URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-ko...
Submission: On November 12 via api from US

Summary

This website contacted 87 IPs in 8 countries across 66 domains to perform 267 HTTP transactions. The main IP is 50.31.169.131, located in Elk Grove Village, United States and belongs to SERVERCENTRAL - Server Central Network, US. The main domain is arstechnica.com.
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on January 16th 2019. Valid for: 2 years.
This is the only time arstechnica.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 50.31.169.131 23352 (SERVERCEN...)
18 205.234.175.175 30081 (CACHENETW...)
3 2a00:1450:400... 15169 (GOOGLE)
3 13.225.86.250 16509 (AMAZON-02)
6 2.18.234.21 16625 (AKAMAI-AS)
26 2.18.235.40 16625 (AKAMAI-AS)
1 13.225.78.46 16509 (AMAZON-02)
3 13.225.78.104 16509 (AMAZON-02)
2 2606:4700::68... 13335 (CLOUDFLAR...)
3 151.139.128.10 20446 (HIGHWINDS3)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
7 172.217.16.130 15169 (GOOGLE)
2 2.18.234.190 16625 (AKAMAI-AS)
2 34.193.78.244 14618 (AMAZON-AES)
2 143.204.98.85 16509 (AMAZON-02)
1 54.76.0.5 16509 (AMAZON-02)
2 151.101.112.239 54113 (FASTLY)
1 178.250.2.130 44788 (ASN-CRITE...)
1 2 63.32.23.112 16509 (AMAZON-02)
1 3.10.64.227 16509 (AMAZON-02)
1 2600:9000:204... 16509 (AMAZON-02)
1 2 35.190.59.101 15169 (GOOGLE)
2 35.201.67.47 15169 (GOOGLE)
7 2606:2800:234... 15133 (EDGECAST)
16 52.5.37.73 14618 (AMAZON-AES)
2 52.16.200.95 16509 (AMAZON-02)
1 8 2a00:1450:400... 15169 (GOOGLE)
4 91.228.74.248 27281 (QUANTCAST)
1 46.228.164.13 56396 (TURN)
4 2a03:2880:f01... 32934 (FACEBOOK)
1 151.101.12.157 54113 (FASTLY)
1 143.204.101.44 16509 (AMAZON-02)
1 35.190.92.63 15169 (GOOGLE)
1 52.24.200.26 16509 (AMAZON-02)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
3 52.3.171.116 14618 (AMAZON-AES)
1 13.225.78.33 16509 (AMAZON-02)
2 152.195.132.202 15133 (EDGECAST)
1 3 2.19.43.224 20940 (AKAMAI-ASN1)
2 4 35.227.248.159 15169 (GOOGLE)
5 2606:4700::68... 13335 (CLOUDFLAR...)
3 2a00:1450:400... 15169 (GOOGLE)
7 2.18.232.28 16625 (AKAMAI-AS)
1 2a00:1450:400... 15169 (GOOGLE)
1 35.190.40.172 15169 (GOOGLE)
2 70.42.32.63 22075 (AS-OUTBRAIN)
1 52.20.65.175 14618 (AMAZON-AES)
1 2 2a05:f500:11:... 14413 (LINKEDIN)
1 1 2a05:f500:11:... 14413 (LINKEDIN)
1 2600:9000:215... 16509 (AMAZON-02)
2 34.98.72.95 15169 (GOOGLE)
2 69.173.144.143 26667 (RUBICONPR...)
8 12 152.199.21.89 15133 (EDGECAST)
1 2a03:2880:f01... 32934 (FACEBOOK)
2 34.241.149.220 16509 (AMAZON-02)
1 63.140.41.50 15224 (OMNITURE)
1 1 66.117.28.86 15224 (OMNITURE)
1 3.225.242.81 14618 (AMAZON-AES)
2 34.231.252.38 14618 (AMAZON-AES)
1 104.244.42.133 13414 (TWITTER)
1 2a00:1450:400... 15169 (GOOGLE)
1 2606:4700::68... 13335 (CLOUDFLAR...)
2 35.186.226.184 15169 (GOOGLE)
1 3 2a03:2880:f11... 32934 (FACEBOOK)
2 2 2a00:1450:400... 15169 (GOOGLE)
2 2 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 2 104.244.42.136 13414 (TWITTER)
3 2606:2800:134... 15133 (EDGECAST)
4 104.17.192.78 13335 (CLOUDFLAR...)
1 2606:4700::68... 13335 (CLOUDFLAR...)
23 13.225.84.158 16509 (AMAZON-02)
3 2a00:1450:400... 15169 (GOOGLE)
4 13.224.197.211 16509 (AMAZON-02)
1 151.101.14.2 54113 (FASTLY)
1 2a00:1450:400... 15169 (GOOGLE)
5 13.224.196.49 16509 (AMAZON-02)
1 3.234.94.61 14618 (AMAZON-AES)
1 2606:4700:10:... 13335 (CLOUDFLAR...)
1 34.210.147.177 16509 (AMAZON-02)
4 4 185.33.223.202 29990 (ASN-APPNEXUS)
7 34.209.112.70 16509 (AMAZON-02)
2 2 185.64.190.80 62713 (AS-PUBMATIC)
1 1 216.58.210.2 15169 (GOOGLE)
1 1 178.162.133.149 60781 (LEASEWEB-...)
2 2 18.195.155.181 16509 (AMAZON-02)
2 178.250.2.152 44788 (ASN-CRITE...)
1 54.69.119.154 16509 (AMAZON-02)
2 34.206.156.87 14618 (AMAZON-AES)
1 104.244.42.131 13414 (TWITTER)
1 2a03:2880:f01... 32934 (FACEBOOK)
2 52.22.222.12 14618 (AMAZON-AES)
1 172.217.23.98 15169 (GOOGLE)
267 87
Apex Domain
Subdomains
Transfer
34 cloudfront.net
d1z2jf7jlzjs58.cloudfront.net
dwgyu36up6iuz.cloudfront.net
d2c8v52ll5s99u.cloudfront.net
dp8hsntg6do36.cloudfront.net
1 MB
27 moatads.com
z.moatads.com
mb.moatads.com
px.moatads.com
270 KB
23 condenastdigital.com
pixel.condenastdigital.com
capture.condenastdigital.com
infinityid.condenastdigital.com
4d.condenastdigital.com
wren.condenastdigital.com
21 KB
18 arstechnica.net
cdn.arstechnica.net
691 KB
12 advertising.com
adserver-us.adtech.advertising.com
3 KB
11 doubleclick.net
securepubads.g.doubleclick.net
stats.g.doubleclick.net
cm.g.doubleclick.net
pubads.g.doubleclick.net
99 KB
10 ad.gt
a.ad.gt
p.ad.gt
ids.ad.gt
pixels.ad.gt
14 KB
10 twitter.com
platform.twitter.com
syndication.twitter.com
analytics.twitter.com
107 KB
8 outbrainimg.com
tcheck.outbrainimg.com
log.outbrainimg.com
images.outbrainimg.com
49 KB
8 google-analytics.com
www.google-analytics.com
21 KB
7 skimresources.com
s.skimresources.com
r.skimresources.com
t.skimresources.com
p.skimresources.com
17 KB
5 polarcdn-terrax.com
polarcdn-terrax.com
17 KB
5 google.com
adservice.google.com
ampcid.google.com
www.google.com
1 KB
5 cnevids.com
player.cnevids.com
api.cnevids.com
62 KB
4 adnxs.com
secure.adnxs.com
ib.adnxs.com
4 KB
4 polarcdn-pentos.com
polarcdn-pentos.com
925 B
4 facebook.com
an.facebook.com
www.facebook.com
2 KB
4 casalemedia.com
as-sec.casalemedia.com
2 KB
4 tapad.com
pixel.tapad.com
1 KB
4 facebook.net
connect.facebook.net
214 KB
4 quantserve.com
secure.quantserve.com
pixel.quantserve.com
7 KB
4 demdex.net
dpm.demdex.net
condenast.demdex.net
10 KB
4 outbrain.com
widgets.outbrain.com
odb.outbrain.com
mcdp-nydc1.outbrain.com
47 KB
4 google.de
adservice.google.de
ampcid.google.de
www.google.de
846 B
3 googleapis.com
imasdk.googleapis.com
120 KB
3 twimg.com
cdn.syndication.twimg.com
pbs.twimg.com
24 KB
3 linkedin.com
px.ads.linkedin.com
www.linkedin.com
1 KB
3 parsely.com
srv-2019-11-12-07.config.parsely.com
srv-2019-11-12-07.pixel.parsely.com
1 KB
3 googlesyndication.com
tpc.googlesyndication.com
3 scorecardresearch.com
sb.scorecardresearch.com
1 KB
3 medtargetsystem.com
www.medtargetsystem.com
39 KB
