536288052&tk_st=1&rf=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp_s=c&p_pos=btf&p_screen_res=1600x1200&ad_slot=59604_2&rp_secure=1
Requested by
Host: ads.rubiconproject.com
URL: https://ads.rubiconproject.com/ad/9818.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.51 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
49edd3c4d703a6c8a0f1715c982d13ed62b06fe8052ff05680a38a73ed84c5bd

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:52 GMT
Content-Encoding
gzip
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Connection
Keep-Alive
Content-Type
text/javascript
Keep-Alive
timeout=0, max=2
Content-Length
918
Expires
Wed, 17 Sep 1975 21:32:10 GMT
gpt.js
www.googletagservices.com/tag/js/ Frame 0124
24 KB
9 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: rev.cbsi.com
URL: https://rev.cbsi.com/common/js/adKit.min.js?2065881052
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:824::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cbe1f033ed03b9f1b425c1ad45d6406f019fe8666c20ab24fb6719579f75065b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:52 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"9 / 785 of 1000 / last-modified: 1540922836"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
8892
x-xss-protection
1; mode=block
expires
Tue, 30 Oct 2018 18:50:52 GMT
/
www.facebook.com/tr/ Frame DFBD
0
0
Document
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash

Request headers

:method
POST
:authority
www.facebook.com
:scheme
https
:path
/tr/
content-length
4576
pragma
no-cache
cache-control
no-cache
origin
https://www.zdnet.com
upgrade-insecure-requests
1
content-type
application/x-www-form-urlencoded
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
cookie
fr=0aMAVihKZf4HNit61..Bb2KgM...1.0.Bb2KgM.
Origin
https://www.zdnet.com
Upgrade-Insecure-Requests
1
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
content-type
text/plain
content-length
0
server
proxygen-bolt
date
Tue, 30 Oct 2018 18:50:52 GMT
show_ads.js
pagead2.googlesyndication.com/pagead/ Frame 76DF
54 KB
21 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/show_ads.js
Requested by
Host: optimized-by.rubiconproject.com
URL: https://optimized-by.rubiconproject.com/a/9818/59604/283812-2.js?&cb=0.34251928042669966&tk_st=1&rf=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp_s=c&p_pos=atf&p_screen_res=1600x1200&ad_slot=59604_2&rp_secure=1
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
334ecb5de067cf73650b13cd8a01b4493877bdbcb41405cde049e4fdcb14d487
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:52 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
21089
x-xss-protection
1; mode=block
server
cafe
etag
1636307937246973836
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 18:50:52 GMT
4ba24c54-d3ce-41ef-98d6-6979e786347e
beacon-eu-ams3.rubiconproject.com/beacon/d/ Frame 76DF
43 B
268 B
Image
General
Full URL
https://beacon-eu-ams3.rubiconproject.com/beacon/d/4ba24c54-d3ce-41ef-98d6-6979e786347e?oo=51&accountId=9818&siteId=59604&zoneId=283812&sizeId=2&e=6A1E40E384DA563BC6C0896F065CF041AF5880571BEFC4D7A67304E363D12B95B6033683531B2A57CE73E717E59EEF7EB8B520C6696685692E85556104A44E5973B8DC161C7827CA3570ECD3831C9446AC237D6FA0EBFC9ADFFA16DC2C67B30855F7CD1237413ACBF5BE0B04AD33F58D33F8630F2FDB6069
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.27 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
Rubicon Project /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:51 GMT
Cache-Control
private, max-age=0, no-cache
Server
Rubicon Project
Content-Type
image/webp
Content-Length
43
Expires
01 Jan 1970 10:00:00 GMT
show_ads.js
pagead2.googlesyndication.com/pagead/ Frame C70B
54 KB
21 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/show_ads.js
Requested by
Host: optimized-by.rubiconproject.com
URL: https://optimized-by.rubiconproject.com/a/9818/59604/283812-15.js?&cb=0.24171904733558836&tk_st=1&rf=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp_s=c&p_pos=atf&p_screen_res=1600x1200&ad_slot=59604_15&rp_secure=1
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
334ecb5de067cf73650b13cd8a01b4493877bdbcb41405cde049e4fdcb14d487
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:52 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
21089
x-xss-protection
1; mode=block
server
cafe
etag
1636307937246973836
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 18:50:52 GMT
0313fc43-5dd6-461c-b2e3-f4e8f0f0834b
beacon-eu-ams3.rubiconproject.com/beacon/d/ Frame C70B
43 B
268 B
Image
General
Full URL
https://beacon-eu-ams3.rubiconproject.com/beacon/d/0313fc43-5dd6-461c-b2e3-f4e8f0f0834b?oo=51&accountId=9818&siteId=59604&zoneId=283812&sizeId=15&e=6A1E40E384DA563B9E2096058C40A2F0B6E2C5916DEB75AD6723423BA07B7799E2C4E97EB96EFF128B5573821CF4FCF9FE5D718BBE08EF1C491A82B00AF8C38673B8DC161C7827CA3570ECD3831C9446AC237D6FA0EBFC9ADFFA16DC2C67B30855F7CD1237413ACBF5BE0B04AD33F58D33F8630F2FDB6069
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.27 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
Rubicon Project /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:52 GMT
Cache-Control
private, max-age=0, no-cache
Server
Rubicon Project
Content-Type
image/webp
Content-Length
43
Expires
01 Jan 1970 10:00:00 GMT
show_ads.js
pagead2.googlesyndication.com/pagead/ Frame 7C85
54 KB
21 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/show_ads.js
Requested by
Host: optimized-by.rubiconproject.com
URL: https://optimized-by.rubiconproject.com/a/9818/59604/283812-15.js?&cb=0.5749016206260387&tk_st=1&rf=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp_s=c&p_pos=btf&p_screen_res=1600x1200&ad_slot=59604_15&rp_secure=1
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
334ecb5de067cf73650b13cd8a01b4493877bdbcb41405cde049e4fdcb14d487
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:52 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
21089
x-xss-protection
1; mode=block
server
cafe
etag
1636307937246973836
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 18:50:52 GMT
17cd66aa-d2bd-472a-9932-9b3302836365
beacon-eu-ams3.rubiconproject.com/beacon/d/ Frame 7C85
43 B
268 B
Image
General
Full URL
https://beacon-eu-ams3.rubiconproject.com/beacon/d/17cd66aa-d2bd-472a-9932-9b3302836365?oo=51&accountId=9818&siteId=59604&zoneId=283812&sizeId=15&e=6A1E40E384DA563B76B371C1AB575C6C7B08C268379F1E5154035370B32E8904183C272485D64E723B3A892A01E01592B8B520C6696685690D3E486A85134C0A73B8DC161C7827CA3570ECD3831C9446AC237D6FA0EBFC9ADFFA16DC2C67B3085AFF71F4D2A3F65EF5BE0B04AD33F58D33F8630F2FDB6069
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.27 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
Rubicon Project /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:52 GMT
Cache-Control
private, max-age=0, no-cache
Server
Rubicon Project
Content-Type
image/webp
Content-Length
43
Expires
01 Jan 1970 10:00:00 GMT
glcfg510.js
cdn-gl.imrworldwide.com/novms/js/2/configs/
2 KB
1 KB
Script
General
Full URL
https://cdn-gl.imrworldwide.com/novms/js/2/configs/glcfg510.js
Requested by
Host: cdn-gl.imrworldwide.com
URL: https://cdn-gl.imrworldwide.com/novms/js/2/ggcmb510.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.93.121 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-93-121.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
acf3b5b3ade1391096f23120b725a032dce430448ba8aff2a6f0c3f9c598b2a3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 04 Oct 2018 18:49:04 GMT
Content-Encoding
gzip
Last-Modified
Wed, 03 Oct 2018 17:26:15 GMT
Server
AmazonS3
Age
102
x-amz-server-side-encryption
AES256
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
x-amz-version-id
l2xJuxUC0tglEkdOi9HXoncecbKiMqKp
Via
1.1 6e761598d9637d0090f3661d0d27be14.cloudfront.net (CloudFront)
Cache-Control
max-age=86400
Transfer-Encoding
chunked
Connection
keep-alive
Content-Type
application/javascript
X-Amz-Cf-Id
gFRUIpLJjbyQgiV6uveyZG2-wrIDZCo1_GkmW0Yd_23UfMtcO4aeLQ==
id
dpm.demdex.net/
2 KB
1 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=2.3.0&d_fieldgroup=AAM&d_rtbd=json&d_ver=2&d_orgid=10D31225525FF5790A490D4D%40AdobeOrg&d_nsid=0&d_mid=42232163989227135711106414016823143675&d_blob=RKhpRz8krg2tLO6pguXWp5olkAcUniQYPHaMWWgdJ3xzPWQmdj0y&d_cid_ic=AVID%012DEC540505313241-6000012C00000455&d_cid_ic=userId%01&d_cid_ic=puuid%01&ts=1540925452811
Requested by
Host: vidtech.cbsinteractive.com
URL: https://vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/adobe/AppMeasurement-2.3.0.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.247.143.160 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-247-143-160.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
3a94d7cc3c20a167505841d0a48b24cbae38288172c2086f6951117dec60c413

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v006-0be673e4c.edge-irl1.demdex.com 5.41.0.20181011114220 11ms
Pragma
no-cache
Content-Encoding
gzip
X-Error
300,300
X-TID
b9phlAkgTdg=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
701
Expires
Thu, 01 Jan 1970 00:00:00 GMT
bridge3.250.3_en.html
imasdk.googleapis.com/js/core/ Frame D255
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.250.3_en.html
Requested by
Host: s0.2mdn.net
URL: https://s0.2mdn.net/instream/html5/ima3.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:816::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.250.3_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
173878
date
Tue, 30 Oct 2018 03:53:13 GMT
expires
Wed, 30 Oct 2019 03:53:13 GMT
last-modified
Tue, 30 Oct 2018 03:48:48 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
1; mode=block
cache-control
public, max-age=31536000
age
53859
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
client.js
s0.2mdn.net/instream/video/
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: s0.2mdn.net
URL: https://s0.2mdn.net/instream/html5/ima3.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2006 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:52 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
10523
x-xss-protection
1; mode=block
expires
Tue, 30 Oct 2018 18:50:52 GMT
/
www.zdnet.com/m3d0s1/xhr/right-rail/
9 KB
2 KB
XHR
General
Full URL
https://www.zdnet.com/m3d0s1/xhr/right-rail/?promo=2150&count=3&siteId=2&rsid=cnetzdnetglobalsite&sl=en&sc=eu&pagetype=article&topicname=security&secondarytopicnames=internet+of+things&topicbrcrm=editorial&assetguid=7a12161d-2a5f-4793-b0a4-9fac038733de&assettitle=gigantic+100%2C000-strong+botnet+used+to+hijack+traffic+meant+for+brazilian+banks&assettype=content_article&devicetype=desktop&viewguid=7cae3897-1371-4826-8d8e-bfbd8614339a&upId=306794456&template=right-rail
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1531-fly/js/main.default.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
db9341a7a88ae4433c219a5efd8b73794e204b070385bc5f03713fe0799942f4
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/m3d0s1/xhr/right-rail/?promo=2150&count=3&siteId=2&rsid=cnetzdnetglobalsite&sl=en&sc=eu&pagetype=article&topicname=security&secondarytopicnames=internet+of+things&topicbrcrm=editorial&assetguid=7a12161d-2a5f-4793-b0a4-9fac038733de&assettitle=gigantic+100%2C000-strong+botnet+used+to+hijack+traffic+meant+for+brazilian+banks&assettype=content_article&devicetype=desktop&viewguid=7cae3897-1371-4826-8d8e-bfbd8614339a&upId=306794456&template=right-rail
pragma
no-cache
cookie
fly_device=desktop; fly_geo={"countryCode": "de"}; fly_preferred_edition=eu; fly_default_edition=eu; trc_cookie_storage=cbsinteractive-zdnet%253Asession-data%3Dv2_6cac2f81339b17ffba55fc0c94d5d0c2_5bffbdbd-b331-42d1-b8b0-3e3363fc2579-tuct2d22d87_1540925447_1540925447_CNawjgYQzro_GIG3wbLsLCABKAEwODib4wlAgooQSJjEF1Cl7BBYAWAA%7Ctaboola%2520global%253Alocal-storage-keys%3D%255B%2522cbsinteractive-zdnet%253Asession-data%2522%252C%2522taboola%2520global%253Auser-id%2522%255D%7Ctaboola%2520global%253Auser-id%3D5bffbdbd-b331-42d1-b8b0-3e3363fc2579-tuct2d22d87; ak_bmsc=4CBA7FD9480CE9B3851A895F675C762B0210BAB79817000008A8D85B8CDEA03B~plPWCmAGOVDdm23a8+NpG3VSq9T7inpPAfvtiHeK79FgqtulcnrlmWNeef4f+fFiOGltnClXTEFUuNGyKwORQ+BHo58xD2VO8gIdqjpfcEVMZTloU+p2RfXsgXBCfni+nZhblCT0PbrNydPoVUmyG9hkQKvZx1UJYXES5N/c5jgtIZIx+uSgYIiMm2yBKmaGIRc5hTqSvBuoIzn+R+SebIkB0BR2BlrXvrDnN11FOKO2w=; nemo_highlander-video_focus=video_focus%3a1%3aexclude; _ccmsi=1540925450448_vz23ofkk9|1540925450450; _ccmaid=5978151442409083984; zdnet_ad=%7B%22type%22%3A%22gpt%22%2C%22region%22%3A%22uk%22%2C%22session%22%3A%22e%22%2C%22subSession%22%3A%225%22%7D; first_page_today=false; LDCLGFbrowser=30a3f4c2-beb4-4744-8a81-f73f949d4ccc; GED_PLAYLIST_ACTIVITY=W3sidSI6IlFTR2oiLCJ0c2wiOjE1NDA5MjU0NTEsIm52IjowLCJ1cHQiOjE1NDA5MjU0NDMsImx0IjoxNTQwOTI1NDQzfV0.; XCLGFbrowser=fxeDYFvYqAqDMrogHq8; s_vnum=1543517450673%26vn%3D1; s_invisit=true; s_getNewRepeat=1540925450676-New; s_lv_zdnet=1540925450679; s_lv_zdnet_s=First%20Visit; AMCVS_10D31225525FF5790A490D4D%40AdobeOrg=1; AMCV_10D31225525FF5790A490D4D%40AdobeOrg=-894706358%7CMCMID%7C42232163989227135711106414016823143675%7CMCAAMLH-1541530250%7C6%7CMCAAMB-1541530250%7CRKhpRz8krg2tLO6pguXWp5olkAcUniQYPHaMWWgdJ3xzPWQmdj0y%7CMCOPTOUT-1540932650s%7CNONE%7CMCAID%7C2DEC540505313241-6000012C00000455%7CvVersion%7C2.3.0; s_cc=true; aam_uuid=42368779027364773391084610354461960579; viewGuid=7cae3897-1371-4826-8d8e-bfbd8614339a; utag_main=v_id:0166c65068590097e3aeb117dec800078006d07000b08$_sn:1$_ss:0$_st:1540927251514$ses_id:1540925450330%3Bexp-session$_pn:1%3Bexp-session$linktag:undefined%3Bexp-session; RT="dm=zdnet.com&si=90837c7d-2e7b-48b0-8cd4-ec0b522482af&ss=1540925441417&sl=2&tt=7828&obo=0&sh=1540925451541%3D2%3A0%3A7828%2C1540925445192%3D1%3A0%3A3732&bcn=%2F%2F36c3feec.akstat.io%2F&ld=1540925451541"; _fbp=fb.1.1540925452031.181729493; bm_last_load_status=NOT_BLOCKING; bm_monthly_unique=true; bm_daily_unique=true; fly_session=06qdjiad2uo6fb6dptkd8ogeg6; bm_sv=BDDC5581E53D19A061ACAB7FB2A4B40A~XAZWOsyr6xzUaelM6FgMrw1VNdaSgNiYMJi3M/VQIoYOaAEnM7vqmnaetcLDlz0GyJCuJj1+x/PxAqpqoIzsgs5ttVoHspK4Erd2ir/w8wPJIZu6GrQhufKViMmNzUMolgVH0LqD9F7uv0+RHA7mbOCBFlN6mlAvT6LtZ8LoxKE=; bm_sample_frequency=100; __gads=ID=218939691f48cbda:T=1540925451:S=ALNI_MZz-pSSTEXt8WKn_dQYIp5-1NKODA; upid_306794456=1
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
application/json, text/javascript, */*; q=0.01
cache-control
no-cache
:authority
www.zdnet.com
x-requested-with
XMLHttpRequest
:scheme
https
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
:method
GET
Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Accept-Encoding, User-Agent
content-length
1607
x-xss-protection
1; mode=block
pragma
no-cache
referrer-policy
no-referrer-when-downgrade
server
nginx
x-frame-options
SAMEORIGIN
date
Tue, 30 Oct 2018 18:50:53 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-tx-id
dca92e45-bb7a-48c3-8c23-d18aa797d89a
content-type
application/json
access-control-allow-origin
https://www.zdnet.com
cache-control
max-age=0, no-cache, no-store
set-cookie
bm_sv=BDDC5581E53D19A061ACAB7FB2A4B40A~XAZWOsyr6xzUaelM6FgMrw1VNdaSgNiYMJi3M/VQIoYOaAEnM7vqmnaetcLDlz0GyJCuJj1+x/PxAqpqoIzsgs5ttVoHspK4Erd2ir/w8wNFu/Lb9X0opzHXPCbxfiYmeXlubCZ67uW/h37G6wPgBLT0AYHDYCBLhiJDz1KV9K4=; Domain=.zdnet.com; Path=/; Max-Age=7198; HttpOnly
accept-ranges
bytes
expires
Tue, 30 Oct 2018 18:50:53 GMT
default-se4908240cd.png
zdnet1.cbsistatic.com/fly/images/sprites/video/controls/1x/
8 KB
8 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/fly/images/sprites/video/controls/1x/default-se4908240cd.png
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1531-fly/js/main.default.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
de4b8c1882f3c5f3e8d7ed920d1f4f31865ee05228fa7c60800656f3b279287d

Request headers

Referer
https://zdnet3.cbsistatic.com/fly/css/video/htmlPlayerControls/controls-ebaf8ad91a-rev.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:52 GMT
content-encoding
gzip
last-modified
Wed, 20 Jun 2018 17:00:35 GMT
server
nginx
etag
W/"5b2a8833-1e14"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
7728
expires
Tue, 06 Nov 2018 18:50:52 GMT
/
www.zdnet.com/video/selector/andromeda-botnet-malware-is-still-an-infection-issue/
3 KB
2 KB
XHR
General
Full URL
https://www.zdnet.com/video/selector/andromeda-botnet-malware-is-still-an-infection-issue/?acp=sz%3D640x483%26iu%3D%2F8264%2Fvaw-zdnet%2Fdesktop%2Fzdnet%26ciu_szs%3D300x60%26impl%3Ds%26gdfp_req%3D1%26env%3Dvp%26output%3Dxml_vmap1%26unviewed_position_start%3D1%26url%3Dhttps%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F%26description_url%3Dhttps%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F%26correlator%3D1540925452939%26cmsid%3D2289%26vid%3DWXE3_slFKFdtChIY_WrGbURUW8jGB7YM%26pp%3Dvpaid_js%26cust_params%3Dvid%253DWXE3_slFKFdtChIY_WrGbURUW8jGB7YM%2526ptype%253Darticle%2526vguid%253D7cae3897-1371-4826-8d8e-bfbd8614339a%2526session%253De%2526subses%253D5%2526microsite%253D%2526campaign%253D%2526cid%253Dgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2526collection%253D%2526mfr%253D%2526carrier%253D%2526section%253Deditorial%2526userGroup%253D%2526tag%253D%2526edition%253D%2526test%253D%2526score%253D%2526feat%253D%2526subcollection%253D%2526topic%253Dsecurity%2526sectopic%253D&m=%2Fvideo%2Fmanifest%2Fandromeda-botnet-malware-is-still-an-infection-issue.m3u8%3Fdevice%3Dott%26change-to-host%3Dtechrepublicmedia.akamaized.net%26secure%3Dtrue&callback=uvpHandleJsonpResult
Requested by
Host: vidtech.cbsinteractive.com
URL: https://vidtech.cbsinteractive.com/uvpjs/2.8.3/CBSI-PLAYER.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
59e2aae0477e88e37040cdb63b3bf0872e7a594e52d33dc9880b58ae0cbf863c
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/video/selector/andromeda-botnet-malware-is-still-an-infection-issue/?acp=sz%3D640x483%26iu%3D%2F8264%2Fvaw-zdnet%2Fdesktop%2Fzdnet%26ciu_szs%3D300x60%26impl%3Ds%26gdfp_req%3D1%26env%3Dvp%26output%3Dxml_vmap1%26unviewed_position_start%3D1%26url%3Dhttps%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F%26description_url%3Dhttps%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F%26correlator%3D1540925452939%26cmsid%3D2289%26vid%3DWXE3_slFKFdtChIY_WrGbURUW8jGB7YM%26pp%3Dvpaid_js%26cust_params%3Dvid%253DWXE3_slFKFdtChIY_WrGbURUW8jGB7YM%2526ptype%253Darticle%2526vguid%253D7cae3897-1371-4826-8d8e-bfbd8614339a%2526session%253De%2526subses%253D5%2526microsite%253D%2526campaign%253D%2526cid%253Dgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2526collection%253D%2526mfr%253D%2526carrier%253D%2526section%253Deditorial%2526userGroup%253D%2526tag%253D%2526edition%253D%2526test%253D%2526score%253D%2526feat%253D%2526subcollection%253D%2526topic%253Dsecurity%2526sectopic%253D&m=%2Fvideo%2Fmanifest%2Fandromeda-botnet-malware-is-still-an-infection-issue.m3u8%3Fdevice%3Dott%26change-to-host%3Dtechrepublicmedia.akamaized.net%26secure%3Dtrue&callback=uvpHandleJsonpResult
pragma
no-cache
cookie
fly_device=desktop; fly_geo={"countryCode": "de"}; fly_preferred_edition=eu; fly_default_edition=eu; trc_cookie_storage=cbsinteractive-zdnet%253Asession-data%3Dv2_6cac2f81339b17ffba55fc0c94d5d0c2_5bffbdbd-b331-42d1-b8b0-3e3363fc2579-tuct2d22d87_1540925447_1540925447_CNawjgYQzro_GIG3wbLsLCABKAEwODib4wlAgooQSJjEF1Cl7BBYAWAA%7Ctaboola%2520global%253Alocal-storage-keys%3D%255B%2522cbsinteractive-zdnet%253Asession-data%2522%252C%2522taboola%2520global%253Auser-id%2522%255D%7Ctaboola%2520global%253Auser-id%3D5bffbdbd-b331-42d1-b8b0-3e3363fc2579-tuct2d22d87; ak_bmsc=4CBA7FD9480CE9B3851A895F675C762B0210BAB79817000008A8D85B8CDEA03B~plPWCmAGOVDdm23a8+NpG3VSq9T7inpPAfvtiHeK79FgqtulcnrlmWNeef4f+fFiOGltnClXTEFUuNGyKwORQ+BHo58xD2VO8gIdqjpfcEVMZTloU+p2RfXsgXBCfni+nZhblCT0PbrNydPoVUmyG9hkQKvZx1UJYXES5N/c5jgtIZIx+uSgYIiMm2yBKmaGIRc5hTqSvBuoIzn+R+SebIkB0BR2BlrXvrDnN11FOKO2w=; nemo_highlander-video_focus=video_focus%3a1%3aexclude; _ccmsi=1540925450448_vz23ofkk9|1540925450450; _ccmaid=5978151442409083984; zdnet_ad=%7B%22type%22%3A%22gpt%22%2C%22region%22%3A%22uk%22%2C%22session%22%3A%22e%22%2C%22subSession%22%3A%225%22%7D; first_page_today=false; LDCLGFbrowser=30a3f4c2-beb4-4744-8a81-f73f949d4ccc; GED_PLAYLIST_ACTIVITY=W3sidSI6IlFTR2oiLCJ0c2wiOjE1NDA5MjU0NTEsIm52IjowLCJ1cHQiOjE1NDA5MjU0NDMsImx0IjoxNTQwOTI1NDQzfV0.; XCLGFbrowser=fxeDYFvYqAqDMrogHq8; s_vnum=1543517450673%26vn%3D1; s_invisit=true; s_getNewRepeat=1540925450676-New; s_lv_zdnet=1540925450679; s_lv_zdnet_s=First%20Visit; AMCVS_10D31225525FF5790A490D4D%40AdobeOrg=1; AMCV_10D31225525FF5790A490D4D%40AdobeOrg=-894706358%7CMCMID%7C42232163989227135711106414016823143675%7CMCAAMLH-1541530250%7C6%7CMCAAMB-1541530250%7CRKhpRz8krg2tLO6pguXWp5olkAcUniQYPHaMWWgdJ3xzPWQmdj0y%7CMCOPTOUT-1540932650s%7CNONE%7CMCAID%7C2DEC540505313241-6000012C00000455%7CvVersion%7C2.3.0; s_cc=true; aam_uuid=42368779027364773391084610354461960579; viewGuid=7cae3897-1371-4826-8d8e-bfbd8614339a; utag_main=v_id:0166c65068590097e3aeb117dec800078006d07000b08$_sn:1$_ss:0$_st:1540927251514$ses_id:1540925450330%3Bexp-session$_pn:1%3Bexp-session$linktag:undefined%3Bexp-session; RT="dm=zdnet.com&si=90837c7d-2e7b-48b0-8cd4-ec0b522482af&ss=1540925441417&sl=2&tt=7828&obo=0&sh=1540925451541%3D2%3A0%3A7828%2C1540925445192%3D1%3A0%3A3732&bcn=%2F%2F36c3feec.akstat.io%2F&ld=1540925451541"; _fbp=fb.1.1540925452031.181729493; bm_last_load_status=NOT_BLOCKING; bm_monthly_unique=true; bm_daily_unique=true; fly_session=06qdjiad2uo6fb6dptkd8ogeg6; bm_sv=BDDC5581E53D19A061ACAB7FB2A4B40A~XAZWOsyr6xzUaelM6FgMrw1VNdaSgNiYMJi3M/VQIoYOaAEnM7vqmnaetcLDlz0GyJCuJj1+x/PxAqpqoIzsgs5ttVoHspK4Erd2ir/w8wPJIZu6GrQhufKViMmNzUMolgVH0LqD9F7uv0+RHA7mbOCBFlN6mlAvT6LtZ8LoxKE=; bm_sample_frequency=100; __gads=ID=218939691f48cbda:T=1540925451:S=ALNI_MZz-pSSTEXt8WKn_dQYIp5-1NKODA; upid_306794456=1; zdnetSettingsPermanent=%7B%22autoplayEnabled%22%3A%22on%22%7D
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.zdnet.com
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
:scheme
https
:method
GET
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Accept-Encoding, User-Agent
content-length
1012
x-xss-protection
1; mode=block
pragma
no-cache
referrer-policy
no-referrer-when-downgrade
server
nginx
x-frame-options
SAMEORIGIN
date
Tue, 30 Oct 2018 18:50:53 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-tx-id
0618620e-57e3-4551-8eed-84e66909a242
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
cache-control
max-age=0, no-cache, no-store
set-cookie
bm_sv=BDDC5581E53D19A061ACAB7FB2A4B40A~XAZWOsyr6xzUaelM6FgMrw1VNdaSgNiYMJi3M/VQIoYOaAEnM7vqmnaetcLDlz0GyJCuJj1+x/PxAqpqoIzsgs5ttVoHspK4Erd2ir/w8wOuoUQhA9MCZPdgRoAsGW7ZrzqWxKBWHuqvScH0mYI5+QP9f4XeJsj0T9qOUASChaw=; Domain=.zdnet.com; Path=/; Max-Age=7198; HttpOnly
accept-ranges
bytes
expires
Tue, 30 Oct 2018 18:50:53 GMT
integrator.js
adservice.google.de/adsid/ Frame 0124
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:815::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 18:50:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
integrator.js
adservice.google.com/adsid/ Frame 0124
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:820::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 18:50:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
pubads_impl_270.js
securepubads.g.doubleclick.net/gpt/ Frame 0124
184 KB
63 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_270.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
sffe /
Resource Hash
516b065177d1546683627fa32c8574fd59edc3eb3bf92cef5882d53e58d7a1f2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 24 Oct 2018 15:56:38 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
64036
x-xss-protection
1; mode=block
expires
Tue, 30 Oct 2018 18:50:53 GMT
show_ads.js
pagead2.googlesyndication.com/pagead/ Frame 9076
54 KB
21 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/show_ads.js
Requested by
Host: optimized-by.rubiconproject.com
URL: https://optimized-by.rubiconproject.com/a/9818/59604/283812-2.js?&cb=0.411942536288052&tk_st=1&rf=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp_s=c&p_pos=btf&p_screen_res=1600x1200&ad_slot=59604_2&rp_secure=1
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
334ecb5de067cf73650b13cd8a01b4493877bdbcb41405cde049e4fdcb14d487
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
21089
x-xss-protection
1; mode=block
server
cafe
etag
1636307937246973836
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 18:50:53 GMT
b27991b5-3cf1-4b79-b96c-7348965434df
beacon-eu-ams3.rubiconproject.com/beacon/d/ Frame 9076
43 B
268 B
Image
General
Full URL
https://beacon-eu-ams3.rubiconproject.com/beacon/d/b27991b5-3cf1-4b79-b96c-7348965434df?oo=51&accountId=9818&siteId=59604&zoneId=283812&sizeId=2&e=6A1E40E384DA563B71CA76BC792D0F2519E4A27E8E690908EEF77824EBFDBA57A3016BBC32F880735CC846EF3F154AD8B8B520C6696685690E126797EB39E43173B8DC161C7827CA3570ECD3831C9446AC237D6FA0EBFC9ADFFA16DC2C67B30855F7CD1237413ACBF5BE0B04AD33F58D33F8630F2FDB6069
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.27 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
Rubicon Project /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:52 GMT
Cache-Control
private, max-age=0, no-cache
Server
Rubicon Project
Content-Type
image/webp
Content-Length
43
Expires
01 Jan 1970 10:00:00 GMT
n.js
geo.moatads.com/ Frame 40EA
105 B
369 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&i=CBSDFPCW2&hp=1&cm=21&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1540925453074&de=311237404060&m=0&ar=7554d5b-clean&q=2&cb=0&cu=1540925453074&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25477209%3A2356361194%3A4745699004%3A138245072116&zMoatPS=nav&zMoatPT=article&zMoatW=5&zMoatH=5&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatSN=e&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=nav-ad&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=nav-ad-5bd8a808c3bef&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=nav&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=5x5&zMoatSZPS=5x5%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&tz=nav-ad&fs=152610&na=1193529021&cs=0&callback=MoatSuperV26.gna681793
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.56.60.241 London, United Kingdom, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-56-60-241.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
5d709cd2ece581d32b2706c9929833171a420869b75144ffa788d3c1837966cf

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:53 GMT
Server
nginx/1.7.9
Etag
"bc9b8a8e23a72d1d150a9e171381402f18ab4291"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
105
integrator.js
adservice.google.de/adsid/ Frame 76DF
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:815::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 18:50:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
integrator.js
adservice.google.com/adsid/ Frame 76DF
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:820::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 18:50:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
ca-pub-1991679624331369.js
pagead2.googlesyndication.com/pub-config/r20160913/ Frame 76DF
68 B
149 B
Script
General
Full URL
https://pagead2.googlesyndication.com/pub-config/r20160913/ca-pub-1991679624331369.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8ba131a677ea1357ae7fdc95d6a5c67c3b02d171bb286f6c9ec6bce3cef5c211
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:28:25 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
age
1348
content-type
text/javascript
status
200
cache-control
public, max-age=43200
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
88
x-xss-protection
1; mode=block
expires
Wed, 31 Oct 2018 06:28:25 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/ Frame 76DF
201 KB
75 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
181124d1788d7083ab1de6fbeb87f524e1a3c9658ccdf54c4f49ab523df2253c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
76196
x-xss-protection
1; mode=block
server
cafe
etag
4706987710021974220
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 18:50:53 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/ Frame 55E2
201 KB
75 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
181124d1788d7083ab1de6fbeb87f524e1a3c9658ccdf54c4f49ab523df2253c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
76196
x-xss-protection
1; mode=block
server
cafe
etag
4706987710021974220
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 18:50:53 GMT
usync.html
eus.rubiconproject.com/ Frame 5BA6
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Tue, 09 Oct 2018 10:25:22 GMT
Content-Encoding
gzip
Content-Length
7376
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=46320
Expires
Wed, 31 Oct 2018 07:42:53 GMT
Date
Tue, 30 Oct 2018 18:50:53 GMT
Connection
keep-alive
Vary
Accept-Encoding
truncated
/ Frame 76DF
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6a52cd01d17f6094337d77bc15f76747b0349c76743c03584db3e27fceb9fc7a