3 bounceexchange.com
tag.bounceexchange.com
assets.bounceexchange.com
90 KB
3 amazon-adsystem.com
c.amazon-adsystem.com
28 KB
3 googletagservices.com
www.googletagservices.com
73 KB
3 arstechnica.com
arstechnica.com
sstats.arstechnica.com
15 KB
2 criteo.com
bidder.criteo.com
521 B
2 emxdgt.com
cs.emxdgt.com
456 B
2 pubmatic.com
image2.pubmatic.com
1 KB
2 snapchat.com
tr.snapchat.com
2 rubiconproject.com
fastlane.rubiconproject.com
3 KB
2 cookielaw.org
cdn.cookielaw.org
144 KB
2 adsrvr.org
match.adsrvr.org
1017 B
2 mediavoice.com
cdn.mediavoice.com
plugin.mediavoice.com
126 KB
2 actionbutton.co
embed.actionbutton.co
prod-native.actionbutton.co
17 KB
2 indexww.com
js-sec.indexww.com
36 KB
1 atdmt.com
cx.atdmt.com
407 B
1 sonobi.com
sync.go.sonobi.com
745 B
1 onetrust.com
geolocation.onetrust.com
320 B
1 deepintent.com
match.deepintent.com
365 B
1 2mdn.net
s0.2mdn.net
11 KB
1 plrsrvcs.com
bw-prod.plrsrvcs.com
3 KB
1 polarcdn.com
static.polarcdn.com
119 KB
1 t.co
t.co
449 B
1 everesttech.net
cm.everesttech.net
527 B
1 quantcount.com
rules.quantcount.com
2 KB
1 consensu.org
api.skimlinks.mgr.consensu.org
636 B
1 sc-static.net
sc-static.net
5 KB
1 licdn.com
snap.licdn.com
2 KB
1 sail-horizon.com
ak.sail-horizon.com
43 KB
1 ads-twitter.com
static.ads-twitter.com
2 KB
1 turn.com
d.turn.com
721 B
1 criteo.net
static.criteo.net
27 KB
1 zqtk.net
segment-data.zqtk.net
1 KB
1 googletagmanager.com
www.googletagmanager.com
66 KB
0 rkdms.com Failed
mid.rkdms.com Failed
0 rlcdn.com Failed
api.rlcdn.com Failed
267 66
Domain Requested by
23 dwgyu36up6iuz.cloudfront.net arstechnica.com
d2c8v52ll5s99u.cloudfront.net
23 px.moatads.com arstechnica.com
18 cdn.arstechnica.net arstechnica.com
cdn.arstechnica.net
16 capture.condenastdigital.com arstechnica.com
12 adserver-us.adtech.advertising.com 8 redirects arstechnica.com
8 www.google-analytics.com 1 redirects www.googletagmanager.com
www.google-analytics.com
arstechnica.com
7 ids.ad.gt arstechnica.com
7 platform.twitter.com cdn.arstechnica.net
platform.twitter.com
7 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
arstechnica.com
6 images.outbrainimg.com arstechnica.com
5 dp8hsntg6do36.cloudfront.net arstechnica.com
d2c8v52ll5s99u.cloudfront.net
5 polarcdn-terrax.com cdn.mediavoice.com
plugin.mediavoice.com
static.polarcdn.com
arstechnica.com
4 d2c8v52ll5s99u.cloudfront.net player.cnevids.com
imasdk.googleapis.com
d2c8v52ll5s99u.cloudfront.net
4 polarcdn-pentos.com static.polarcdn.com
4 as-sec.casalemedia.com js-sec.indexww.com
4 pixel.tapad.com 2 redirects arstechnica.com
4 connect.facebook.net arstechnica.com
connect.facebook.net
d2c8v52ll5s99u.cloudfront.net
3 imasdk.googleapis.com player.cnevids.com
imasdk.googleapis.com
3 www.facebook.com 1 redirects arstechnica.com
connect.facebook.net
3 pixel.quantserve.com arstechnica.com
3 tpc.googlesyndication.com securepubads.g.doubleclick.net
3 sb.scorecardresearch.com 1 redirects arstechnica.com
www.googletagmanager.com
3 www.medtargetsystem.com arstechnica.com
www.medtargetsystem.com
3 player.cnevids.com arstechnica.com
cdn.arstechnica.net
player.cnevids.com
3 z.moatads.com arstechnica.com
securepubads.g.doubleclick.net
d2c8v52ll5s99u.cloudfront.net
3 c.amazon-adsystem.com arstechnica.com
c.amazon-adsystem.com
3 www.googletagservices.com arstechnica.com
securepubads.g.doubleclick.net
2 wren.condenastdigital.com cdn.arstechnica.net
2 srv-2019-11-12-07.pixel.parsely.com arstechnica.com
2 bidder.criteo.com static.criteo.net
2 ib.adnxs.com 2 redirects
2 cs.emxdgt.com 2 redirects
2 image2.pubmatic.com 2 redirects
2 secure.adnxs.com 2 redirects
2 pbs.twimg.com arstechnica.com
2 syndication.twitter.com 1 redirects arstechnica.com
2 www.google.de arstechnica.com
2 www.google.com 2 redirects
2 stats.g.doubleclick.net 2 redirects
2 tr.snapchat.com sc-static.net
2 4d.condenastdigital.com pixel.condenastdigital.com
2 condenast.demdex.net arstechnica.com
2 fastlane.rubiconproject.com js-sec.indexww.com
2 assets.bounceexchange.com tag.bounceexchange.com
assets.bounceexchange.com
2 px.ads.linkedin.com 1 redirects arstechnica.com
2 cdn.cookielaw.org www.googletagmanager.com
cdn.cookielaw.org
2 dpm.demdex.net arstechnica.com
2 p.skimresources.com arstechnica.com
2 t.skimresources.com arstechnica.com
s.skimresources.com
2 r.skimresources.com 1 redirects arstechnica.com
2 match.adsrvr.org 1 redirects js-sec.indexww.com
2 pixel.condenastdigital.com arstechnica.com
2 d1z2jf7jlzjs58.cloudfront.net arstechnica.com
d1z2jf7jlzjs58.cloudfront.net
2 api.cnevids.com cdn.arstechnica.net
2 widgets.outbrain.com cdn.arstechnica.net
widgets.outbrain.com
2 adservice.google.com www.googletagservices.com
imasdk.googleapis.com
2 js-sec.indexww.com arstechnica.com
2 arstechnica.com cdn.arstechnica.net
1 pubads.g.doubleclick.net d2c8v52ll5s99u.cloudfront.net
1 cx.atdmt.com
1 analytics.twitter.com static.ads-twitter.com
1 pixels.ad.gt p.ad.gt
1 mcdp-nydc1.outbrain.com widgets.outbrain.com
1 sync.go.sonobi.com 1 redirects
1 cm.g.doubleclick.net 1 redirects
1 p.ad.gt a.ad.gt
1 geolocation.onetrust.com cdn.cookielaw.org
1 match.deepintent.com arstechnica.com
1 s0.2mdn.net imasdk.googleapis.com
1 odb.outbrain.com widgets.outbrain.com
1 bw-prod.plrsrvcs.com static.polarcdn.com
1 cdn.syndication.twimg.com platform.twitter.com
1 static.polarcdn.com securepubads.g.doubleclick.net
1 ampcid.google.de www.google-analytics.com
1 t.co arstechnica.com
1 infinityid.condenastdigital.com pixel.condenastdigital.com
1 cm.everesttech.net 1 redirects
1 sstats.arstechnica.com arstechnica.com
1 an.facebook.com js-sec.indexww.com
1 rules.quantcount.com secure.quantserve.com
1 www.linkedin.com 1 redirects
1 srv-2019-11-12-07.config.parsely.com d1z2jf7jlzjs58.cloudfront.net
1 log.outbrainimg.com widgets.outbrain.com
1 api.skimlinks.mgr.consensu.org s.skimresources.com
1 ampcid.google.com www.google-analytics.com
1 tcheck.outbrainimg.com widgets.outbrain.com
1 plugin.mediavoice.com cdn.mediavoice.com
1 sc-static.net arstechnica.com
1 snap.licdn.com arstechnica.com
1 a.ad.gt www.googletagmanager.com
1 tag.bounceexchange.com arstechnica.com
1 ak.sail-horizon.com www.googletagmanager.com
1 static.ads-twitter.com www.googletagmanager.com
1 d.turn.com arstechnica.com
1 secure.quantserve.com www.googletagmanager.com
1 prod-native.actionbutton.co embed.actionbutton.co
1 mb.moatads.com z.moatads.com
1 static.criteo.net js-sec.indexww.com
1 segment-data.zqtk.net arstechnica.com
1 adservice.google.de www.googletagservices.com
1 www.googletagmanager.com arstechnica.com
1 s.skimresources.com arstechnica.com
1 cdn.mediavoice.com arstechnica.com
1 embed.actionbutton.co arstechnica.com
0 mid.rkdms.com Failed js-sec.indexww.com
0 api.rlcdn.com Failed js-sec.indexww.com
267 106
Subject Issuer Validity Valid
*.arstechnica.com
Sectigo RSA Domain Validation Secure Server CA
2019-01-16 -
2021-01-15
2 years crt.sh
*.cachefly.net
GlobalSign RSA OV SSL CA 2018
2019-11-01 -
2021-10-29
2 years crt.sh
*.g.doubleclick.net
GTS CA 1O1
2019-10-16 -
2020-01-08
3 months crt.sh
c.amazon-adsystem.com
Amazon
2019-10-07 -
2020-09-29
a year crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2019-07-17 -
2020-03-09
8 months crt.sh
moatads.com
DigiCert ECC Secure Server CA
2018-11-10 -
2020-02-09
a year crt.sh
*.actionbutton.co
Go Daddy Secure Certificate Authority - G2
2019-06-25 -
2020-06-27
a year crt.sh
*.cnevids.com
Trusted Secure Certificate Authority 5
2017-01-10 -
2020-01-10
3 years crt.sh
ssl962336.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-11-12 -
2020-05-20
6 months crt.sh
*.skimresources.com
DigiCert SHA2 Secure Server CA
2018-09-13 -
2020-10-07
2 years crt.sh
*.google-analytics.com
GTS CA 1O1
2019-10-16 -
2020-01-08
3 months crt.sh
*.google.com
GTS CA 1O1
2019-10-16 -
2020-01-08
3 months crt.sh
*.outbrain.com
DigiCert SHA2 Secure Server CA
2018-12-14 -
2020-03-14
a year crt.sh
*.cloudfront.net
DigiCert Global CA G2
2019-07-17 -
2020-07-05
a year crt.sh
*.zqtk.net
COMODO RSA Domain Validation Secure Server CA
2018-08-09 -
2020-08-24
2 years crt.sh
condenast.com
GlobalSign CloudSSL CA - SHA256 - G3
2019-10-31 -
2020-08-07
9 months crt.sh
*.criteo.net
DigiCert ECC Secure Server CA
2019-03-26 -
2020-03-30
a year crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2019-03-07 -
2021-04-19
2 years crt.sh
*.moatads.com
DigiCert SHA2 Secure Server CA
2019-03-12 -
2021-06-10
2 years crt.sh
*.twimg.com
DigiCert SHA2 High Assurance Server CA
2018-11-19 -
2019-11-27
a year crt.sh
*.demdex.net
DigiCert SHA2 High Assurance Server CA
2018-01-09 -
2021-02-12
3 years crt.sh
*.quantserve.com
DigiCert SHA2 High Assurance Server CA
2019-10-04 -
2020-10-07
a year crt.sh
*.turn.com
DigiCert SHA2 Secure Server CA
2019-01-25 -
2020-03-31
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-09-22 -
2019-12-20
3 months crt.sh
ads-twitter.com
DigiCert SHA2 High Assurance Server CA
2019-08-14 -
2020-08-18
a year crt.sh
ak.sail-horizon.com
Amazon
2019-03-06 -
2020-04-06
a year crt.sh
tag.bounceexchange.com
Let's Encrypt Authority X3
2019-10-25 -
2020-01-23
3 months crt.sh
*.ad.gt
Amazon
2019-07-06 -
2020-08-06
a year crt.sh
*.licdn.com
DigiCert SHA2 Secure Server CA
2019-04-01 -
2021-05-07
2 years crt.sh
medtargetsystem.com
Amazon
2018-11-23 -
2019-12-23
a year crt.sh
sc-static.net
DigiCert SHA2 Secure Server CA
2019-03-11 -
2021-03-15
2 years crt.sh
sa437gl.wpc.edgecastcdn.net
DigiCert SHA2 Secure Server CA
2018-05-17 -
2020-08-19
2 years crt.sh
*.scorecardresearch.com
COMODO RSA Organization Validation Secure Server CA
2018-11-28 -
2019-12-26
a year crt.sh
*.tapad.com
DigiCert SHA2 Secure Server CA
2019-11-02 -
2020-11-06
a year crt.sh
ssl446800.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-09-13 -
2020-03-21
6 months crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2019-10-16 -
2020-01-08
3 months crt.sh
*.outbrainimg.com
DigiCert SHA2 Secure Server CA
2019-02-24 -
2020-05-25
a year crt.sh
api.skimlinks.mgr.consensu.org
DigiCert SHA2 Secure Server CA
2019-10-04 -
2021-10-07
2 years crt.sh
*.config.parsely.com
Amazon
2019-02-27 -
2020-03-27
a year crt.sh
px.ads.linkedin.com
DigiCert SHA2 Secure Server CA
2019-05-29 -
2021-06-29
2 years crt.sh
assets.bounceexchange.com
Let's Encrypt Authority X3
2019-10-13 -
2020-01-11
3 months crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2019-01-10 -
2021-01-14
2 years crt.sh
*.adtech.advertising.com
DigiCert SHA2 High Assurance Server CA
2018-05-22 -
2020-05-26
2 years crt.sh
sstats.arstechnica.com
DigiCert SHA2 High Assurance Server CA
2019-03-03 -
2020-06-05
a year crt.sh
*.conde.io
Amazon
2019-06-03 -
2020-07-03
a year crt.sh
t.co
DigiCert SHA2 High Assurance Server CA
2019-04-09 -
2020-04-01
a year crt.sh
ssl962736.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-11-12 -
2020-05-20
6 months crt.sh
tr.snapchat.com
DigiCert SHA2 Secure Server CA
2019-02-19 -
2021-02-23
2 years crt.sh
www.google.de
GTS CA 1O1
2019-10-16 -
2020-01-08
3 months crt.sh
syndication.twitter.com
DigiCert SHA2 High Assurance Server CA
2019-04-09 -
2020-04-01
a year crt.sh
ssl887612.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-08-29 -
2020-03-06
6 months crt.sh
ssl880796.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-07-31 -
2020-02-06
6 months crt.sh
*.googleapis.com
GTS CA 1O1
2019-10-16 -
2020-01-08
3 months crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-07-30 -
2020-07-25
a year crt.sh
*.doubleclick.net
GTS CA 1O1
2019-10-16 -
2020-01-08
3 months crt.sh
*.deepintent.com
Go Daddy Secure Certificate Authority - G2
2018-06-08 -
2020-06-08
2 years crt.sh
*.onetrust.com
DigiCert SHA2 Secure Server CA
2018-03-12 -
2020-06-14
2 years crt.sh
*.criteo.com
DigiCert ECC Secure Server CA
2019-03-28 -
2020-04-01
a year crt.sh
*.pixel.parsely.com
Let's Encrypt Authority X3
2019-10-01 -
2019-12-30
3 months crt.sh
*.twitter.com
DigiCert SHA2 High Assurance Server CA
2019-04-09 -
2020-04-01
a year crt.sh
*.atlassolutions.com
DigiCert SHA2 High Assurance Server CA
2019-10-28 -
2020-01-26
3 months crt.sh