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
loader.js
cdn.taboola.com/libtrc/cbsinteractive-zdnet/
300 KB
25 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/cbsinteractive-zdnet/loader.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
e8fbf8db616650d5b08cb758762c38c26941919a847efb0bef3c95a058852020

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
ry_GPvw_TlDczLt67fVcCSvAZvgmlfVI
content-encoding
gzip
etag
"3e43997d238842c634d9c8a4726c0c54"
age
44
x-cache
HIT
status
200
x-amz-replication-status
COMPLETED
content-length
25602
x-amz-id-2
1UmPVR4kVcSUiZqRUIPBUrNDbsRho3rK42KsCJu8qtnzqsibvgOqdfkl6iImH4Buc+eR8PCm0R0=
x-served-by
cache-fra19134-FRA
last-modified
Mon, 29 Oct 2018 10:03:37 GMT
server
AmazonS3
x-timer
S1540925453.284865,VS0,VE0
date
Tue, 30 Oct 2018 18:50:53 GMT
vary
Accept-Encoding
x-amz-request-id
9EEBD4352C7158E2
via
1.1 varnish
cache-control
private,max-age=14401
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
abp
30
x-cache-hits
2
n.js
geo.moatads.com/ Frame 6430
104 B
368 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&i=CBSDFPCW2&hp=1&cm=22&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1540925453258&de=232227895396&m=0&ar=7554d5b-clean&q=6&cb=0&cu=1540925453258&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=29319009%3A147075009%3A130394889%3A43343691249&zMoatPS=bottom&zMoatPT=article&zMoatW=300&zMoatH=250&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatSN=e&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=mpu-bottom&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=mpu-bottom-5bd8a808c3bef&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=bottom&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=300x250&zMoatSZPS=300x250%20%7C%20bottom&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&tz=mpu-bottom&fs=152610&na=1308755795&cs=0&callback=MoatSuperV26.gna133115
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.56.60.241 London, United Kingdom, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-56-60-241.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
ead7edcc25d57321f260c135ba44e0ce47161f30a35b05498c55dbc279f3533d

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:53 GMT
Server
nginx/1.7.9
Etag
"812d3cf821412121943f1767938ed4de7a941c6c"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
104
n.js
geo.moatads.com/ Frame 0124
106 B
370 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&i=CBSDFPCW2&hp=1&cm=9&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1540925453299&de=741013576905&m=0&ar=7554d5b-clean&q=10&cb=0&cu=1540925453299&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25477209%3A2356361194%3A4825966980%3A138247024569&zMoatPS=top&zMoatPT=article&zMoatW=371&zMoatH=771&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatSN=e&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=dynamic-showcase-top&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=dynamic-showcase-top-5bd8a808c3bef&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=371x771&zMoatSZPS=371x771%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&tz=dynamic-showcase-top&fs=152610&na=613760675&cs=0&callback=MoatSuperV26.gna97157
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.56.60.241 London, United Kingdom, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-56-60-241.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
d35492024b7c78171ff20f734caf34b90adc3fb11bb221583596fead7bc4af2a

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:53 GMT
Server
nginx/1.7.9
Etag
"f80285b9f24b529061ddc617c74453169bf124ff"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
106
n.js
geo.moatads.com/ Frame F0CE
106 B
370 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&i=CBSDFPCW2&hp=1&cm=9&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1540925453342&de=196133686141&m=0&ar=7554d5b-clean&q=14&cb=0&cu=1540925453342&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25477209%3A2356361194%3A4745166436%3A138239321298&zMoatPS=top&zMoatPT=article&zMoatW=1600&zMoatH=1000&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatSN=e&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=skin&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=skin-5bd8a808c3bef&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=1600x1000&zMoatSZPS=1600x1000%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&tz=skin&fs=152610&na=603239797&cs=0&callback=MoatSuperV26.gna332315
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.56.60.241 London, United Kingdom, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-56-60-241.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
1f732efec78b01b62862c2e49e64ed5268ffa7d939d09348a19580de728cce24

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:53 GMT
Server
nginx/1.7.9
Etag
"68f36f5babf86750b444035b3cdaa21a52fed68b"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
106
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CBSDFPCW2&hp=1&cm=9&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1540925453342&de=196133686141&m=0&ar=7554d5b-clean&q=15&cb=0&cu=1540925453342&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25477209%3A2356361194%3A4745166436%3A138239321298&zMoatPS=top&zMoatPT=article&zMoatW=1600&zMoatH=1000&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatSN=e&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=skin&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=skin-5bd8a808c3bef&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=1600x1000&zMoatSZPS=1600x1000%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&tz=skin&fs=152610&na=1552531346&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
92.123.186.115 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a92-123-186-115.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:53 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:53 GMT
integrator.js
adservice.google.de/adsid/ Frame C70B
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:815::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 18:50:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
integrator.js
adservice.google.com/adsid/ Frame C70B
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:820::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 18:50:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
ca-pub-1991679624331369.js
pagead2.googlesyndication.com/pub-config/r20160913/ Frame C70B
68 B
0
Script
General
Full URL
https://pagead2.googlesyndication.com/pub-config/r20160913/ca-pub-1991679624331369.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8ba131a677ea1357ae7fdc95d6a5c67c3b02d171bb286f6c9ec6bce3cef5c211
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

date
Tue, 30 Oct 2018 18:28:25 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
age
1348
content-type
text/javascript
status
200
cache-control
public, max-age=43200
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
88
x-xss-protection
1; mode=block
expires
Wed, 31 Oct 2018 06:28:25 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/ Frame C70B
201 KB
75 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
181124d1788d7083ab1de6fbeb87f524e1a3c9658ccdf54c4f49ab523df2253c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
76196
x-xss-protection
1; mode=block
server
cafe
etag
4706987710021974220
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 18:50:53 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/ Frame BE31
201 KB
75 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
181124d1788d7083ab1de6fbeb87f524e1a3c9658ccdf54c4f49ab523df2253c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
76196
x-xss-protection
1; mode=block
server
cafe
etag
4706987710021974220
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 18:50:53 GMT
usync.html
eus.rubiconproject.com/ Frame 1DFD
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Tue, 09 Oct 2018 10:25:22 GMT
Content-Encoding
gzip
Content-Length
7376
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=46320
Expires
Wed, 31 Oct 2018 07:42:53 GMT
Date
Tue, 30 Oct 2018 18:50:53 GMT
Connection
keep-alive
Vary
Accept-Encoding
truncated
/ Frame C70B
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
dcd24b17716b1aa1d90d5fbe0b40875aa35592d58f93f58ce85e568d74a8d89f

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
n.js
geo.moatads.com/ Frame C70B
107 B
371 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&i=CBSDFPCW2&hp=1&cm=19&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1540925453634&de=628235450059&m=0&ar=7554d5b-clean&q=18&cb=0&cu=1540925453634&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25299489%3A251370729%3A253246569%3A75375443409&zMoatPS=top&zMoatPT=article&zMoatW=300&zMoatH=250&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatSN=e&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=mpu-plus-top&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=mpu-plus-top-5bd8a808c3bef&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=300x250&zMoatSZPS=300x250%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&tz=mpu-plus-top&fs=152610&na=692968942&cs=0&callback=MoatSuperV26.gna364523
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.56.60.241 London, United Kingdom, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-56-60-241.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
52b6d8acaefb32fccfabf99d4f007604683667ebc24b0d1eb07226935a57b706

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:53 GMT
Server
nginx/1.7.9
Etag
"72a9220911a943aa8fad87ff17e5bf3c3dcdffa8"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
107
PF7B87067-BF4D-F80F-E040-070AAD316CE6.js
cdn-gl.imrworldwide.com/conf/
42 KB
8 KB
Script
General
Full URL
https://cdn-gl.imrworldwide.com/conf/PF7B87067-BF4D-F80F-E040-070AAD316CE6.js
Requested by
Host: cdn-gl.imrworldwide.com
URL: https://cdn-gl.imrworldwide.com/novms/js/2/configs/glcfg510.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.93.121 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-93-121.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
6b427999e0f387d247e672f14bfbe5d79a41e6976583b073e3f3af6624279827

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:41:48 GMT
Content-Encoding
gzip
Last-Modified
Tue, 30 Oct 2018 18:25:40 GMT
Server
AmazonS3
Age
546
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
x-amz-version-id
WIsR9BC4xQyOIS6.8bur6fDe8XOf31Xp
Via
1.1 6e761598d9637d0090f3661d0d27be14.cloudfront.net (CloudFront)
Transfer-Encoding
chunked
Connection
keep-alive
Content-Type
application/javascript
X-Amz-Cf-Id
bKbmiJx_G3jDYijY4UCvi7R3vkkVRlh6k_UOAOo0GIXVXRZ1cueL8Q==
integrator.js
adservice.google.de/adsid/ Frame 7C85
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:815::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 18:50:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
integrator.js
adservice.google.com/adsid/ Frame 7C85
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:820::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 18:50:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
ca-pub-1991679624331369.js
pagead2.googlesyndication.com/pub-config/r20160913/ Frame 7C85
68 B
0
Script
General
Full URL
https://pagead2.googlesyndication.com/pub-config/r20160913/ca-pub-1991679624331369.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8ba131a677ea1357ae7fdc95d6a5c67c3b02d171bb286f6c9ec6bce3cef5c211
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

date
Tue, 30 Oct 2018 18:28:25 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
age
1348
content-type
text/javascript
status
200
cache-control
public, max-age=43200
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
88
x-xss-protection
1; mode=block
expires
Wed, 31 Oct 2018 06:28:25 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/ Frame 7C85
201 KB
75 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
181124d1788d7083ab1de6fbeb87f524e1a3c9658ccdf54c4f49ab523df2253c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
76196
x-xss-protection
1; mode=block
server
cafe
etag
4706987710021974220
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 18:50:53 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/ Frame 38DD
201 KB
75 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
181124d1788d7083ab1de6fbeb87f524e1a3c9658ccdf54c4f49ab523df2253c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
76196
x-xss-protection
1; mode=block
server
cafe
etag
4706987710021974220
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 18:50:53 GMT
usync.html
eus.rubiconproject.com/ Frame DB11
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Tue, 09 Oct 2018 10:25:22 GMT
Content-Encoding
gzip
Content-Length
7376
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=46320
Expires
Wed, 31 Oct 2018 07:42:53 GMT
Date
Tue, 30 Oct 2018 18:50:53 GMT
Connection
keep-alive
Vary
Accept-Encoding
truncated
/ Frame 7C85
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
90428e606fe3090e1fb68b0fd7e9c17a485fd167b9972cdcba01198a35c3c0fa

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
n.js
geo.moatads.com/ Frame 7C85
107 B
371 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&i=CBSDFPCW2&hp=1&cm=29&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1540925453970&de=876763735917&m=0&ar=7554d5b-clean&q=22&cb=0&cu=1540925453970&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25299489%3A251370729%3A241984809%3A75375443409&zMoatPS=middle&zMoatPT=article&zMoatW=300&zMoatH=250&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatSN=e&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=mpu-middle&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=mpu-middle-5bd8a808c3bef&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=middle&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=300x250&zMoatSZPS=300x250%20%7C%20middle&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&tz=mpu-middle&fs=152610&na=782396210&cs=0&callback=MoatSuperV26.gna831900
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.56.60.241 London, United Kingdom, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-56-60-241.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
a0d3b845fb71129ba15ac2069896fc0cfaa2ea26f7867663824fa048ffe196a4

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:54 GMT
Server
nginx/1.7.9
Etag
"1d2a96aa509cb8b1b94b38c2f5d55d223081f2b8"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
107
n.js
geo.moatads.com/ Frame 76DF
106 B
370 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&i=CBSDFPCW2&hp=1&cm=21&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1540925454180&de=702976702448&m=0&ar=7554d5b-clean&q=26&cb=0&cu=1540925454180&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25299489%3A251370729%3A253246569%3A75374362809&zMoatPS=top&zMoatPT=article&zMoatW=728&zMoatH=90&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatSN=e&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=leader-plus-top&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=leader-plus-top-5bd8a808c3bef&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=728x90&zMoatSZPS=728x90%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&tz=leader-plus-top&fs=152610&na=1344229209&cs=0&callback=MoatSuperV26.gna485826
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.56.60.241 London, United Kingdom, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-56-60-241.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
c16ca2e0825e57e0cd71270feefdf3b26f1355f00786b00fe6da98a1b27bc7dd

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:54 GMT
Server
nginx/1.7.9
Etag
"9c1d31c1484b889761aab42a55a533836147bc11"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
106
embed.js
zdnet-1.disqus.com/
64 KB
21 KB
Script
General
Full URL
https://zdnet-1.disqus.com/embed.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.120.134 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
openresty /
Resource Hash
9006f6aef1390864a8972a304f614dccb372a0a6e5745015c818f4a04dc70631
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:54 GMT
Content-Encoding
gzip
Server
openresty
Age
8
Vary
Accept-Encoding
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Cache-Control
private, max-age=60
X-Service
router
Strict-Transport-Security
max-age=300; includeSubdomains
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
Content-Length
21501
integrator.js
adservice.google.de/adsid/ Frame 9076
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:815::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 18:50:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
integrator.js
adservice.google.com/adsid/ Frame 9076
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:820::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 18:50:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
ca-pub-1991679624331369.js
pagead2.googlesyndication.com/pub-config/r20160913/ Frame 9076
68 B
0
Script
General
Full URL
https://pagead2.googlesyndication.com/pub-config/r20160913/ca-pub-1991679624331369.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8ba131a677ea1357ae7fdc95d6a5c67c3b02d171bb286f6c9ec6bce3cef5c211
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

date
Tue, 30 Oct 2018 18:28:25 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
age
1348
content-type
text/javascript
status
200
cache-control
public, max-age=43200
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
88
x-xss-protection
1; mode=block
expires
Wed, 31 Oct 2018 06:28:25 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/ Frame 9076
201 KB
75 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
181124d1788d7083ab1de6fbeb87f524e1a3c9658ccdf54c4f49ab523df2253c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
76196
x-xss-protection
1; mode=block
server
cafe
etag
4706987710021974220
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 18:50:54 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/ Frame 947D
201 KB
75 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
181124d1788d7083ab1de6fbeb87f524e1a3c9658ccdf54c4f49ab523df2253c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
76196
x-xss-protection
1; mode=block
server
cafe
etag
4706987710021974220
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 18:50:54 GMT
usync.html
eus.rubiconproject.com/ Frame 04E6
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Tue, 09 Oct 2018 10:25:22 GMT
Content-Encoding
gzip
Content-Length
7376
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=46319
Expires
Wed, 31 Oct 2018 07:42:53 GMT
Date
Tue, 30 Oct 2018 18:50:54 GMT
Connection
keep-alive
Vary
Accept-Encoding
truncated
/ Frame 9076
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
bbce582e0f47b50c24a60b95feaffa8905de180f8f4b2f217b5b4cc19a8cb0a9

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
n.js
geo.moatads.com/ Frame 9076
107 B
371 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&i=CBSDFPCW2&hp=1&cm=16&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1540925454288&de=526014994540&m=0&ar=7554d5b-clean&q=30&cb=0&cu=1540925454288&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25299489%3A251370729%3A241984809%3A75374362809&zMoatPS=bottom&zMoatPT=article&zMoatW=728&zMoatH=90&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatSN=e&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=leader-plus-bottom&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=leader-plus-bottom-5bd8a808c3bef&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=bottom&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=728x90&zMoatSZPS=728x90%20%7C%20bottom&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&tz=leader-plus-bottom&fs=152610&na=657634962&cs=0&callback=MoatSuperV26.gna341419
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.56.60.241 London, United Kingdom, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-56-60-241.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
14a0e543ed6d9061aaf69ff55440da2ea00dc1e9ae2c7632314e5722c1c225a9

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:54 GMT
Server
nginx/1.7.9
Etag
"dbdcfff130ddd11fbd07f2c828010c062d24f2b6"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
107
vglnk.js
cdn.viglink.com/api/
81 KB
28 KB
Script
General
Full URL
https://cdn.viglink.com/api/vglnk.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:a20d , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
009396e873c2f93482891861160df34a0a69bd1beaad7c5fc04d8dd36e4eec44

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:54 GMT
content-encoding
gzip
cf-cache-status
HIT
x-amz-request-id
BC4F97BA1F106EBB
status
200
content-length
28397
x-amz-id-2
J8zmvgfNzG4CAbCbuLht/1b8lYutez8aSXvKTUEfg4it7wLnVKLnn+V6bClwRuRWkmHXuBQrHDM=
last-modified
Wed, 24 Oct 2018 20:32:46 GMT
server
cloudflare
etag
"8132bd22613a0bbbdd73866340c33ab1"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=1800
accept-ranges
bytes
cf-ray
472011f9cdbcc2d8-FRA
expires
Tue, 30 Oct 2018 19:20:54 GMT
0.30782547735196863
saa.cbsi.com/b/ss/cbsib2bleadgen/1/G.4--NS/
43 B
615 B
Image
General
Full URL
https://saa.cbsi.com/b/ss/cbsib2bleadgen/1/G.4--NS/0.30782547735196863?AQB=1&ce=UTF%2D8&events=event66&v0=ftag_cd:LGN22ef1e6&v2=en&v3=desktop&v4=right-rail&v5=zdnet&v10=article&v20=gigantic+100%2C000-strong+botnet+used+to+hijack+traffic+meant+for+brazilian+banks&v22=content_article&v23=&v24=7cae3897-1371-4826-8d8e-bfbd8614339a&v30=7a12161d-2a5f-4793-b0a4-9fac038733de&v60=33161704,33163203,33163195&v64=2150&v69=&c0=D%3Dv0&c2=D%3Dv2&c3=D%3Dv3&c4=D%3Dv4&c5=D%3Dv5&c10=D%3Dv10&c20=D%3Dv20&c22=D%3Dv22&c23=D%3Dv23&c24=D%3Dv24&c30=D%3Dv30&c60=D%3Dv60&c64=D%3Dv64&c69=D%3Dv69&pe=lnk_o&pev2=medusa_impression&vid=201810302-leadgen-zdnet&mid=90240133173074011141898988208131324462&aid=2D535D450507F28B-40000106A0001145&AQE=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.140.43.37 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
cbsi.com.ssl.sc.omtrdc.net
Software
Omniture DC/2.0.0 /
Resource Hash
a1ecbaed793a1f564c49c671f2dd0ce36f858534ef6d26b55783a06b884cc506
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:54 GMT
X-Content-Type-Options
nosniff
X-C
ms-6.5.1
P3P
CP="This is not a P3P policy"
Connection
Keep-Alive
Content-Length
43
X-XSS-Protection
1; mode=block
Pragma
no-cache
Last-Modified
Wed, 31 Oct 2018 18:50:54 GMT
Server
Omniture DC/2.0.0
xserver
www26
ETag
"3309112215339073536-5665423891586091501"
Vary
*
Content-Type
image/gif
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Keep-Alive
timeout=15
Expires
Mon, 29 Oct 2018 18:50:54 GMT
e.gif
dw.cbsi.com/levt/ria/
43 B
369 B
Image
General
Full URL
https://dw.cbsi.com/levt/ria/e.gif?rsid=cnetzdnetglobalsite&sid=2&siteid=2&pagetype=article&assetguid=7a12161d-2a5f-4793-b0a4-9fac038733de&assettitle=gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20brazilian%20banks&assettype=content_article&pubdate=2018-10-01%2004%3A20%3A22&viewguid=7cae3897-1371-4826-8d8e-bfbd8614339a&devicetype=desktop&sitetype=responsive%20web&author=catalin%20cimpanu&authorid=85fd8691-f525-4ea2-a601-af296f629f7f&topicguid=113c25b6-ec91-11e3-95d2-02911863765e&topic=security&topicbrcrm=security&s8=cnetzdnetglobalsite&v23=cnetzdnetglobalsite&v19=article&v17=113c25b6-ec91-11e3-95d2-02911863765e&v20=7a12161d-2a5f-4793-b0a4-9fac038733de&v16=7cae3897-1371-4826-8d8e-bfbd8614339a&riaevent=impression&comptyp=spot&mapp=medusa_app&objtyp=medusa&eventt=log&v18=security&comp=ucwc&ts=1540925454362&tcset=utf8&im=dsjs&title=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&srcurl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.30.224.172 Fort Lauderdale, United States, ASN6623 (CBSI-1 - CBS Interactive Inc., US),
Reverse DNS
phx1-dw-cbsi-xw-lb.cnet.com
Software
Apache/2.4.25 /
Resource Hash
e586a84d8523747f42e510d78e141015b6424cf67d612854e892a7bcedc8ec9e

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:54 GMT
Server
Apache/2.4.25
Vary
*
Content-Type
image/gif
Cache-Control
no-cache, must-revalidate, no-transform
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=80, max=642
Content-Length
43
Expires
Fri, 23 Jan 1970 12:12:12 GMT
domains
api.viglink.com/api/
42 B
721 B
XHR
General
Full URL
https://api.viglink.com/api/domains
Requested by
Host: cdn.viglink.com
URL: https://cdn.viglink.com/api/vglnk.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.175.204 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-175-204.eu-west-1.compute.amazonaws.com
Software
Apache-Coyote/1.1 /
Resource Hash
8c59e808667e9d00547cfc0f45ace4f7021c7451e0b1510e8a47dd5634c6af24

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:53 GMT
Server
Apache-Coyote/1.1
P3P
CP="ALL IND DSP COR CUR ADM TAIo PSDo OUR COM INT NAV PUR STA UNI"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript;charset=UTF-8
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/ Frame 0124
27 KB
7 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2690798992275516&correlator=2667328933467232&output=json_html&callback=googletag.impl.pubads.callbackProxy1&impl=fifs&adsid=NT&json_a=1&eid=21061864%2C21062421&vrg=270&guci=1.2.0.0.2.2.0&plat=1%3A32776%2C2%3A32776&sc=1&sfv=1-0-30&iu_parts=8264%2Cuk-zdnet%2Csecurity&enc_prev_ius=%2F0%2F1%2F2%2C%2F0%2F1%2F2&prev_iu_szs=372x142%2C372x142&prev_scp=env%3Dprod%26session%3De%26subses%3D5%26ptype%3Darticle%26vguid%3D7cae3897-1371-4826-8d8e-bfbd8614339a%7Cenv%3Dprod%26session%3De%26subses%3D5%26ptype%3Darticle%26vguid%3D7cae3897-1371-4826-8d8e-bfbd8614339a&cookie_enabled=1&cdm=www.zdnet.com&bc=7&lmt=1540925454&dt=1540925454609&dlt=1540925451974&idt=2586&frm=23&biw=1585&bih=1200&isw=371&ish=771&oid=3&adxs=0%2C0&adys=0%2C0&adks=3261246841%2C3261246840&ucis=qxx0gupm19vb%7Cbx7gpex6jpkn&gut=v2&ifi=1&ifk=821850233&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&nhd=1&iag=3&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&top=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&dssz=16&icsg=43552&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x0%7C0x0&msz=0x0%7C0x0&ga_vid=867031684.1540925455&ga_sid=1540925455&ga_hid=1722350449&fws=256%2C256
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_270.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
7e32bef03f27fbe4027dabdede421fbd549793e6c07fd13b3dfe0654d5c0362f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com

Response headers

date
Tue, 30 Oct 2018 18:50:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
7208
x-xss-protection
1; mode=block
google-lineitem-id
4746066197,4746066197
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138239479696,138239375180
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_270.js
securepubads.g.doubleclick.net/gpt/ Frame 0124
54 KB
20 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_270.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_270.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
sffe /
Resource Hash
f7739b424d4acd048d584bf1bfa99a1ea5481989d1abb8948e9bf571729f2c72
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 24 Oct 2018 15:56:38 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
20717
x-xss-protection
1; mode=block
expires
Tue, 30 Oct 2018 18:50:54 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-30/html/ Frame 0124
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-30/html/container.html?n=1
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_270.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Purpose
prefetch
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

expires
Sat, 12 Oct 2019 19:46:34 GMT
cache-control
public, immutable, max-age=31536000
last-modified
Fri, 12 Oct 2018 04:28:13 GMT
content-type
text/html
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=58&fi=1&apd=115&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25477209&L2id=2356361194&L3id=4745166436&L4id=138239321298&S1id=23605329&S2id=23619609&ord=1540925453342&r=196133686141&t=meas&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=1&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.58.219.40 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-219-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:54 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:54 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=58&fi=1&apd=115&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25477209&L2id=2356361194&L3id=4745166436&L4id=138239321298&S1id=23605329&S2id=23619609&ord=1540925453342&r=196133686141&t=fv&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=2&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.58.219.40 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-219-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:54 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:54 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=115&tet=1000&fi=1&apd=1057&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25477209&L2id=2356361194&L3id=4745166436&L4id=138239321298&S1id=23605329&S2id=23619609&ord=1540925453342&r=196133686141&t=iv&os=1&fi2=0&div1=1&ait=471&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=3&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.58.219.40 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-219-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:54 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:54 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=115&tet=1000&fi=1&apd=1057&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25477209&L2id=2356361194&L3id=4745166436&L4id=138239321298&S1id=23605329&S2id=23619609&ord=1540925453342&r=196133686141&t=hdn&os=1&fi2=0&div1=1&ait=471&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=4&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.58.219.40 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-219-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:54 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:54 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=61&fi=1&apd=122&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1540925453634&r=628235450059&t=meas&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=1&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.58.219.40 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-219-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:54 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:54 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=61&fi=1&apd=122&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1540925453634&r=628235450059&t=fv&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=2&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.58.219.40 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-219-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:54 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:54 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=699&fi=1&apd=760&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1540925453634&r=628235450059&t=hdn&os=1&fi2=0&div1=0&ait=319&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=3&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.58.219.40 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-219-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:54 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:54 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&kq=1&lo=0&qs=1&ak=https%3A%2F%2Fwww.zdnet.com%2F%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2FBODY&i=CBSDFPCW2&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&bq=0&wp=3&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=1200&w=1600&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&cm=9&f=0&j=&o=3&t=1540925453342&de=196133686141&cu=1540925453342&m=155&ar=7554d5b-clean&cb=0&ll=2&lm=0&ln=1&r=0&dl=0&dm=1000&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5909&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&as=0&ag=58&an=0&gf=58&gg=0&ix=58&ic=58&ez=1&aj=1&pg=100&pf=0&cc=0&bw=58&bx=0&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=115&cd=0&ah=115&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=25477209%3A2356361194%3A4745166436%3A138239321298&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=1600x1000&zMoatPS=top&zMoatSZPS=1600x1000%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&zMoatW=1600&zMoatH=1000&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatSN=e&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=skin&zMoatDfpSlotId=skin-5bd8a808c3bef&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=1%3A1&tz=skin&fs=152610&na=942380536&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
92.123.186.115 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a92-123-186-115.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:54 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:54 GMT
nlsSDK600_rc.bundle.min.js
cdn-gl.imrworldwide.com/novms/js/2/
149 KB
44 KB
Script
General
Full URL
https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600_rc.bundle.min.js
Requested by
Host: cdn-gl.imrworldwide.com
URL: https://cdn-gl.imrworldwide.com/conf/PF7B87067-BF4D-F80F-E040-070AAD316CE6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.93.121 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-93-121.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
1b0444818330c3a584261448523bb809287e5b1f417353a3e98c075132160d09