This page contains 19 frames:

Primary Page: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Frame ID: 31A714749E4483A450271B3B5D0992FD
Requests: 235 HTTP requests in this frame

Frame: https://js-sec.indexww.com/um/ixmatch.html
Frame ID: A304B58F27E9FF46E72DC66E4F4E3EAD
Requests: 1 HTTP requests in this frame

Frame: https://prod-native.actionbutton.co/?isNativeEmbed=true&722154a6-97e8-4a81-8686-390658194ec0
Frame ID: 3DA260436BC878EC0876773B5BD98401
Requests: 1 HTTP requests in this frame

Frame: https://t.skimresources.com/api/v2/robots.txt?__skimjs_preflight__please_ignore__=true&rnd=0.006724040073962323
Frame ID: 7A8342953E1016836D6F5CD37E29E6EC
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/widget_iframe.2d991e3dfc9abb2549972ce8b64c5d85.html?origin=https%3A%2F%2Farstechnica.com
Frame ID: 63FB3EA75AA09760223BF1852CB2AAE0
Requests: 1 HTTP requests in this frame

Frame: https://condenast.demdex.net/dest5.html?d_nsid=0
Frame ID: 0574747277011E39CF01426B8821F1A6
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvdmmDL9hX90QNcKMiSu7jqBFRcvN8ROIrCwSHj6T0Pi_mgyDyU9sJTE3W2fXutiIhjkrVH9_-Df0OZEiXzHV_crCYZ9w3UEwyrpXcI43wB55Td1qSLsXarbP2HYB2de7c6629DPZaJKaWfEKoDlHHulpagwgSSFDKX6QavxR68CHy_AGuGrzJEZbhqCpPHU5R6C2hE-RYT9V4e431HDsIuPKH7on_j04ugnHb4iCTuUeLq1kGpyuVtcxvlSy4fU6x8JftdiGsYNUf9Ro3bP9MUWNNk&sai=AMfl-YRni4wqrCFnAYD-SPrEg7LmlARbbnHca0HOePtWNPnxDGLiFTVCIuFoXmx2y_xLgJluaC_RCF5fq-mgNv33sEvpAlXfrjgQb5E7zrARBg&sig=Cg0ArKJSzAmVBy9RIixLEAE&urlfix=1&adurl=
Frame ID: 2C0D089EBE5478AB8DA0F3ACBCF4AD1A
Requests: 11 HTTP requests in this frame

Frame: https://tr.snapchat.com/cm/i
Frame ID: 340B3983DE5747F0CBCAF2F8D20AB0C7
Requests: 1 HTTP requests in this frame

Frame: https://polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/
Frame ID: 88111711AF5589B1ED9BE9317DD7CA72
Requests: 1 HTTP requests in this frame

Frame: https://assets.bounceexchange.com/assets/bounce/local_storage_frame10.min.html
Frame ID: 534B464D8CF6026E8DB5D2C5E9C43813
Requests: 1 HTTP requests in this frame

Frame: https://tr.snapchat.com/p
Frame ID: 60B316B3E9E70839CBD4CC863F7B9ABA
Requests: 1 HTTP requests in this frame

Frame: https://polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/
Frame ID: 12F5B74FBD6BEEF795A341198A3CF027
Requests: 1 HTTP requests in this frame

Frame: https://www.medtargetsystem.com/beacon/portal/?_url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&_sid=f8a35ce4-088f-42e3-a865-ee7054814168&_vid=388b4fe4-05ef-46d5-b894-43351e369cfe&_ak=119-556-B0E9F642&_flash=false&_th=1573543716|1573543716|1
Frame ID: B0C5FBB390E487C262ECAC2D0FE0892E
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: F7D1F3D635A250757BB964755947C095
Requests: 26 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.349.0_en.html
Frame ID: EDDB328F7B5041153B4E799952A0977A
Requests: 1 HTTP requests in this frame

Frame: https://widgets.outbrain.com/widgetOBUserSync/obUserSync.html
Frame ID: 327E1C919D385437C5F7ED1CBB2E55EF
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/jot.html
Frame ID: 2DC86D91B50AE51A9F9363E8F5AB85CB
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-36/html/container.html
Frame ID: 42D42AF25316FED48FBD31A327665919
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-36/html/container.html
Frame ID: 63CCDB1EED8F410FCD8326CFC3743C7E
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^\/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i
  • script /google-analytics\.com\/plugins\/ua\/(?:ec|ecommerce)\.js/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/plugins\/ua\/(?:ec|ecommerce)\.js/i

Overall confidence: 100%
Detected patterns
  • script /\.quantserve\.com\/quant\.js/i