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 04 Oct 2018 18:51:07 GMT
Content-Encoding
gzip
Last-Modified
Wed, 03 Oct 2018 17:26:16 GMT
Server
AmazonS3
Age
86354
x-amz-server-side-encryption
AES256
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
x-amz-version-id
oilZlCdjjWz9M340erw0XCDnDJPMJxIl
Via
1.1 6e761598d9637d0090f3661d0d27be14.cloudfront.net (CloudFront)
Cache-Control
max-age=86400
Transfer-Encoding
chunked
Connection
keep-alive
Content-Type
application/javascript
X-Amz-Cf-Id
dHA5JoJ6Q-cVWRbs9ZwuBpRD58hLtXsVVdxrYsQbc5gHOcEHAr-WpQ==
lounge.d49f53e192b9080ef8880a7c9b24f1c3.css
c.disquscdn.com/next/embed/styles/
102 KB
19 KB
Stylesheet
General
Full URL
https://c.disquscdn.com/next/embed/styles/lounge.d49f53e192b9080ef8880a7c9b24f1c3.css
Requested by
Host: zdnet-1.disqus.com
URL: https://zdnet-1.disqus.com/embed.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:4ea6 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
a8d842dc045c65986e7b50952261d47b62cab35c5829700e90d1965ec11692e3
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
19425
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Fri, 26 Oct 2018 00:31:19 GMT
server
cloudflare
fastly-debug-digest
eb1006ce43d6cade1496acb1e51569c1d94dd6f363a0a4e497669b5cee0f6289
etag
"5bd26057-4be1"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
cf-ray
472011fbe97ec2bf-FRA
expires
Sat, 26 Oct 2019 18:02:22 GMT
common.bundle.18932c85febf9520158697cdc31f08ae.js
c.disquscdn.com/next/embed/
242 KB
81 KB
Script
General
Full URL
https://c.disquscdn.com/next/embed/common.bundle.18932c85febf9520158697cdc31f08ae.js
Requested by
Host: zdnet-1.disqus.com
URL: https://zdnet-1.disqus.com/embed.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:4ea6 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
22a100e19a099737c0b9eec9c19b6fc7de17e16c2d25e3a89fca20778e98abc6
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
82684
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Tue, 09 Oct 2018 20:47:01 GMT
server
cloudflare
fastly-debug-digest
b18a35687fb6f9be652456ef708b8bccc57b9a97da44487936422a8a2012c75b
etag
"5bbd13c5-142fc"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
cf-ray
472011fbe981c2bf-FRA
expires
Wed, 09 Oct 2019 20:57:55 GMT
lounge.bundle.53ce1bd42cd56ff599219e9d5c200428.js
c.disquscdn.com/next/embed/
369 KB
96 KB
Script
General
Full URL
https://c.disquscdn.com/next/embed/lounge.bundle.53ce1bd42cd56ff599219e9d5c200428.js
Requested by
Host: zdnet-1.disqus.com
URL: https://zdnet-1.disqus.com/embed.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:4ea6 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
fabcdfb24504a16930326e89b6ae5d807374e5b74966910d21b2a329fbb18b28
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
98324
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Mon, 29 Oct 2018 19:14:20 GMT
server
cloudflare
fastly-debug-digest
b527851f0883645f34ef441ac1cc99d4f65b18d2e4ec7566e16c0a9e278f9e82
etag
"5bd75c0c-18014"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
cf-ray
472011fbe982c2bf-FRA
expires
Tue, 29 Oct 2019 21:39:02 GMT
config.js
disqus.com/next/
6 KB
3 KB
Script
General
Full URL
https://disqus.com/next/config.js
Requested by
Host: zdnet-1.disqus.com
URL: https://zdnet-1.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.64.134 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
c8ca200730ac9ce81c383bcaae625c5003930baade34e32b72b0ced38aaec320
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:54 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Age
19
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
2568
X-XSS-Protection
1; mode=block
Server
nginx
X-Frame-Options
SAMEORIGIN
Strict-Transport-Security
max-age=300; includeSubdomains
Content-Type
application/javascript; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
public, stale-while-revalidate=300, s-stalewhilerevalidate=3600, max-age=60
Timing-Allow-Origin
*
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=78&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=241984809&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1540925453970&r=876763735917&t=meas&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=1&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.58.219.40 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-219-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:54 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:54 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=480&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=241984809&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1540925453970&r=876763735917&t=hdn&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=2&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.58.219.40 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-219-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:54 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:54 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=16&fi=0&apd=31&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75374362809&S1id=23605329&S2id=23619609&ord=1540925454180&r=702976702448&t=meas&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=1&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.58.219.40 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-219-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:54 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:54 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=434&fi=0&apd=449&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75374362809&S1id=23605329&S2id=23619609&ord=1540925454180&r=702976702448&t=hdn&os=1&fi2=0&div1=0&ait=209&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=2&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.58.219.40 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-219-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:54 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:54 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=30&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=241984809&L4id=75374362809&S1id=23605329&S2id=23619609&ord=1540925454288&r=526014994540&t=meas&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=1&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.58.219.40 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-219-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:54 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:54 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=446&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=241984809&L4id=75374362809&S1id=23605329&S2id=23619609&ord=1540925454288&r=526014994540&t=hdn&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=2&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.58.219.40 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-219-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:54 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:54 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=446&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=241984809&L4id=75374362809&S1id=23605329&S2id=23619609&ord=1540925454288&r=526014994540&t=nht&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=3&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.58.219.40 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-219-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:54 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:54 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=760&tet=1049&fi=1&apd=1110&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1540925453634&r=628235450059&t=iv&os=1&fi2=0&div1=1&ait=669&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=4&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.58.219.40 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-219-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:54 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:54 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=760&tet=1049&fi=1&apd=1110&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1540925453634&r=628235450059&t=nht&os=1&fi2=0&div1=1&ait=669&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=5&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.58.219.40 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-219-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:54 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:54 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=115&tet=1368&fi=1&apd=1425&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25477209&L2id=2356361194&L3id=4745166436&L4id=138239321298&S1id=23605329&S2id=23619609&ord=1540925453342&r=196133686141&t=nht&os=1&fi2=0&div1=1&ait=839&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=5&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.58.219.40 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-219-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:54 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:54 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=787&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=241984809&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1540925453970&r=876763735917&t=nht&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=3&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.58.219.40 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-219-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:54 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:54 GMT
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20181024/r20180604/ Frame 3D51
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/html/r20181024/r20180604/zrt_lookup.html
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:80b::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/html/r20181024/r20180604/zrt_lookup.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
cookie
IDE=AHWqTUlrrBJ32mZN6wUxDKpuoMS0_pKRr3gc4Y83g01_6vFv7UfImYaGuIbOIvkZ
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
vary
Accept-Encoding
date
Thu, 25 Oct 2018 05:45:53 GMT
expires
Thu, 08 Nov 2018 05:45:53 GMT
content-type
text/html; charset=UTF-8
etag
12810928231326100212
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
6940
x-xss-protection
1; mode=block
cache-control
public, max-age=1209600
age
479101
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
ads
googleads.g.doubleclick.net/pagead/ Frame BD38
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=250&slotname=8385808081&adk=1919950094&adf=4077151327&w=300&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1540925453531&bpp=59&bdt=1561&fdt=1289&idt=1286&shv=r20181024&cbv=r20180604&saldr=sa&correlator=919228707162&frm=23&ife=5&pv=2&ga_vid=475339152.1540925455&ga_sid=1540925455&ga_hid=568059610&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1043&ady=513&biw=1585&bih=1200&isw=300&ish=250&ifk=2180882631&scr_x=0&scr_y=0&eid=10573697%2C21060853%2C21070025%2C26835105&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CoeE%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=3832671437&ifi=1&fsb=1&dtd=1318
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81d::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-1991679624331369&output=html&h=250&slotname=8385808081&adk=1919950094&adf=4077151327&w=300&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1540925453531&bpp=59&bdt=1561&fdt=1289&idt=1286&shv=r20181024&cbv=r20180604&saldr=sa&correlator=919228707162&frm=23&ife=5&pv=2&ga_vid=475339152.1540925455&ga_sid=1540925455&ga_hid=568059610&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1043&ady=513&biw=1585&bih=1200&isw=300&ish=250&ifk=2180882631&scr_x=0&scr_y=0&eid=10573697%2C21060853%2C21070025%2C26835105&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CoeE%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=3832671437&ifi=1&fsb=1&dtd=1318
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
cookie
IDE=AHWqTUlrrBJ32mZN6wUxDKpuoMS0_pKRr3gc4Y83g01_6vFv7UfImYaGuIbOIvkZ
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
gzip
date
Tue, 30 Oct 2018 18:50:55 GMT
server
cafe
cache-control
private
content-length
82
x-xss-protection
1; mode=block
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
osd.js
pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/ Frame C70B
73 KB
27 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/osd.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
cce5c991fc672328e8eb7e5f9026496acd4fa608d26d0df95c54b7f16a8e5cc4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 25 Oct 2018 04:48:57 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
482517
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27406
x-xss-protection
1; mode=block
server
cafe
etag
6345757217691752979
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Thu, 08 Nov 2018 04:48:57 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&kq=1&lo=0&qs=1&ak=-&i=CBSDFPCW2&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&bq=0&wp=3&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=1200&w=1600&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&cm=9&f=0&j=&o=3&t=1540925453342&de=196133686141&cu=1540925453342&m=1062&ar=7554d5b-clean&cb=0&ll=2&lm=0&ln=1&r=0&dl=0&dm=1000&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5909&le=1&lh=958&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1000&an=58&gi=1&gf=1000&gg=58&ix=1000&ic=1000&ez=1&ck=1000&kw=115&aj=1&pg=100&pf=100&cc=1&bw=1000&bx=58&ci=1000&jz=115&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=115&cd=115&ah=115&am=115&rf=0&re=1&ft=471&fv=0&fw=471&wb=1&cl=0&at=0&d=25477209%3A2356361194%3A4745166436%3A138239321298&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=1600x1000&zMoatPS=top&zMoatSZPS=1600x1000%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&zMoatW=1600&zMoatH=1000&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatSN=e&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=skin&zMoatDfpSlotId=skin-5bd8a808c3bef&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=1%3A1&tz=skin&fs=152610&na=1597907939&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
92.123.186.115 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a92-123-186-115.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:54 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:54 GMT
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/ Frame 65B2
73 KB
0
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
13112639ea5d320063c21803f0172ec3273678f4d8a6215df67c4774659a233e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

date
Wed, 24 Oct 2018 17:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
524242
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27234
x-xss-protection
1; mode=block
server
cafe
etag
10801174140179827322
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 07 Nov 2018 17:13:30 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame 65B2
282 KB
0
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_270.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
95.100.199.29 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-199-29.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2b28e861a4e45fd1f546a63afabd2f757f8f9e18ec13a5316812237d02a74ecc

Request headers

Response headers

Date
Tue, 30 Oct 2018 18:50:52 GMT
Content-Encoding
gzip
Last-Modified
Tue, 16 Oct 2018 15:02:25 GMT
Server
AmazonS3
x-amz-request-id
5DA367EBA3BC986D
ETag
"de2606cae8bdc1e40ebf6e50b8adf558"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=35710
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88514
x-amz-id-2
SCylKO0dapbxpVhLg5v7zBl6YgBsoGs4cCRduNC7JRMCd5MWia67iP1mc8n66uXsRPO/UgH7vdA=
osd.js
pagead2.googlesyndication.com/pagead/ Frame 0124
73 KB
27 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/osd.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_270.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
cce5c991fc672328e8eb7e5f9026496acd4fa608d26d0df95c54b7f16a8e5cc4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:22:25 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1709
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27406
x-xss-protection
1; mode=block
server
cafe
etag
6345757217691752979
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=3600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 19:22:25 GMT
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/ Frame D0E9
73 KB
0
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
13112639ea5d320063c21803f0172ec3273678f4d8a6215df67c4774659a233e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

date
Wed, 24 Oct 2018 17:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
524242
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27234
x-xss-protection
1; mode=block
server
cafe
etag
10801174140179827322
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 07 Nov 2018 17:13:30 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame D0E9
282 KB
0
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_270.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
95.100.199.29 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-199-29.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2b28e861a4e45fd1f546a63afabd2f757f8f9e18ec13a5316812237d02a74ecc

Request headers

Response headers

Date
Tue, 30 Oct 2018 18:50:52 GMT
Content-Encoding
gzip
Last-Modified
Tue, 16 Oct 2018 15:02:25 GMT
Server
AmazonS3
x-amz-request-id
5DA367EBA3BC986D
ETag
"de2606cae8bdc1e40ebf6e50b8adf558"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=35710
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88514
x-amz-id-2
SCylKO0dapbxpVhLg5v7zBl6YgBsoGs4cCRduNC7JRMCd5MWia67iP1mc8n66uXsRPO/UgH7vdA=
view
securepubads.g.doubleclick.net/pcs/ Frame 65B2
0
56 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssw-RNnkcqq1_Yr4XkELXl-bO6xax77FOI4X1gWn95UqBr2FKMCikqt7HIH1Z5gAUXYJ_LDId1RVRJ9FiTJRO9Xc1PL75e79W4BwLSYyc3BvkKfmRqiIZr4m4heEGa6eAj74HW0RCjaDwuMcURB6srVNpQIAIMpuzaff3aWKYCdySqwe7T6IMOQXS5nfaMa0BUSOCN6iDeHQoDYEnn4RrIDWckNnsq4JT2aFx_jAAcKFG566q3T8FzHiB9vKqAXEA&sai=AMfl-YTWYweNQ9RKOMjfxyf0hX4uCcYF-OPf4TjQ59wZneE0sLf-xWAHrjH0e21HBYY1Z-iWbVAXM0iilyoZQ1NxHL2o9przwhqE9qJl-3zEetaS3whs8GpIVoI-cDg&sig=Cg0ArKJSzDDEOe-5GiXhEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 18:50:54 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame D0E9
0
56 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstdlH8CSRRVX4qBHd3AOXcVeQBtY73XEH20kkg13XRqq3rLoieklwzxoExaEigg6s1xZB1NjKzXoVNO5SP6hE2p4klfOiVd0e5hPIFIfBi_7ZXndJvjhI48Dz2eGUivlwklxpAg-dfskc7LNhYMPCLRoSw_y7W2_wIu3uxhT5R2ou5z36H7NXDqlIVQJdVJgJeqjO1v6SMzcs2_-tgRUMPyfhEV-nKzCZpmrmooUG0ut-OWvfx_Q2YqUGTBrvQFAQ&sai=AMfl-YQvyq9dTrxnWlxBEDdGjenhPxvX-95-aWmyN3NgqWunU3yv75TGz0Ao1PuHoTNWbXak-QKr2dmZ7f-v-rrRcFPm8P0l6jzIUe2hclfnMlz_xXF4QuL0r3vCo2Q&sig=Cg0ArKJSzGynMbcnaEVrEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 18:50:54 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20181024/r20180604/ Frame 8127
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/html/r20181024/r20180604/zrt_lookup.html
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81d::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/html/r20181024/r20180604/zrt_lookup.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
cookie
IDE=AHWqTUlrrBJ32mZN6wUxDKpuoMS0_pKRr3gc4Y83g01_6vFv7UfImYaGuIbOIvkZ
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
vary
Accept-Encoding
date
Thu, 25 Oct 2018 05:45:53 GMT
expires
Thu, 08 Nov 2018 05:45:53 GMT
content-type
text/html; charset=UTF-8
etag
12810928231326100212
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
6940
x-xss-protection
1; mode=block
cache-control
public, max-age=1209600
age
479101
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
ads
googleads.g.doubleclick.net/pagead/ Frame 3AE2
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=250&slotname=8385808081&adk=1919950094&adf=4077151324&w=300&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1540925453921&bpp=35&bdt=1951&fdt=1049&idt=1046&shv=r20181024&cbv=r20180604&saldr=sa&correlator=919228707162&frm=23&ife=5&pv=1&ga_vid=1624659841.1540925455&ga_sid=1540925455&ga_hid=61386211&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1043&ady=1501&biw=1585&bih=1200&isw=300&ish=250&ifk=1789179933&scr_x=0&scr_y=0&eid=21060853%2C21070025%2C36998751%2C21061796&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=3832671437&ifi=1&fsb=1&dtd=1066
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81d::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-1991679624331369&output=html&h=250&slotname=8385808081&adk=1919950094&adf=4077151324&w=300&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1540925453921&bpp=35&bdt=1951&fdt=1049&idt=1046&shv=r20181024&cbv=r20180604&saldr=sa&correlator=919228707162&frm=23&ife=5&pv=1&ga_vid=1624659841.1540925455&ga_sid=1540925455&ga_hid=61386211&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1043&ady=1501&biw=1585&bih=1200&isw=300&ish=250&ifk=1789179933&scr_x=0&scr_y=0&eid=21060853%2C21070025%2C36998751%2C21061796&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=3832671437&ifi=1&fsb=1&dtd=1066
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
cookie
IDE=AHWqTUlrrBJ32mZN6wUxDKpuoMS0_pKRr3gc4Y83g01_6vFv7UfImYaGuIbOIvkZ
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
gzip
date
Tue, 30 Oct 2018 18:50:55 GMT
server
cafe
cache-control
private
content-length
18209
x-xss-protection
1; mode=block
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
osd.js
pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/ Frame 7C85
73 KB
27 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/osd.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
cce5c991fc672328e8eb7e5f9026496acd4fa608d26d0df95c54b7f16a8e5cc4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 25 Oct 2018 04:48:57 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
482517
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27406
x-xss-protection
1; mode=block
server
cafe
etag
6345757217691752979
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Thu, 08 Nov 2018 04:48:57 GMT
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20181024/r20180604/ Frame 048B
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/html/r20181024/r20180604/zrt_lookup.html
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81d::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/html/r20181024/r20180604/zrt_lookup.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
cookie
IDE=AHWqTUlrrBJ32mZN6wUxDKpuoMS0_pKRr3gc4Y83g01_6vFv7UfImYaGuIbOIvkZ
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
vary
Accept-Encoding
date
Thu, 25 Oct 2018 05:45:53 GMT
expires
Thu, 08 Nov 2018 05:45:53 GMT
content-type
text/html; charset=UTF-8
etag
12810928231326100212
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
6940
x-xss-protection
1; mode=block
cache-control
public, max-age=1209600
age
479102
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
ads
googleads.g.doubleclick.net/pagead/ Frame 7A43
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=90&slotname=3084619100&adk=3828543735&adf=4077151326&w=728&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1540925453170&bpp=31&bdt=1201&fdt=1827&idt=1825&shv=r20181024&cbv=r20180604&saldr=sa&correlator=919228707162&frm=23&ife=5&pv=1&ga_vid=147091609.1540925455&ga_sid=1540925455&ga_hid=90814564&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=429&ady=393&biw=1585&bih=1200&isw=728&ish=90&ifk=2834320770&scr_x=0&scr_y=0&eid=21060853%2C21070025%2C111541704&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C728%2C90&vis=1&rsz=%7C%7CoeE%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=4066913089&ifi=1&fsb=1&dtd=1836
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81d::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-1991679624331369&output=html&h=90&slotname=3084619100&adk=3828543735&adf=4077151326&w=728&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1540925453170&bpp=31&bdt=1201&fdt=1827&idt=1825&shv=r20181024&cbv=r20180604&saldr=sa&correlator=919228707162&frm=23&ife=5&pv=1&ga_vid=147091609.1540925455&ga_sid=1540925455&ga_hid=90814564&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=429&ady=393&biw=1585&bih=1200&isw=728&ish=90&ifk=2834320770&scr_x=0&scr_y=0&eid=21060853%2C21070025%2C111541704&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C728%2C90&vis=1&rsz=%7C%7CoeE%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=4066913089&ifi=1&fsb=1&dtd=1836
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
cookie
IDE=AHWqTUlrrBJ32mZN6wUxDKpuoMS0_pKRr3gc4Y83g01_6vFv7UfImYaGuIbOIvkZ
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
gzip
date
Tue, 30 Oct 2018 18:50:55 GMT
server
cafe
cache-control
private
content-length
82
x-xss-protection
1; mode=block
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
osd.js
pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/ Frame 76DF
73 KB
27 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/osd.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
cce5c991fc672328e8eb7e5f9026496acd4fa608d26d0df95c54b7f16a8e5cc4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 25 Oct 2018 04:48:57 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
482518
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27406
x-xss-protection
1; mode=block
server
cafe
etag
6345757217691752979
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Thu, 08 Nov 2018 04:48:57 GMT
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20181024/r20180604/ Frame 741B
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/html/r20181024/r20180604/zrt_lookup.html
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81d::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/html/r20181024/r20180604/zrt_lookup.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
cookie
IDE=AHWqTUlrrBJ32mZN6wUxDKpuoMS0_pKRr3gc4Y83g01_6vFv7UfImYaGuIbOIvkZ
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
vary
Accept-Encoding
date
Thu, 25 Oct 2018 05:45:53 GMT
expires
Thu, 08 Nov 2018 05:45:53 GMT
content-type
text/html; charset=UTF-8
etag
12810928231326100212
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
6940
x-xss-protection
1; mode=block
cache-control
public, max-age=1209600
age
479102
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
ads
googleads.g.doubleclick.net/pagead/ Frame 6E33
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=90&slotname=3084619100&adk=3828543735&adf=4077151314&w=728&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1540925454262&bpp=18&bdt=2289&fdt=753&idt=750&shv=r20181024&cbv=r20180604&saldr=sa&correlator=919228707162&frm=23&ife=5&pv=1&ga_vid=793673856.1540925455&ga_sid=1540925455&ga_hid=484703723&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=429&ady=5494&biw=1585&bih=1200&isw=728&ish=90&ifk=1649710351&scr_x=0&scr_y=0&eid=21060853%2C21070025&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C728%2C90&vis=1&rsz=%7C%7CopeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=4066913089&ifi=1&fsb=1&dtd=768
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81d::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-1991679624331369&output=html&h=90&slotname=3084619100&adk=3828543735&adf=4077151314&w=728&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1540925454262&bpp=18&bdt=2289&fdt=753&idt=750&shv=r20181024&cbv=r20180604&saldr=sa&correlator=919228707162&frm=23&ife=5&pv=1&ga_vid=793673856.1540925455&ga_sid=1540925455&ga_hid=484703723&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=429&ady=5494&biw=1585&bih=1200&isw=728&ish=90&ifk=1649710351&scr_x=0&scr_y=0&eid=21060853%2C21070025&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C728%2C90&vis=1&rsz=%7C%7CopeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=4066913089&ifi=1&fsb=1&dtd=768
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
cookie
IDE=AHWqTUlrrBJ32mZN6wUxDKpuoMS0_pKRr3gc4Y83g01_6vFv7UfImYaGuIbOIvkZ
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
gzip
date
Tue, 30 Oct 2018 18:50:55 GMT
server
cafe
cache-control
private
content-length
82
x-xss-protection
1; mode=block
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
osd.js
pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/ Frame 9076
73 KB
27 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/osd.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
cce5c991fc672328e8eb7e5f9026496acd4fa608d26d0df95c54b7f16a8e5cc4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 25 Oct 2018 04:48:57 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
482518
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27406
x-xss-protection
1; mode=block
server
cafe
etag
6345757217691752979
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Thu, 08 Nov 2018 04:48:57 GMT
/
disqus.com/embed/comments/ Frame 0ECC
0
0
Document
General
Full URL
https://disqus.com/embed/comments/?base=default&f=zdnet-1&t_i=7a12161d-2a5f-4793-b0a4-9fac038733de&t_u=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&t_e=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks&t_d=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks&t_t=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks&s_o=default
Requested by
Host: zdnet-1.disqus.com
URL: https://zdnet-1.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.64.134 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ 'unsafe-inline' https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ https://apis.google.com https://www.google.com/recaptcha/ https://disqus.com
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Host
disqus.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Server
nginx
Content-Security-Policy
script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ 'unsafe-inline' https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ https://apis.google.com https://www.google.com/recaptcha/ https://disqus.com
Link
<https://c.disquscdn.com>;rel=preconnect,<https://c.disquscdn.com>;rel=dns-prefetch
Cache-Control
stale-if-error=3600, s-stalewhilerevalidate=3600, stale-while-revalidate=30, no-cache, must-revalidate, public, s-maxage=5
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Timing-Allow-Origin
*
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Content-Type
text/html; charset=utf-8
Last-Modified
Mon, 29 Oct 2018 19:12:16 GMT
ETag
W/"lounge:view:6942488675.60137d841b47fd0b8991807746eb7d0e.2"
Content-Encoding
gzip
Content-Length
3089
Date
Tue, 30 Oct 2018 18:50:55 GMT
Age
0
Connection
keep-alive
Vary
Accept-Encoding
Strict-Transport-Security
max-age=300; includeSubdomains
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=909&fi=0&apd=924&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75374362809&S1id=23605329&S2id=23619609&ord=1540925454180&r=702976702448&t=nht&os=1&fi2=0&div1=0&ait=684&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=3&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.58.219.40 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-219-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:55 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:55 GMT
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/cbsinteractive-zdnet/loader.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.57.19.23 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-57-19-23.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d0fd74148f4cbe78bd0e6328dc5ce5955f0a0ecdb1eb2919da4a7e596ac65912

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 18:50:55 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
901
Expires
Wed, 31 Oct 2018 18:50:55 GMT
load.js
widget.perfectmarket.com/cbsinteractive-zdnet/
13 KB
5 KB
Script
General
Full URL
https://widget.perfectmarket.com/cbsinteractive-zdnet/load.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/cbsinteractive-zdnet/loader.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.181 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1d1eab2e9d5b36e1297db68599d3e9c3df71869a0863fb261972b93e919d7af1

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
rwr9L97XovW8QPypI62jHvd7E2HiNZm2
content-encoding
gzip
etag
"fc0de48a0976cde02ddee0bd49a81832"
age
82
x-cache
HIT, HIT
status
200
content-length
4742
x-amz-id-2
cd3Maak8Panxg6ZCxlTt64fcV35xuMA/Kt7Xw0CaHb2taQV1eB3DJTK4A4DF0O+54qpzHOT8xt8=
x-served-by
cache-lax8626-LAX, cache-fra19123-FRA
last-modified
Thu, 20 Oct 2016 17:48:07 GMT
server
AmazonS3
x-timer
S1540925455.262083,VS0,VE0
date
Tue, 30 Oct 2018 18:50:55 GMT
vary
Accept-Encoding
x-amz-request-id
3DF236319D937B57
via
1.1 varnish, 1.1 varnish
cache-control
max-age=300
accept-ranges
bytes
content-type
binary/octet-stream
x-cache-hits
1, 2
impl.330-85-RELEASE.js
cdn.taboola.com/libtrc/
458 KB
126 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/impl.330-85-RELEASE.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/cbsinteractive-zdnet/loader.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
362d22105f8eefe9a4a2af8da5d82de2200c85d50b5b19705c432fc4f8d1ef9c

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
41w1RvITHxyVy4KosLwksPA1u6chgClX
content-encoding
gzip
etag
"32d7755b130b87c08be0de39cc0801c5"
age
25
x-cache
HIT
status
200
x-amz-replication-status
PENDING
content-length
128473
x-amz-id-2
jWX7hnR9WFQOTxLsg1+ma8Lf3sfn7G0yen3tMJYY/1rqdfVs05x/ytbHKT7COM4zzUUGPHOmi3o=
x-served-by
cache-fra19134-FRA
last-modified
Tue, 30 Oct 2018 18:50:27 GMT
server
AmazonS3
x-timer
S1540925455.265270,VS0,VE0
date
Tue, 30 Oct 2018 18:50:55 GMT
vary
Accept-Encoding
x-amz-request-id
EE9632DFC4F17D5E
via
1.1 varnish
cache-control
private,max-age=31536000
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
x-cache-hits
282
ls.html
cdn-gl.imrworldwide.com/novms/html/ Frame 7D08
0
0
Document
General
Full URL
https://cdn-gl.imrworldwide.com/novms/html/ls.html
Requested by
Host: cdn-gl.imrworldwide.com
URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600_rc.bundle.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.93.121 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-93-121.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Host
cdn-gl.imrworldwide.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
Date
Thu, 04 Oct 2018 18:49:04 GMT
Last-Modified
Wed, 03 Oct 2018 17:26:14 GMT
x-amz-server-side-encryption
AES256
Cache-Control
max-age=86400
x-amz-version-id
bOFcZJzsYy1.aHYIvu.ftVKtYXxJ9BCk
Server
AmazonS3
Content-Encoding
gzip
Vary
Accept-Encoding
Age
109
X-Cache
Hit from cloudfront
Via
1.1 6e761598d9637d0090f3661d0d27be14.cloudfront.net (CloudFront)
X-Amz-Cf-Id
9x8BTYcVKiieiW7Gu3DPojb3Iwu2NpyeCforqRfW9v7bYynz-bO2rA==
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&kq=1&lo=0&qs=1&ak=-&i=CBSDFPCW2&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&bq=0&wp=3&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=1200&w=1600&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&cm=9&f=0&j=&o=3&t=1540925453342&de=196133686141&cu=1540925453342&m=1063&ar=7554d5b-clean&cb=0&ll=2&lm=0&ln=1&r=0&dl=0&dm=1000&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5909&le=1&lh=958&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1000&an=1000&gi=1&gf=1000&gg=1000&ix=1000&ic=1000&ez=1&ck=1000&kw=115&aj=1&pg=100&pf=100&cc=1&bw=1000&bx=1000&ci=1000&jz=115&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=115&cd=115&ah=115&am=115&rf=0&re=1&ft=471&fv=471&fw=471&wb=1&cl=0&at=0&d=25477209%3A2356361194%3A4745166436%3A138239321298&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=1600x1000&zMoatPS=top&zMoatSZPS=1600x1000%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&zMoatW=1600&zMoatH=1000&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatSN=e&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=skin&zMoatDfpSlotId=skin-5bd8a808c3bef&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=1%3A1&tz=skin&fs=152610&na=2057111244&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
92.123.186.115 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a92-123-186-115.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:55 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:55 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=924&tet=1449&fi=0&apd=1464&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75374362809&S1id=23605329&S2id=23619609&ord=1540925454180&r=702976702448&t=iv&os=1&fi2=0&div1=1&ait=1224&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=4&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.58.219.40 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-219-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:55 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:55 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 76DF
42 B
114 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjssrRYem_yrwIMdXqcgCAKRkdM-uS8LxPhgOMkqVjEass3gVOSwr481LZ9FKVKc_ybq1UGIyZF8-grtr87ElHe98sv2fbzmfLmGtkpw&sig=Cg0ArKJSzAlhaASUljnkEAE&adk=2359688258&tt=2766&bs=1585%2C1200&mtos=1074,1074,1074,1074,1074&tos=1074,0,0,0,0&p=393,429,483,1157&mcvt=1074&rs=3&ht=0&tfs=1713&tls=2787&mc=1&lte=1&bas=0&bac=0&avms=geo&rst=1540925452440&rpt=2022&ps=1585%2C5909&ss=1600%2C1200&pt=24&deb=1-8-8-21-13-25-70-4&tvt=2767&r=v&id=osdim&uc=11&tgt=DIV&cl=1&cec=14&clc=1&cac=0&cd=728x94&v=r20181024
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 30 Oct 2018 18:50:55 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame C70B
42 B
114 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsvtRN7bormiS1DVf8KzspkjH3ynit8cYwvZB1Dc_OLfGkXPMXdTMIOJHcXIIQkGStcdrA_5cOPsXiMCQ6HIbLJJJVvOkoPVqLHVWQY&sig=Cg0ArKJSzA1iGA4Id-b9EAE&adk=3490184630&tt=2766&bs=1585%2C1200&mtos=1142,1142,1142,1142,1142&tos=1142,0,0,0,0&p=513,1043,763,1343&mcvt=1142&rs=3&ht=0&tfs=1645&tls=2787&mc=1&lte=1&bas=0&bac=0&avms=geo&rst=1540925452465&rpt=1928&ps=1585%2C5909&ss=1600%2C1200&pt=24&deb=1-8-8-21-13-25-70-4&tvt=2767&r=v&id=osdim&uc=6&tgt=DIV&cl=1&cec=14&clc=1&cac=0&cd=300x254&v=r20181024
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:819::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 30 Oct 2018 18:50:55 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
pmk-201618008.1.js
widget.perfectmarket.com/cbsinteractive-zdnet/
323 KB
89 KB
Script
General
Full URL
https://widget.perfectmarket.com/cbsinteractive-zdnet/pmk-201618008.1.js
Requested by
Host: widget.perfectmarket.com
URL: https://widget.perfectmarket.com/cbsinteractive-zdnet/load.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.181 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
4f72e8df44e82a8066b16ca8ab2d59f8f9ef21fa52c07d8554972f48b5105f13

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
bVoOWfmxkMrYwv2s6Uu9D96fE._5IBqu
content-encoding
gzip
etag
"da73fb2066df9f51d08b6688cfb35441"
age
629871
x-cache
HIT, HIT
status
200
content-length
91236
x-amz-id-2
T2A7wWXMDNgx2Z35EWhae8i8jDSVEo/Aqmbmta3HbEBKVMhwoZJKjGQuEf/CaAEiaINfKwR6uJs=
x-served-by
cache-lax8630-LAX, cache-fra19123-FRA
last-modified
Thu, 20 Oct 2016 17:47:53 GMT
server
AmazonS3
x-timer
S1540925456.771419,VS0,VE0
date
Tue, 30 Oct 2018 18:50:55 GMT
vary
Accept-Encoding
x-amz-request-id
58FF20717A687DE4
via
1.1 varnish, 1.1 varnish
cache-control
max-age=31536000
accept-ranges
bytes
content-type
text/javascript
x-cache-hits
386, 16
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=7&c2=13739933&c3=20121515121&ns__t=1540925455775&ns_c=UTF-8&cv=3.1&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazi...
  • https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1540925455775&ns_c=UTF-8&cv=3.1&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Braz...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1540925455775&ns_c=UTF-8&cv=3.1&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c9=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.57.19.23 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-57-19-23.deploy.static.akamaitechnologies.com
Software
/
Resource Hash

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:56 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1540925455775&ns_c=UTF-8&cv=3.1&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c9=
Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:55 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&kq=1&lo=0&qs=1&ak=-&i=CBSDFPCW2&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&bq=0&wp=3&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=1200&w=1600&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&cm=9&f=0&j=&o=3&t=1540925453342&de=196133686141&cu=1540925453342&m=1065&ar=7554d5b-clean&cb=0&ll=2&lm=0&ln=1&r=0&dl=0&dm=1000&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5909&le=1&lh=958&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1000&an=1000&gi=1&gf=1000&gg=1000&ix=1000&ic=1000&ez=1&ck=1000&kw=115&aj=1&pg=100&pf=100&cc=1&bw=1000&bx=1000&ci=1000&jz=115&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=115&cd=115&ah=115&am=115&rf=0&re=1&ft=471&fv=471&fw=471&wb=1&cl=0&at=0&d=25477209%3A2356361194%3A4745166436%3A138239321298&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=1600x1000&zMoatPS=top&zMoatSZPS=1600x1000%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&zMoatW=1600&zMoatH=1000&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatSN=e&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=skin&zMoatDfpSlotId=skin-5bd8a808c3bef&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=1%3A1&tz=skin&fs=152610&na=1457574961&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
92.123.186.115 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a92-123-186-115.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:56 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:56 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&kq=1&lo=0&qs=1&ak=-&i=CBSDFPCW2&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&vf=1&vg=100&bq=0&wp=3&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=1200&w=1600&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&cm=9&f=0&j=&o=3&t=1540925453342&de=196133686141&cu=1540925453342&m=1430&ar=7554d5b-clean&cb=0&ll=2&lm=0&ln=1&r=0&dl=0&dm=1000&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5939&le=1&lf=1210&lg=1&lh=958&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A20%3A-&as=1&ag=1368&an=1000&gi=1&gf=1368&gg=1000&ix=1368&ic=1368&ez=1&ck=1000&kw=115&aj=1&pg=100&pf=100&cc=1&bw=1368&bx=1000&ci=1000&jz=115&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&cq=0&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1425&cd=115&ah=1425&am=115&rf=0&re=1&ft=839&fv=471&fw=471&wb=1&cl=0&at=0&d=25477209%3A2356361194%3A4745166436%3A138239321298&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=1600x1000&zMoatPS=top&zMoatSZPS=1600x1000%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&zMoatW=1600&zMoatH=1000&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatSN=e&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=skin&zMoatDfpSlotId=skin-5bd8a808c3bef&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=1%3A1&tz=skin&fs=152610&na=1331946813&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
92.123.186.115 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a92-123-186-115.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:56 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:56 GMT
analytics.js
www.google-analytics.com/
42 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: widget.perfectmarket.com
URL: https://widget.perfectmarket.com/cbsinteractive-zdnet/pmk-201618008.1.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:400c:c0c::66 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8cb05b675fe6419a9e91eb587c60902c7ed1cb6c42b8cff8ce404ef89f635cde
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 11 Oct 2018 19:41:26 GMT
server
Golfe2
age
1236
date
Tue, 30 Oct 2018 18:30:20 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
17301
expires
Tue, 30 Oct 2018 20:30:20 GMT
tboptevent.html
widget.perfectmarket.com/opt/ Frame 7D1E
0
0
Document
General
Full URL
https://widget.perfectmarket.com/opt/tboptevent.html?v=2&a=u&d=%7B%22stp%22%3A%7B%22a%22%3A1%7D%7D
Requested by
Host: widget.perfectmarket.com
URL: https://widget.perfectmarket.com/cbsinteractive-zdnet/pmk-201618008.1.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.181 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Varnish /
Resource Hash