Page Statistics

267
Requests

98 %
HTTPS

31 %
IPv6

66
Domains

106
Subdomains

87
IPs

8
Countries

4050 kB
Transfer

11205 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 54
  • https://r.skimresources.com/api/ HTTP 307
  • https://r.skimresources.com/api/?xguid=01DSF879E9Y6D07VTNT2WWFJ06&persistence=1&checksum=0ef03bc71c97c66a9e217b08e77237eb04ec54a7739d9a14e4941362eae739af
Request Chain 75
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035094&ns__t=1573543716329&ns_c=UTF-8&c8=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1573543716329&ns_c=UTF-8&c8=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&c9=
Request Chain 76
  • https://pixel.tapad.com/idsync/ex/receive?partner_id=ADB&partner_device_id=undefined HTTP 302
  • https://pixel.tapad.com/idsync/ex/receive/check?partner_id=ADB&partner_device_id=undefined
Request Chain 77
  • https://pixel.tapad.com/idsync/ex/receive?partner_id=648&partner_device_id=undefined HTTP 302
  • https://pixel.tapad.com/idsync/ex/receive/check?partner_id=648&partner_device_id=undefined
Request Chain 94
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&time=1573543716464 HTTP 302
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D434737%26url%3Dhttps%253A%252F%252Farstechnica.com%252Finformation-technology%252F2019%252F10%252Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%252F%26time%3D1573543716464%26liSync%3Dtrue HTTP 302
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&time=1573543716464&liSync=true
Request Chain 99
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1573543716488;callback=window.headertag.AolHtb.adResponseCallbacks._xp6tSSQu; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1573543716;cmd=bid;cors=yes;v=2;misc=1573543716488;callback=window.headertag.AolHtb.adResponseCallbacks._xp6tSSQu HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1A0a3c4c2c-051e-11ea-a792-12ce909f321e;cfp=1;rndc=1573543715;cmd=bid;cors=yes;v=2;misc=1573543716488;callback=window.headertag.AolHtb.adResponseCallbacks._xp6tSSQu
Request Chain 100
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1573543716488;callback=window.headertag.AolHtb.adResponseCallbacks._am0f6cnE; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1573543715;cmd=bid;cors=yes;v=2;misc=1573543716488;callback=window.headertag.AolHtb.adResponseCallbacks._am0f6cnE HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1A0a3c8052-051e-11ea-bb25-12b295be6374;cfp=1;rndc=1573543716;cmd=bid;cors=yes;v=2;misc=1573543716488;callback=window.headertag.AolHtb.adResponseCallbacks._am0f6cnE
Request Chain 104
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1573543716491;callback=window.headertag.AolHtb.adResponseCallbacks._QHXy3ZQm; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1573543715;cmd=bid;cors=yes;v=2;misc=1573543716491;callback=window.headertag.AolHtb.adResponseCallbacks._QHXy3ZQm HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1A0a3c5532-051e-11ea-8205-1274c1fe5bf6;cfp=1;rndc=1573543715;cmd=bid;cors=yes;v=2;misc=1573543716491;callback=window.headertag.AolHtb.adResponseCallbacks._QHXy3ZQm
Request Chain 105
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1573543716491;callback=window.headertag.AolHtb.adResponseCallbacks._KL2wtFBU; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1573543715;cmd=bid;cors=yes;v=2;misc=1573543716491;callback=window.headertag.AolHtb.adResponseCallbacks._KL2wtFBU HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;apid=1A0a3c7756-051e-11ea-a177-121ea8d7377c;cfp=1;rndc=1573543715;cmd=bid;cors=yes;v=2;misc=1573543716491;callback=window.headertag.AolHtb.adResponseCallbacks._KL2wtFBU
Request Chain 108
  • https://cm.everesttech.net/cm/dd?d_uuid=21366057696966911062917538222859747648 HTTP 302
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=XcpfJAAAFatb5xKk
Request Chain 130
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j79&tid=UA-31997-1&cid=97489540.1573543716&jid=605022974&gjid=866419302&_gid=707091628.1573543717&_u=aChAgUAjAAQC~&z=300417292 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=97489540.1573543716&jid=605022974&_v=j79&z=300417292 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=97489540.1573543716&jid=605022974&_v=j79&z=300417292&slf_rd=1&random=3869058567
Request Chain 215
  • https://secure.adnxs.com/getuid?https://ids.ad.gt/api/v1/match?id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3&adnxs_id=$UID HTTP 302
  • https://secure.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fmatch%3Fid%3D72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3%26adnxs_id%3D%24UID HTTP 302
  • https://ids.ad.gt/api/v1/match?id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3&adnxs_id=3324277335898742735
Request Chain 216
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=8gkxb6n&ttd_tpi=1&gpdr=0&ttd_puid=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3 HTTP 302
  • https://ids.ad.gt/api/v1/t_match?tdid=9b012699-d85e-4715-92c3-9b5bef93f1de&id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3
Request Chain 217
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3D72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3 HTTP 302
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?ird=1&rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3D72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3 HTTP 302
  • https://ids.ad.gt/api/v1/pbm_match?pbm=8AAFAA19-4C1D-477B-8296-A063ACEDD4C8&id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3
Request Chain 218
  • https://cm.g.doubleclick.net/pixel?google_nid=audigent_w_appnexus_3985&google_cm&google_sc&google_ula=450542624&id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3 HTTP 302
  • https://ids.ad.gt/api/v1/g_match?id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3&google_gid=CAESEH7fYlrmz-ww6ddg09eEsZs&google_cver=1&google_ula=450542624,0
Request Chain 219
  • https://sync.go.sonobi.com/us?https://ids.ad.gt/api/v1/son_match?id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3&uid=[UID] HTTP 302
  • https://ids.ad.gt/api/v1/son_match?id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3&uid=b9379ee7-c2c5-452e-9333-8ea930efc68e
Request Chain 220
  • https://cs.emxdgt.com/um?redirect=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Femx_match%3Femxid%3D%24UID%26id%3D72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3 HTTP 302
  • https://ib.adnxs.com/getuid?https://cs.emxdgt.com/umcheck?apnxid=$UID&redirect=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Femx_match%3Femxid%3D%24EMXUID%26id%3D72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3 HTTP 302
  • https://ib.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Fcs.emxdgt.com%2Fumcheck%3Fapnxid%3D%24UID%26redirect%3Dhttps%253A%252F%252Fids.ad.gt%252Fapi%252Fv1%252Femx_match%253Femxid%253D%2524EMXUID%2526id%253D72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3 HTTP 302
  • https://cs.emxdgt.com/umcheck?apnxid=3324277335898742735&redirect=https://ids.ad.gt/api/v1/emx_match?emxid=$EMXUID&id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3 HTTP 302
  • https://ids.ad.gt/api/v1/emx_match?emxid=3324277335898742735brt43291573543717385790f1
Request Chain 239
  • https://syndication.twitter.com/i/jot HTTP 302
  • https://platform.twitter.com/jot.html
Request Chain 250
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&aip=1&a=719823506&t=pageview&_s=1&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&ul=en-us&de=UTF-8&dt=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea%20%7C%20Ars%20Technica&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=aCjAAUI7AAQC~&jid=1670697070&gjid=1384005428&cid=97489540.1573543716&tid=UA-87198801-1&_gid=707091628.1573543717&_r=1&cd1=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3&cd2=none&cd4=arstechnica.com&cd5=%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cd6=Passive%20Tagger&cd7=502550e3cf3e9249384c2980d94c55e8&cd3=57&z=1034609762 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-87198801-1&cid=97489540.1573543716&jid=1670697070&_gid=707091628.1573543717&gjid=1384005428&_v=j79&z=1034609762 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=97489540.1573543716&jid=1670697070&_v=j79&z=1034609762 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=97489540.1573543716&jid=1670697070&_v=j79&z=1034609762&slf_rd=1&random=1532502673
Request Chain 261
  • https://www.facebook.com/tr/?id=228464857488266&ev=Spire-Studio-Segment&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&rl=&if=false&ts=1573543718463&cd[code]=&sw=1600&sh=1200&v=2.9.11&r=stable&ec=2&o=30&fbp=fb.1.1573543716659.2145619428&it=1573543716457&coo=false&rqm=GET HTTP 302
  • https://cx.atdmt.com/?c=8694479607899798658&f=AYxE-zV8D35MUPL9xjeQyDV5E1IvgMTW0XzbzsAuITEHBQnMSHP6nuhRZWsHhTB6mvp3uCiU5yw4Y4YVMc3JM6ZT&id=228464857488266&l=3&v=0