Request headers

:method
GET
:authority
widget.perfectmarket.com
:scheme
https
:path
/opt/tboptevent.html?v=2&a=u&d=%7B%22stp%22%3A%7B%22a%22%3A1%7D%7D
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
404
server
Varnish
retry-after
0
accept-ranges
bytes
date
Tue, 30 Oct 2018 18:50:56 GMT
via
1.1 varnish
x-served-by
cache-fra19123-FRA
x-cache
MISS
x-cache-hits
0
x-timer
S1540925456.458634,VS0,VE0
content-length
0
collect
www.google-analytics.com/r/
35 B
111 B
Image
General
Full URL
https://www.google-analytics.com/r/collect?v=1&_v=j71&aip=1&a=2130951802&t=pageview&_s=1&dl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&ul=en-us&de=UTF-8&dt=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=YAhAAEAB~&jid=1307469774&gjid=1738364199&cid=1826892963.1540925452&tid=UA-33613588-22&_gid=822753247.1540925457&_r=1&cd2=other&z=1703065354
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:400c:c0c::66 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 30 Oct 2018 18:50:56 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CBSDFPCW2&hp=1&cm=9&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1540925454926&de=85816028177&m=0&ar=7554d5b-clean&q=37&cb=0&cu=1540925454926&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25477209%3A2356361194%3A4746066197%3A138239375180&zMoatPT=article&zMoatW=372&zMoatH=142&zMoatVGUID=7cae3897-1371-4826-8d8e-bfbd8614339a&zMoatSN=e&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=dynamic-showcase-top&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=dynamic-showcase-top-5bd8a808c3bef&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=-&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=372x142&zMoatPS=Not%20Specified&zMoatSZPS=Not%20Specified&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&tz=dynamic-showcase-top&fs=152610&na=1751358118&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
92.123.186.115 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a92-123-186-115.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 18:50:56 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 18:50:56 GMT
tboptevent.html
widget.perfectmarket.com/opt/ Frame 77DC
0
0
Document
General
Full URL
https://widget.perfectmarket.com/opt/tboptevent.html?v=2&a=u&d=%7B%22stp%22%3A%7B%22v%22%3A1%7D%7D
Requested by
Host: widget.perfectmarket.com
URL: https://widget.perfectmarket.com/cbsinteractive-zdnet/pmk-201618008.1.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.181 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Varnish /
Resource Hash

Request headers

:method
GET
:authority
widget.perfectmarket.com
:scheme
https
:path
/opt/tboptevent.html?v=2&a=u&d=%7B%22stp%22%3A%7B%22v%22%3A1%7D%7D
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
404
server
Varnish
retry-after
0
accept-ranges
bytes
date
Tue, 30 Oct 2018 18:50:56 GMT
via
1.1 varnish
x-served-by
cache-fra19123-FRA
x-cache
MISS
x-cache-hits
0
x-timer
S1540925457.839044,VS0,VE0
content-length
0
json
trc.taboola.com/cbsinteractive-zdnet/trc/3/
11 KB
5 KB
Script
General
Full URL
https://trc.taboola.com/cbsinteractive-zdnet/trc/3/json?tim=18%3A50%3A57.424&data=%7B%22id%22%3A282%2C%22ii%22%3A%22%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%22%2C%22it%22%3A%22text%22%2C%22sd%22%3Anull%2C%22ui%22%3Anull%2C%22uifp%22%3Anull%2C%22vi%22%3A1540925457419%2C%22cv%22%3A%22330-85-RELEASE%22%2C%22uiv%22%3A%22default%22%2C%22u%22%3A%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F%22%2C%22bv%22%3A%220%22%2C%22ul%22%3A%5B%22en-US%22%5D%2C%22cmps%22%3A3%2C%22btv%22%3A%220%22%2C%22cos%22%3A%224g%22%2C%22bad%22%3A-1%2C%22bw%22%3A1600%2C%22sw%22%3A1600%2C%22sh%22%3A1200%2C%22r%22%3A%5B%7B%22li%22%3A%22rbox-t2m%22%2C%22s%22%3A8%2C%22uim%22%3A%22alternating-thumbnails-a%3Aabp%3D0%22%2C%22uip%22%3A%22ZDNETarticleDesktop%2FTablet-Below%20Article%20Thumbnails%22%2C%22orig_uip%22%3A%22ZDNETarticleDesktop%2FTablet-Below%20Article%20Thumbnails%22%2C%22cd%22%3A5319.015625%2C%22mw%22%3A770%7D%5D%2C%22cb%22%3A%22TRC.callbacks.recommendations_1%22%2C%22lt%22%3A%22normal%22%7D
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.330-85-RELEASE.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 18:50:57 GMT
content-encoding
gzip
access-control-allow-origin
*
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
status
200
x-cache-hits
0
x-served-by
cache-fra19134-FRA
server
nginx
x-timer
S1540925457.433932,VS0,VE219
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
access-control-allow-credentials
true
accept-ranges
bytes
expires
Thu, 01 Jan 1970 00:00:00 GMT
f539211219b796ffbb49949997c764f0.png
cdn.taboola.com/libtrc/static/thumbnails/
254 B
627 B
Image
General
Full URL
https://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.330-85-RELEASE.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
hL.cyLD7Q4TL5ceY.7JQwF9m5IYI8mkC
via
1.1 varnish
etag
"dfa7b52c86e56bd67fa4002f6ed19854"
age
5170
x-cache
HIT
status
200
x-amz-replication-status
COMPLETED
content-length
254
x-amz-id-2
NHYqfgHhQMaFiaJfDtKC9204ZOyUMXDomIHau6bwEOKVPEp427r4r0UiFipOO01wjx45H1bVHTE=
x-served-by
cache-fra19134-FRA
last-modified
Wed, 24 Jun 2015 07:14:11 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:0/gname:root/uname:root/gid:0/mode:33188/mtime:1377415166/atime:1435052450/md5:dfa7b52c86e56bd67fa4002f6ed19854/ctime:1422381567
x-timer
S1540925458.753649,VS0,VE0
date
Tue, 30 Oct 2018 18:50:57 GMT
x-amz-request-id
D631AE82D5B67BBE
cache-control
private,max-age=31536000
accept-ranges
bytes
content-type
image/png
x-cache-hits
16802
social
trc.taboola.com/cbsinteractive-zdnet/log/3/
0
83 B
Image
General
Full URL
https://trc.taboola.com/cbsinteractive-zdnet/log/3/social?ri=4e53b8e430fdd3659d1e9da47d245eb2&sd=v2_819fe2bfc5ebf61c55fca8e12c35e79b_af9cf292-f529-49a8-8d43-aaa53b5d9423-tuct2d22d91_1540925457_1540925457_CNawjgYQzro_GIuIwrLsLCABKAEwODib4wlAgooQSJjEF1Cl7BBYAWAA&ui=af9cf292-f529-49a8-8d43-aaa53b5d9423-tuct2d22d91&pi=/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&wi=-8074983690569660263&pt=text&vi=1540925457419&st=social-available&d=%7B%22data%22%3A%5B%7B%22i%22%3A%22w%22%2C%22tp%22%3A%22custom-share%22%2C%22nm%22%3A%22facebook%22%2C%22c%22%3A2%2C%22m%22%3A%22stp%22%7D%2C%7B%22i%22%3A%22w%22%2C%22tp%22%3A%22custom-link%22%2C%22nm%22%3A%22twitter%22%2C%22c%22%3A2%2C%22m%22%3A%22stp%22%7D%2C%7B%22i%22%3A%22ctx%22%2C%22ism%22%3Afalse%2C%22srx%22%3A1600%2C%22sry%22%3A1200%2C%22pd%22%3Anull%2C%22tpl%22%3A%22%22%2C%22url%22%3A%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%22%2C%22rref%22%3A%22%22%2C%22sref%22%3A%22_sessionPending_%22%2C%22hdl%22%3A%22%22%2C%22sec%22%3A%22%22%2C%22aut%22%3A%22%22%2C%22img%22%3A%22%22%2C%22v%22%3A13%7D%5D%7D&tim=18%3A50%3A57.781&id=5713&llvl=1&cv=330-85-RELEASE&
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 30 Oct 2018 18:50:57 GMT
via
1.1 varnish
server
nginx
x-timer
S1540925458.787075,VS0,VE9
x-served-by
cache-fra19134-FRA
status
204
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
access-control-allow-origin
*
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
content-type
image/gif
x-cache-hits
0
social
trc.taboola.com/cbsinteractive-zdnet/log/3/
0
55 B
Image
General
Full URL
https://trc.taboola.com/cbsinteractive-zdnet/log/3/social?ri=4e53b8e430fdd3659d1e9da47d245eb2&sd=v2_819fe2bfc5ebf61c55fca8e12c35e79b_af9cf292-f529-49a8-8d43-aaa53b5d9423-tuct2d22d91_1540925457_1540925457_CNawjgYQzro_GIuIwrLsLCABKAEwODib4wlAgooQSJjEF1Cl7BBYAWAA&ui=af9cf292-f529-49a8-8d43-aaa53b5d9423-tuct2d22d91&pi=/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&wi=-8074983690569660263&pt=text&vi=1540925457419&st=social-visible&d=%7B%22data%22%3A%5B%7B%22i%22%3A%22w%22%2C%22tp%22%3A%22custom-share%22%2C%22nm%22%3A%22facebook%22%2C%22c%22%3A1%2C%22ln%22%3A%22above-fold%22%2C%22lx%22%3A362%2C%22ly%22%3A518%2C%22m%22%3A%22stp%22%2C%22v%22%3A3%7D%2C%7B%22i%22%3A%22w%22%2C%22tp%22%3A%22custom-link%22%2C%22nm%22%3A%22twitter%22%2C%22c%22%3A1%2C%22ln%22%3A%22above-fold%22%2C%22lx%22%3A670%2C%22ly%22%3A518%2C%22m%22%3A%22stp%22%2C%22v%22%3A3%7D%5D%7D&tim=18%3A50%3A57.781&id=407&llvl=1&cv=330-85-RELEASE&
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 30 Oct 2018 18:50:57 GMT
via
1.1 varnish
server
nginx
x-timer
S1540925458.787849,VS0,VE9
x-served-by
cache-fra19134-FRA
status
204
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
access-control-allow-origin
*
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
content-type
image/gif
x-cache-hits
0
domains
api.viglink.com/api/
0
0

available
trc.taboola.com/cbsinteractive-zdnet/log/3/
0
0

1c21a97bae3d4860b40d70eecb81bea2.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.workandmoney.com/1c/21/
0
0

d1ea61a38f43c12cd027f40bab674433.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
0
0

01.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//blogs.dailylifetech.com/b/drone/07/
0
0

nam.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn-images.thinktarget.us/adproduction/pettyandposh/730-vietnam/
0
0

98cb01b076ced7bd94fe98d5bf8a43d5.png
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
0
0

6d9eb97b984897c8650c9d02b603684c.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
0
0

7b8fd49b22132270a1c1436374fae690.png
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
0
0

db1cb7a38f9900fdad496cbf9b2b7743.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
api.viglink.com
URL
https://api.viglink.com/api/domains
Domain
trc.taboola.com
URL
https://trc.taboola.com/cbsinteractive-zdnet/log/3/available
Domain
images.taboola.com
URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.workandmoney.com/1c/21/1c21a97bae3d4860b40d70eecb81bea2.jpg
Domain
images.taboola.com
URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/d1ea61a38f43c12cd027f40bab674433.jpg
Domain
images.taboola.com
URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//blogs.dailylifetech.com/b/drone/07/01.jpg
Domain
images.taboola.com
URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn-images.thinktarget.us/adproduction/pettyandposh/730-vietnam/nam.jpg
Domain
images.taboola.com
URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/98cb01b076ced7bd94fe98d5bf8a43d5.png
Domain
images.taboola.com
URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/6d9eb97b984897c8650c9d02b603684c.jpg
Domain
images.taboola.com
URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/7b8fd49b22132270a1c1436374fae690.png
Domain
images.taboola.com
URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/db1cb7a38f9900fdad496cbf9b2b7743.jpg

Verdicts & Comments Add Verdict or Comment

327 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| NREUM object| newrelic function| __nr_require object| soastaTracking object| ZdnetPageVars object| ZdnetFunctions boolean| gdprConsent object| evidon object| knownServiceWorkers object| cbsiGptDivIds function| UUIDv4 string| __tealium_data_guid object| utag_data function| requirejs function| require function| define number| BOOMR_lstart object| BOOMR object| BOOMR_mq object| headertag object| googletag function| headertag_render object| pbjs object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken object| __core-js_shared__ function| setImmediate function| clearImmediate function| UUIDv1 function| clamp object| STR undefined| UUID function| $ function| jQuery undefined| easyXDM object| GPT_jstiming object| google_reactive_ads_global_state undefined| google_measure_js_timing object| fly undefined| testGroup undefined| testName object| utag_err boolean| utag_condload function| getCookieValue object| isInternal object| js object| s object| adData string| adCookieName undefined| adCookieData undefined| adRegion function| parseJson object| match object| utag function| runInternalUserFuncs function| cbsiInternal function| _tealium_old_error boolean| isEuUser object| vglnk object| omnitureMgr object| dwMgr object| om object| jQuery183022267492917479226 function| vl_cB function| vl_disable function| vglnk_15409254503785 function| dw_callback function| pf_notify function| lightboxjs function| lightboxlib object| _ml object| EF function| setUpAgknTag object| Modernizr function| Waypoint function| AppMeasurement_Module_AudienceManagement function| AppMeasurement_Module_ActivityMap function| AppMeasurement function| s_gi function| s_pgicq function| doSiteCatalystTag object| headID object| newScript object| s_c_il number| s_c_in function| Visitor object| visitor function| DIL number| s_objectID number| s_giq object| __ql string| path string| host object| scriptTags function| agknTagBuilder object| _agknTag string| _agknTagName object| _agknEchoTag number| _isAgknTagSet object| debug number| BOOMR_configt object| swfobject object| CryptoJS object| mPulseApp object| TRUE_ANTHEM object| _bmrEvents object| DIGIOH_API function| renderAdCallback function| blankAdCallback string| firstpgvar string| waypointContextKey object| sticky object| DW undefined| _ function| Hls undefined| uuid function| addResizeListener function| removeResizeListener function| Spinner object| uvpjs function| Class object| mpulseUserTiming function| dw_anonc object| DW_anonc object| optimizely string| f0 object| omMgr object| s_i_cnetzdnetglobalsite undefined| vglnk_15409254508796 undefined| vglnk_15409254509558 number| BOOMR_onload string| bm_website_code object| $tealium boolean| google_noFetch boolean| google_DisableInitialLoad number| __google_ad_urls_id object| ret boolean| searchOpen object| $lastFocusedInput string| pageType undefined| jQuery183022267492917479226_1540925450248 undefined| jQuery183022267492917479226_1540925450249 string| ZN_3xeBFJDuSs0SRW5_ed string| ZN_3xeBFJDuSs0SRW5_sampleRate string| ZN_3xeBFJDuSs0SRW5_url function| udm_ function| ns_order object| ns_ object| ns_p function| fbq function| _fbq object| QSI object| UA number| _rnd string| __prot object| __i number| google_unique_id object| gaGlobal string| disqus_shortname function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter object| DISQUSWIDGETS undefined| disqus_domain function| mb function| Goog_AdSense_Lidar_sendVastEvent function| Goog_AdSense_Lidar_getViewability function| Goog_AdSense_Lidar_getUrlSignalsArray function| Goog_AdSense_Lidar_getUrlSignalsList object| ima object| google object| NOLCMB object| platform function| mux object| ADB object| __google_ad_urls boolean| google_osd_loaded boolean| google_onload_fired function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| closure_lm_926413 boolean| autoplay object| Moat#G26 boolean| Moat#EVA object| MoatSuperV26 function| disqus_config object| NOLBUNDLE object| closure_lm_262960 string| q undefined| vglnk_154092545438511 object| DISQUS object| google_jobrunner number| google_global_correlator object| google_prev_clients object| TRC object| _tblConsole object| _taboola object| _comscore undefined| msg string| pm_pgtp string| emmUrlKey string| optoutCookieKey object| ns object| paramsPassed object| stateObject string| BUILDVERSION object| stateEvents string| pm_ppy string| pm_geo string| _pmep string| _pmep_geo string| _pmpmk boolean| _pmasync boolean| _pmoptimization boolean| _pmoptimizationmanipulation boolean| _pmhp boolean| _pmsb function| _pmloadfile object| bbVer object| pmk object| pmglb object| pmfa object| pmad object| pmdebug_c object| _pmenv undefined| _tb_d undefined| _tb_rand function| getBBVersion function| _tb_getUrlParameter object| _pm_mcm function| pmws_request_done object| _tb_ext_xp object| COMSCORE object| _pmk function| TBWidgetStorage function| TBWidgetPersonalization function| TBWidgetWhatsApp function| TBWidgetGawkerComments function| TBWidgetGawkerPersonalization function| TBWidgetWeatherStories function| TBWidgetFBCommentPersonalization function| TBWidgetDisqusPersonalization function| TBWidgetFacebookComments function| TBWidgetCommentButton function| TBWidgetMsnTsb function| TBClickToPlayVideo function| TBClickToPlayVideoElem function| TBWidgetVideoPlayer function| TBGenericVideoModule function| TBOtherPlayer function| TBVideoMetaData function| TBKalturaPlayer function| TBBrightcovePlayer function| TBOoYalaPlayer function| TBMSNPlayer function| TBWidgetMsnTsbPersonalization function| TBVideoCarousel function| TBVideoRightRail function| TBWidgetVideoPersonalization function| TBWidgetFPORunner function| PMTargeting function| PMTracking function| PMUniversalGA function| PMMdotLabs function| PMComScore function| PMPublisher function| TBOptimization function| TBWidgetFacebook function| TBWidgetTwitter function| TBWidgetAddThis function| TBWidgetShareThis function| TBWidgetDisqus function| TBWidgetGigya function| TBWidgetReddit function| TBWidgetPinterest function| TBWidgetSC function| TBWidgetSTPPersonalization function| TBWidgetSCPersonalization function| _comcast_fn function| PMRetry function| PMGlobal function| PMIdentifier function| pmws_getlocation_done object| pmdebug object| pmws object| xq string| GoogleAnalyticsObject function| ga object| _pm_mcg object| tbopt function| PMAd function| openx_ad_request_done function| pm_image_onload_done function| __trcCopyProps function| __trcFromError function| __trcClientTimestamp function| __trcLog function| __trcError function| __trcDebug function| __trcInfo function| __trcWarn function| __trcDOMWalker function| __trcPurgeEventHandlers function| __trcJSONify function| __trcUnJSONify function| __trcGetMargins function| __trcAttachResize function| __trcDetachResize function| __trcTrim function| __trcGetElementsByClass function| __trcToArray function| __trcObjectCreate function| Gettext function| PageManager object| params number| trc_debug_level string| trc_article_id string| trc_item_url boolean| trc_testmode object| TRCImpl object| google_tag_data object| gaplugins object| sa object| gaData