267 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
43 KB
14 KB
Document
General
Full URL
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.31.169.131 Elk Grove Village, United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
ge-11-2-1.ar10.ord6.us.scnet.net
Software
nginx /
Resource Hash
38238012eab16d28ca1419e1ff3a0cd419d0aea32eda33277d7aa19326c656a2
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
arstechnica.com
:scheme
https
:path
/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
navigate
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1

Response headers

status
200
server
nginx
date
Tue, 12 Nov 2019 07:28:34 GMT
content-type
text/html; charset=UTF-8
link
<https://arstechnica.com/wp-json/>; rel="https://api.w.org/"
strict-transport-security
max-age=300
x-content-type-options
nosniff
x-xss-protection
1; mode=block
x-frame-options
SAMEORIGIN
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
x-ars-server
web204
content-encoding
gzip
main-af0123dfd5.css
cdn.arstechnica.net/wp-content/themes/ars/assets/css/
344 KB
72 KB
Stylesheet
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
3f5e07ec8bcc711b2a34aa1dfcc0d0637bf8050803243aa19d30fd43ad957c92

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:35 GMT
content-encoding
gzip
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
72883
x-cf-tsc
1572377068
x-cf2
H
last-modified
Tue, 29 Oct 2019 19:22:59 GMT
server
CFS 0215
x-cff
B
etag
W/"5db89193-5606b"
content-type
text/css
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
5
accept-ranges
bytes
expires
Tue, 07 Jan 2020 07:28:35 GMT
gpt.js
www.googletagservices.com/tag/js/
51 KB
15 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
aefaae1074e77d90b27fdd5344408637c0a563dd3fbeb03450db679073768bc6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"334 / 242 of 1000 / last-modified: 1573503262"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
15657
x-xss-protection
0
expires
Tue, 12 Nov 2019 07:28:35 GMT
apstag.js
c.amazon-adsystem.com/aax2/
86 KB
25 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.86.250 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-86-250.fra2.r.cloudfront.net
Software
Server /
Resource Hash
29d14c1ad2f8f1be84efd4d678ff3de9d6c3f94eb3b77894504c4824ff1a8ad4

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 11 Nov 2019 17:36:41 GMT
content-encoding
gzip
server
Server
age
49913
etag
183e04cde08f40d768be67590e69190d
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=86400
x-amz-cf-pop
FRA2-C2
accept-ranges
bytes
x-amz-cf-id
TPTQiz1rFSawqG8q2W94G8Z2KLDWPJ8_XxQJqNLMcWcTjtoezxtgXQ==
via
1.1 a10d58b5ce965502cc34c5b27682fe23.cloudfront.net (CloudFront)
183973-1558632223658.js
js-sec.indexww.com/ht/p/
127 KB
36 KB
Script
General
Full URL
https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
264846f36734223e476dea736d16dac6ee5c3ef8b783d593f401d836a5b510b7

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:36 GMT
Content-Encoding
gzip
Last-Modified
Tue, 12 Nov 2019 07:15:17 GMT
Server
Apache
ETag
"903aae-1fbb3-5972102a6d0a8"
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=3054
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
text/javascript
Content-Length
36642
Expires
Tue, 12 Nov 2019 08:19:30 GMT
moatheader.js
z.moatads.com/condenastprebidheader987326845656/
187 KB
66 KB
Script
General
Full URL
https://z.moatads.com/condenastprebidheader987326845656/moatheader.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
0eb438ad4233f9cdadd2cf6e5e3544a29b1e693a03f45b0b9fa25e70f2675917

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:36 GMT
Content-Encoding
gzip
Last-Modified
Tue, 29 Oct 2019 23:07:10 GMT
Server
AmazonS3
x-amz-request-id
EE440658F867C214
ETag
"36eff026ea983609efb74e7f83fac3f5"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=12055
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
67412
x-amz-id-2
YL9ogPz0mWBFOZthev9AeEKdbJpmm9pcgfLlY/H6675TxLi7xe45e7mSRBFYKnwFlZgbaSnvgx4=
ars-technica.min.js
cdn.arstechnica.net/cns/
132 KB
43 KB
Script
General
Full URL
https://cdn.arstechnica.net/cns/ars-technica.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
a641143af073af304c2a59416f269a90f6c8520b63e60757b173a263efcf561a

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:35 GMT
content-encoding
gzip
x-cf3
M
x-amz-request-id
52E497B7141D1FFA
x-cf1
14961:fD.fra2:co:1571783178:cacheN.fra2-01:H
status
200
x-cache-hits
1
content-length
43652
x-amz-id-2
KsCNbO7mVwM+VnDYL1d7+Hhdock1YnBWlWqouTXHOqJQPwVylrqRqTdl9HBjD4WLxQW7+iKCWqc=
x-cf-tsc
1571783180
cf4ttl
109.500
x-cf2
H
last-modified
Wed, 09 Oct 2019 18:53:23 GMT
server
CFS 0215
x-timer
S1571783180.479933,VS0,VE1
x-cff
B
etag
"fa8d177f3889042b037a66665872e42e"
x-served-by
cache-mdw17381-MDW
vary
Accept-Encoding
x-amz-version-id
usAI1.ut.QN1olpdoALg05UaQkX9_kaz
access-control-allow-origin
*
cache-control
max-age=86400
cf4age
12
accept-ranges
bytes
content-type
application/javascript
x-cf-rand
0.425
expires
Wed, 13 Nov 2019 07:28:35 GMT
ars-bcfee6c82a.ads.us.js
cdn.arstechnica.net/wp-content/themes/ars/assets/js/
4 KB
2 KB
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/ars-bcfee6c82a.ads.us.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
032027ea92b8b014594b64b514f922a12029c27c3dc27e5c11b09eabfaf810c3

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:35 GMT
content-encoding
gzip
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1565891941:cacheN.fra2-01:H
status
200
content-length
1415
x-cf-tsc
1572377912
x-cf2
H
last-modified
Tue, 29 Oct 2019 19:37:29 GMT
server
CFS 0215
x-cff
B
etag
W/"5db894f9-e66"
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
5
accept-ranges
bytes
expires
Tue, 07 Jan 2020 07:28:35 GMT
The_Kudankulam_Nuclear_Power_Plant_KKNPP-800x506.jpg
cdn.arstechnica.net/wp-content/uploads/2019/10/
57 KB
58 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2019/10/The_Kudankulam_Nuclear_Power_Plant_KKNPP-800x506.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
894b5c3c2e5388f69c30228b71374455dd12fa087c0c260b8d824e9e131633a9