32 Cookies

Domain/Path Name / Value
.lightboxcdn.com/ Name: __cfduid
Value: d32500329a5767de4faa1a8fb987255e81540925450
.demdex.net/ Name: demdex
Value: 42368779027364773391084610354461960579
.zdnet.com/ Name: RT
Value: "dm=zdnet.com&si=90837c7d-2e7b-48b0-8cd4-ec0b522482af&ss=1540925441417&sl=2&tt=7828&obo=0&sh=1540925451541%3D2%3A0%3A7828%2C1540925445192%3D1%3A0%3A3732&bcn=%2F%2F36c3feec.akstat.io%2F&ld=1540925451541"
.zdnet.com/ Name: utag_main
Value: v_id:0166c65068590097e3aeb117dec800078006d07000b08$_sn:1$_ss:0$_st:1540927251514$ses_id:1540925450330%3Bexp-session$_pn:1%3Bexp-session$linktag:undefined%3Bexp-session
.zdnet.com/ Name: fly_default_edition
Value: eu
.zdnet.com/ Name: AMCV_10D31225525FF5790A490D4D%40AdobeOrg
Value: -894706358%7CMCMID%7C42232163989227135711106414016823143675%7CMCAAMLH-1541530250%7C6%7CMCAAMB-1541530250%7CRKhpRz8krg2tLO6pguXWp5olkAcUniQYPHaMWWgdJ3xzPWQmdj0y%7CMCOPTOUT-1540932650s%7CNONE%7CMCAID%7C2DEC540505313241-6000012C00000455%7CvVersion%7C2.3.0
.demdex.net/ Name: dextp
Value: 269-1-1540925450781|3-1-1540925450883|477-1-1540925450984|771-1-1540925451085|22052-1-1540925451186|30646-1-1540925451287|121998-1-1540925451388|127444-1-1540925451489
.agkn.com/ Name: u
Value: C|0CEAja2SKI2tkiwAAAAABAg1RAQCADVIBAIABEUEAAAAA
www.zdnet.com/ Name: viewGuid
Value: 7cae3897-1371-4826-8d8e-bfbd8614339a
.zdnet.com/ Name: AMCVS_10D31225525FF5790A490D4D%40AdobeOrg
Value: 1
.zdnet.com/ Name: s_invisit
Value: true
www.zdnet.com/ Name: LDCLGFbrowser
Value: 30a3f4c2-beb4-4744-8a81-f73f949d4ccc
.zdnet.com/ Name: s_getNewRepeat
Value: 1540925450676-New
.zdnet.com/ Name: s_vnum
Value: 1543517450673%26vn%3D1
.zdnet.com/ Name: first_page_today
Value: false
www.zdnet.com/ Name: GED_PLAYLIST_ACTIVITY
Value: W3sidSI6IlFTR2oiLCJ0c2wiOjE1NDA5MjU0NTEsIm52IjowLCJ1cHQiOjE1NDA5MjU0NDMsImx0IjoxNTQwOTI1NDQzfV0.
.zdnet.com/ Name: fly_geo
Value: {"countryCode": "de"}
.agkn.com/ Name: ab
Value: 0001%3AGqHHeQZkIFM5g4b8taohxBRUtD4LQs7CHcXJu2ftvkdaJ94oF4iFeA%3D%3D
www.zdnet.com/ Name: _ccmaid
Value: 5978151442409083984
.zdnet.com/ Name: s_cc
Value: true
.zdnet.com/ Name: fly_device
Value: desktop
.zdnet.com/ Name: s_lv_zdnet
Value: 1540925450679
www.zdnet.com/ Name: _ccmsi
Value: 1540925450448_vz23ofkk9|1540925450450
.zdnet.com/ Name: nemo_highlander-video_focus
Value: video_focus%3a1%3aexclude
.zdnet.com/ Name: zdnet_ad
Value: %7B%22type%22%3A%22gpt%22%2C%22region%22%3A%22uk%22%2C%22session%22%3A%22e%22%2C%22subSession%22%3A%225%22%7D
.zdnet.com/ Name: ak_bmsc
Value: 4CBA7FD9480CE9B3851A895F675C762B0210BAB79817000008A8D85B8CDEA03B~plPWCmAGOVDdm23a8+NpG3VSq9T7inpPAfvtiHeK79FgqtulcnrlmWNeef4f+fFiOGltnClXTEFUuNGyKwORQ+BHo58xD2VO8gIdqjpfcEVMZTloU+p2RfXsgXBCfni+nZhblCT0PbrNydPoVUmyG9hkQKvZx1UJYXES5N/c5jgtIZIx+uSgYIiMm2yBKmaGIRc5hTqSvBuoIzn+R+SebIkB0BR2BlrXvrDnN11FOKO2w=
www.zdnet.com/ Name: trc_cookie_storage
Value: cbsinteractive-zdnet%253Asession-data%3Dv2_6cac2f81339b17ffba55fc0c94d5d0c2_5bffbdbd-b331-42d1-b8b0-3e3363fc2579-tuct2d22d87_1540925447_1540925447_CNawjgYQzro_GIG3wbLsLCABKAEwODib4wlAgooQSJjEF1Cl7BBYAWAA%7Ctaboola%2520global%253Alocal-storage-keys%3D%255B%2522cbsinteractive-zdnet%253Asession-data%2522%252C%2522taboola%2520global%253Auser-id%2522%255D%7Ctaboola%2520global%253Auser-id%3D5bffbdbd-b331-42d1-b8b0-3e3363fc2579-tuct2d22d87
.zdnet.com/ Name: aam_uuid
Value: 42368779027364773391084610354461960579
.zdnet.com/ Name: s_lv_zdnet_s
Value: First%20Visit
www.zdnet.com/ Name: XCLGFbrowser
Value: fxeDYFvYqAqDMrogHq8
.zdnet.com/ Name: fly_preferred_edition
Value: eu
.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks Name: CBS_INTERNAL
Value: 0

58 Console Messages

Source Level URL
Text
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service pending (GDPR consent not granted): script_indexexchange
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service pending (GDPR consent not granted): script_mpulse
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service pending (GDPR consent not granted): script_gpt
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 732)
Message:
ADS: queuing nav-ad-5bd8a808c3bef for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1203)
Message:
ADS: queuing intromercial-5bd8a808c3bef for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1272)
Message:
ADS: queuing skin-5bd8a808c3bef for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1281)
Message:
ADS: queuing leader-plus-top-5bd8a808c3bef for display
console-api log URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js(Line 1)
Message:
dom not ready, setting event
console-api log URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js(Line 1)
Message:
dom not ready, setting event
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1420)
Message:
ADS: queuing inpage-video-top-5bd8a808c3bef for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1430)
Message:
ADS: queuing sharethrough-top-5bd8a808c3bef for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1653)
Message:
ADS: queuing mpu-plus-top-5bd8a808c3bef for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1763)
Message:
ADS: queuing dynamic-showcase-top-5bd8a808c3bef for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1770)
Message:
ADS: queuing mpu-middle-5bd8a808c3bef for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 2004)
Message:
ADS: queuing mpu-bottom-5bd8a808c3bef for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 2021)
Message:
ADS: queuing leader-plus-bottom-5bd8a808c3bef for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service pending (GDPR consent not granted): script_sharethrough
console-api log URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js(Line 1)
Message:
dom ready, triggering load
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
GDPR consent granted
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent finally granted): script_indexexchange
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent finally granted): script_mpulse
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent finally granted): script_gpt
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent finally granted): script_sharethrough
console-api log URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js(Line 1)
Message:
dom ready, triggering load
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js(Line 9)
Message:
Missing adCookieData!
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js(Line 92)
Message:
zdnet
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_mpulse
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): _injectQueryStringGCP
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_ad
console-api log (Line 2)
Message:
ADS: queuing mpu-bottom-5bd8a808c3bef for display
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808(Line 177)
Message:
Service: sitecatalyst
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js(Line 92)
Message:
zdnet
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_sharebar
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_video
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_sharebar
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/user.js?cb=636754604557185965(Line 1224)
Message:
DIGIOH: identityChildReady999999999: zyxcba
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_urban_airship
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_disqus_count
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_disqus_count
console-api log URL: https://vidtech.cbsinteractive.com/uvpjs/2.8.3/CBSI-PLAYER.js(Line 20)
Message:
UVPJS 2.8.3 03/26/18 8:42:19 AM (PDT)
console-api log (Line 33)
Message:
blank creative loaded: 138245072116 (5 x 5, pos=nav)
console-api log (Line 33)
Message:
blank creative loaded: 138239321298 (1600 x 1000, pos=top)
console-api log (Line 33)
Message:
blank creative loaded: 43343691249 (300 x 250, pos=bottom)
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 164)
Message:
Dynamic Showcase Center container ::: creative id = 138247024569
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_taboola
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_medusa_async_load
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): disqus_init
console-api warning URL: https://zdnet1.cbsistatic.com/fly/js/libs/mpulse-1.0.2.js(Line 8)
Message:
mPulse: Custom Timer 'video_ploaded' is not defined
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js(Line 92)
Message:
zdnet
console-api log URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/user.js?cb=636754604557185965(Line 1224)
Message:
DIGIOH: Calling setIsCrossDomainStorageWorking using short circuit!!!!
console-api log (Line 33)
Message:
blank creative loaded: 138239479696 (372 x 142, pos=)
console-api log (Line 33)
Message:
blank creative loaded: 138239375180 (372 x 142, pos=)

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

364bf6be.akstat.io
36c3feec.akstat.io
ad.yieldmanager.com
ads.rubiconproject.com
adservice.google.com
adservice.google.de
api.viglink.com
as-sec.casalemedia.com
asset.pagefair.com
asset.pagefair.net
bam.nr-data.net
beacon-eu-ams3.rubiconproject.com
beacon.tru.am
c.disquscdn.com
c.evidon.com
c.go-mpulse.net
cbsdfp5832910442.s.moatpixel.com
cbsi.demdex.net
cdn-gl.imrworldwide.com
cdn.taboola.com
cdn.viglink.com
cm.everesttech.net
cm.g.doubleclick.net
connect.facebook.net
d.agkn.com
disqus.com
dpm.demdex.net
dw.cbsi.com
eus.rubiconproject.com
geo.moatads.com
googleads.g.doubleclick.net
graph.facebook.com
idsync.rlcdn.com
iicbsi-a.akamaihd.net
images.taboola.com
imasdk.googleapis.com
in.ml314.com
js-agent.newrelic.com
js-sec.indexww.com
js.agkn.com
l.betrad.com
match.adsrvr.org
ml314.com
native.sharethrough.com
optimized-by.rubiconproject.com
pagead2.googlesyndication.com
pixel.everesttech.net
pixel.mathtag.com
ps.eyeota.net
px.moatads.com
rev.cbsi.com
s0.2mdn.net
saa.cbsi.com
sb.scorecardresearch.com
secure-us.imrworldwide.com
secure.adnxs.com
securepubads.g.doubleclick.net
stats.pagefair.com
sync.crwdcntrl.net
tags.bluekai.com
tags.tiqcdn.com
tpc.googlesyndication.com
trc.taboola.com
tru.am
vidtech.cbsinteractive.com
web-sdk.urbanairship.com
widget.perfectmarket.com
www.everestjs.net
www.facebook.com
www.google-analytics.com
www.google.com
www.google.de
www.googleadservices.com
www.googletagservices.com
www.lightboxcdn.com
www.linkedin.com
www.zdnet.com
z.moatads.com
zdnet-1.disqus.com
zdnet1.cbsistatic.com
zdnet2.cbsistatic.com
zdnet3.cbsistatic.com
zdnet4.cbsistatic.com
zn_3xebfjduss0srw5-cbs.siteintercept.qualtrics.com
api.viglink.com
images.taboola.com
trc.taboola.com
104.111.230.142
104.66.106.214
104.98.131.27
108.161.188.128
151.101.1.181
151.101.120.134
151.101.2.110
151.101.2.2
151.101.64.134
162.247.242.21
18.203.164.211
185.33.223.216
2.18.233.143
2.18.233.149
2.18.233.201
213.19.162.27
213.19.162.51
216.58.210.2
216.58.214.98
23.57.19.23
23.58.219.40
23.77.209.221
23.8.11.168
23.8.8.176
2400:cb00:2048:1::6810:4ea5
2400:cb00:2048:1::6810:4ea6
2400:cb00:2048:1::6810:a20d
2600:9000:200c:b600:15:efbc:e300:93a1
2606:4700:20::6819:a322
2a00:1288:110:422::3000
2a00:1450:4001:80b::2002
2a00:1450:4001:815::2002
2a00:1450:4001:816::2001
2a00:1450:4001:816::2004
2a00:1450:4001:816::2006
2a00:1450:4001:816::200a
2a00:1450:4001:819::2002
2a00:1450:4001:81d::2002
2a00:1450:4001:820::2002
2a00:1450:4001:821::2003
2a00:1450:4001:824::2002
2a00:1450:400c:c0c::66
2a02:26f0:6c00:19d::e3d
2a02:26f0:6c00::210:ba12
2a03:2880:f01a:1:face:b00c:0:1
2a03:2880:f02d:12:face:b00c:0:3
2a03:2880:f12d:83:face:b00c:0:25de
2a05:f500:10:101::b93f:9101
34.242.39.94
34.247.143.160
35.157.74.177
52.16.141.158
52.31.106.135
52.5.125.127
52.56.60.241
54.152.59.224
54.154.175.204
54.154.86.186
54.208.143.184
54.230.93.121
54.230.93.205
54.76.196.204
54.85.229.0
63.140.43.37
64.30.224.172
66.117.28.68
66.117.28.86
68.232.35.180
92.123.186.115
92.123.187.90
92.123.6.233
94.31.29.248
95.100.197.129
95.100.198.4
95.100.199.29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