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:M
status
200
content-length
58502
x-cf-tsc
1573512959
x-cf2
H
last-modified
Tue, 29 Oct 2019 15:20:57 GMT
server
CFS 0215
x-cff
B
etag
"5db858d9-e486"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
x-cf-rand
1.856
expires
Tue, 07 Jan 2020 07:28:36 GMT
main-227ecd1ec6.js
cdn.arstechnica.net/wp-content/themes/ars/assets/js/
662 KB
215 KB
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-227ecd1ec6.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
dbf54924de9788ccb933c9ddd017cb305fb45e2a27b037a55b923b138cc41fbd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:35 GMT
content-encoding
gzip
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
219228
x-cf-tsc
1572632966
x-cf2
H
last-modified
Fri, 01 Nov 2019 18:28:50 GMT
server
CFS 0215
x-cff
B
etag
W/"5dbc7962-a572d"
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Tue, 07 Jan 2020 07:28:35 GMT
widget.min.js
embed.actionbutton.co/widget/
53 KB
17 KB
Script
General
Full URL
https://embed.actionbutton.co/widget/widget.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.78.46 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-78-46.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
f9b84f2df9256c362df6f7eb8ca204830c81a25cec361bcff302e48e55fc15ce

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 11 Nov 2019 18:34:19 GMT
Content-Encoding
gzip
Connection
keep-alive
Last-Modified
Mon, 04 Nov 2019 18:33:48 GMT
Server
AmazonS3
Age
46458
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 83caebe1f817a31bd75ba17dff7ae1a6.cloudfront.net (CloudFront)
Cache-Control
no-cache
Transfer-Encoding
chunked
X-Amz-Cf-Pop
FRA2-C2
X-Amz-Cf-Id
DGdQnxOL7wuiqmZ_2H72oHA2pw05w6P2YnrHmjw8hLKkTl8xmJy1KQ==
arstechnica.js
player.cnevids.com/interlude/
109 KB
28 KB
Script
General
Full URL
https://player.cnevids.com/interlude/arstechnica.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.78.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-78-104.fra2.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
02a9db289d960e3196e2269632ee772bbcb51333e9ab3503105ae7f3b1665062
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:19 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Age
5
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Status
200 OK
Connection
keep-alive
X-XSS-Protection
1; mode=block
X-Request-Id
cbfc3754-7b5f-40cd-8c4d-5578cb384521
X-Runtime
0.010552
X-Backend-Node
10.110.45.152
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"7ebf5b58421baec7dd559bde023d9556"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 ec9e3bc729d9c6d55ed32446408ad62f.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Pop
FRA2-C2
X-Amz-Cf-Id
ZrThCjP0tmyqls88huzaA3QqtnO9HCfasqcRko5-W5QjHCrWqhZ7aQ==
conde-asa-polar-master.js
cdn.mediavoice.com/nativeads/script/condenastcorporate/
5 KB
2 KB
Script
General
Full URL
https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:d983 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
030e91b7512dbb40e9b9057f20bcf54c296a7f28c04bbcde0f2d2706dd2a3a06

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
cf-cache-status
HIT
age
9830
cf-ray
5346ca417e6d5940-VIE
status
200
cf-ipcountry
DE
x-country
DE
content-length
2018
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-varnish
1715147932 1714780840
via
1.1 varnish
cache-control
max-age=21600
accept-ranges
bytes
content-type
text/javascript
100098X1555750.skimlinks.js
s.skimresources.com/js/
39 KB
15 KB
Script
General
Full URL
https://s.skimresources.com/js/100098X1555750.skimlinks.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
e080feb622e8bf141f5c26261b3e81763a74179649ef18f412a18b16dec2b992

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
last-modified
Wed, 06 Nov 2019 13:36:17 GMT
server
AmazonS3
x-amz-request-id
F6344F83C215A218
etag
"81b2fb8cfd03680ab4f7d51d3db41ef7"
x-hw
1573543716.cds012.fr8.hn,1573543716.cds127.fr8.c
content-type
application/octet-stream
status
200
cache-control
max-age=3600
accept-ranges
bytes
content-length
15193
x-amz-id-2
qx99FIIqRqOfpBrJU240JamQsBlBLGJ4TuwqGg14EgX7QfRX0y1u59xdGqnDfnZExApVv+VBUj4=
gtm.js
www.googletagmanager.com/
273 KB
66 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
b4be098fffa4dc05a9f1418bb769a2865d5565ba46472ee28a862a624561024a
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
br
last-modified
Tue, 12 Nov 2019 06:00:00 GMT
server
Google Tag Manager
access-control-allow-headers
Cache-Control
status
200
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
67293
x-xss-protection
0
expires
Tue, 12 Nov 2019 07:28:36 GMT
aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.86.250 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-86-250.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
06b99248a163333e36980a6cfb756f1a7de60fa49517162b87b1a44d5d48f844

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 11 Nov 2019 13:52:57 GMT
content-encoding
gzip
vary
Origin
age
63340
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Fri, 01 Nov 2019 13:46:13 GMT
server
AmazonS3
access-control-max-age
3000
access-control-allow-methods
GET
content-type
application/javascript
via
1.1 1e498d046330e15095a1a2a958463bf5.cloudfront.net (CloudFront)
cache-control
public, max-age=86400
x-amz-cf-pop
FRA2-C2
x-amz-cf-id
bsKtQemP2Hn425A_vU7FRHFCJyV9iseVpjjeE_n5E_waOK4P5pTCXg==
ads.js
arstechnica.com/hotzones/src/
0
517 B
XHR
General
Full URL
https://arstechnica.com/hotzones/src/ads.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.31.169.131 Elk Grove Village, United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
ge-11-2-1.ar10.ord6.us.scnet.net
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
x-content-type-options
nosniff
last-modified
Fri, 01 Nov 2019 18:28:16 GMT
server
nginx
etag
"5dbc7940-0"
x-frame-options
SAMEORIGIN
content-type
application/javascript
status
200
content-length
0
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
strict-transport-security
max-age=300
accept-ranges
bytes
x-ars-server
web204
x-xss-protection
1; mode=block
integrator.js
adservice.google.de/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_2019110401.js
securepubads.g.doubleclick.net/gpt/
159 KB
58 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019110401.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
sffe /
Resource Hash
89db741bbe693e04001902f6651d3f47bcfd0b216bc35cd1896e33086f7c4ad7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 04 Nov 2019 14:08:43 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
59437
x-xss-protection
0
expires
Tue, 12 Nov 2019 07:28:36 GMT
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
78c8c364b438f0be81f1c51627902fda95b7aebdd2c04aee28c2f72cd4390207

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
357 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f95836cdd8c1af1d8261e8e198a4c1dd306e2b50ddc389fe820b56212a9cb17d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
economica-bold-otf-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
25 KB
25 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/economica-bold-otf-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
5315cf641e62ac7de4a82e6003cc1bd1ff09218400d8ff5286c951e25aee966b

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
25592
x-cf-tsc
1561863055
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-63f8"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Tue, 07 Jan 2020 07:28:36 GMT
economica-regular-otf-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
24 KB
24 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/economica-regular-otf-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
c14a030b0b5ef06f710d9bbff164662d4b43c037e62f254aa6280504013caa34

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
24264
x-cf-tsc
1561863055
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-5ec8"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Tue, 07 Jan 2020 07:28:36 GMT
truncated
/
279 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5ecbfb541946a9a9437190a21d98e1c7ab7d863837d7d038a9a1e053c649c8ba

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
400 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6f261533d4b74ae931965cf3609bf47bb55001e39eb7029502d96cec73c4749a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
700 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5ab499494548829e507e9b6cd57247a6cd565e7f1bc6eb55e3da445af76f1f0c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
49282a74c6ced31e99f808232188ade8d82652004df4d664dcdb98c32563dd39

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
841 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
039f13cdf684666dd973e2385f773385adb074039e8a832ec48e1ae35fb20c15

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
blockquote-afedeab761.svg
cdn.arstechnica.net/wp-content/themes/ars/assets/img/
419 B
756 B
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/img/blockquote-afedeab761.svg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
8edcf5bd609aef18638950de010699cd2765ef88aba3d019feb51a4271807662

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
419
x-cf-tsc
1565079013
x-cf2
H
last-modified
Fri, 26 Jul 2019 16:19:52 GMT
server
CFS 0215
x-cff
B
etag
"5d3b2828-1a3"
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
16211
accept-ranges
bytes
x-cf-rand
0.064
expires
Tue, 07 Jan 2020 07:28:36 GMT
s.gallagher-9.jpg
cdn.arstechnica.net/wp-content/uploads/2016/05/
51 KB
51 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2016/05/s.gallagher-9.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
703c68bc0eb86c90d0c6670ec0547e19a230db953c002879f2a204dd85dd8571

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
51988
x-cf-tsc
1573363662
x-cf2
H
last-modified
Tue, 10 May 2016 18:23:41 GMT
server
CFS 0215
x-cff
B
etag
"5732272d-cb14"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
x-cf-rand
0.381
expires
Tue, 07 Jan 2020 07:28:36 GMT
channel-ars-be7bb52ba9.png
cdn.arstechnica.net/wp-content/themes/ars/assets/img/
5 KB
5 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/img/channel-ars-be7bb52ba9.png
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
08ed3bf6e73a999bafb422b878fb05b87269b00a65230c9457ce75aee10b873e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
4809
x-cf-tsc
1562286891
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-12c9"
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Tue, 07 Jan 2020 07:28:36 GMT
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c7f2558d7005dc61e343b6abb61a63da8ace760a0fdd45cb0cc124b0de5b4c2f

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
18 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
62c7d2da9a5942053f17c9756e53b7cda414541619bd35c2b1441cd88c77f235

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4ec4b6769730ca98db1f40b152c52bd5bec01f61f559fb92709c307750388ac8

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
opensans-regular-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
18 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-regular-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
caa3854f28740fa98125ded826446ee4456379e8ad7c4ff46643347d1901506a

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
18824
x-cf-tsc
1561863055
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-4988"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Tue, 07 Jan 2020 07:28:36 GMT
bitter-italic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
24 KB
24 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-italic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1193e934b76ed372f47e23f78f8a13e99d9588e564aff866e8f700e7a0650a83

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
24212
x-cf-tsc
1561917085
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-5e94"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Tue, 07 Jan 2020 07:28:36 GMT
bitter-regular-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
22 KB
23 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-regular-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
0186840386391fa2c0750ff7450a78e066498ba3274546a6fcf0fa9c55cd457c

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
22872
x-cf-tsc
1561863055
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-5958"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Tue, 07 Jan 2020 07:28:36 GMT
opensans-semibold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
19 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-semibold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1f9cd4a445ba85172da6090dd7b95edf55fd9e81ddb193e0b78093c1afa84378

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
18972
x-cf-tsc
1562205866
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-4a1c"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Tue, 07 Jan 2020 07:28:36 GMT
opensans-semibolditalic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-semibolditalic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
59201950b83489808587827b4050ffe0597992825daa88c227476cdbbf8ca282

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
20872
x-cf-tsc
1562205866
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-5188"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Tue, 07 Jan 2020 07:28:36 GMT
opensans-bold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
19 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-bold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
86096831a70c72ac0c08f5e65ae92d98330d9fd2b7511dde65ff50b8a16bfd9a

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
19516
x-cf-tsc
1562369864
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-4c3c"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Tue, 07 Jan 2020 07:28:36 GMT
bitter-bold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
22 KB
22 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-bold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
807271433f80bb33654a84ec904035be3d2b34e505a051e3469a47fe39ccb752

Request headers

Sec-Fetch-Mode
cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
22104
x-cf-tsc
1562368897
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-5658"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Tue, 07 Jan 2020 07:28:36 GMT
outbrain.js
widgets.outbrain.com/
108 KB
37 KB
Script
General
Full URL
https://widgets.outbrain.com/outbrain.js?_=1573543716164
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-227ecd1ec6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.190 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-190.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
f39b86265cb926b44cddd0fd833eec36630f60f0c12e5c1e6a9f1274669a54a0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:36 GMT
Content-Encoding
gzip
Last-Modified
Mon, 11 Nov 2019 11:22:59 GMT
Server
Apache
ETag
"e7a32b8569d88cd2b0cbc50107b18516:1573475124"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=14400
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
37365
video_groups
api.cnevids.com/v1/
4 KB
1 KB
XHR
General
Full URL
https://api.cnevids.com/v1/video_groups?filters={%22channel_key%22:%22arstechnica%22}&pagesize=20&endpoint=oo.arstechnica
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-227ecd1ec6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.193.78.244 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-193-78-244.compute-1.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
8f2d86f0959030b3fc464411d691941481d9cd7e1955f774291c2528fb55706e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/*
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

Date
Tue, 12 Nov 2019 07:28:36 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
663
X-XSS-Protection
1; mode=block
X-Request-Id
85c7122b-0783-41cc-bfa2-6299534e04fe
X-Runtime
0.001980
X-Backend-Node
10.110.77.166
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
X-Frame-Options
SAMEORIGIN
ETag
W/"53cbdd2a5f2e1d509224e38053f1a614"
X-Download-Options
noopen
Vary
Accept-Encoding, Origin
Access-Control-Allow-Methods
GET, PUT, POST, DELETE, OPTIONS
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
p.js
d1z2jf7jlzjs58.cloudfront.net/
6 KB
3 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/p.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.85 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-85.fra50.r.cloudfront.net
Software
nginx /
Resource Hash
725913eab3460e2955a8ac4ec176f902c7d8d2db60757248b735cbf8698b0749

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 01:42:33 GMT
Content-Encoding
gzip
Age
20763
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Pragma
public
Last-Modified
Fri, 07 Mar 2014 00:45:07 GMT
Server
nginx
ETag
W/"53191693-19c1"
Content-Type
application/x-javascript
Via
1.1 5317564e96c9dceb46123f6c5f149a03.cloudfront.net (CloudFront)
Cache-Control
max-age=86400, public
X-Amz-Cf-Pop
FRA50-C1
X-Amz-Cf-Id
7WRLBNiJywk2DTHfY9VZacx6EWAPd-cMyjS5NZOWo5WB4Pq3-Y9fHg==
Expires
Wed, 13 Nov 2019 01:42:31 GMT
conde-nast
segment-data.zqtk.net/
757 B
1 KB
Script
General
Full URL
https://segment-data.zqtk.net/conde-nast?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.76.0.5 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-76-0-5.eu-west-1.compute.amazonaws.com
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
be084fee541080da11135a396e0457d6592a0bb74656ba03c0e1329c9e849e96

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:36 GMT
Expires
Tue, 12 Nov 2019 13:59:05 GMT
Last-Modified
Sun, 10 Nov 2019 13:59:05 GMT
Server
nginx/1.10.3 (Ubuntu)
Connection
keep-alive
Content-Length
757
Content-Type
application/javascript; charset=UTF-8
ixmatch.html
js-sec.indexww.com/um/ Frame A304
0
0
Document
General
Full URL
https://js-sec.indexww.com/um/ixmatch.html
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Host
js-sec.indexww.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/

Response headers

Server
Apache
Last-Modified
Mon, 19 Jun 2017 19:18:19 GMT
ETag
"e20015-112-55254ff6a1972"
Accept-Ranges
bytes
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Content-Type
text/html; charset=UTF-8
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
211
Date
Tue, 12 Nov 2019 07:28:36 GMT
Connection
keep-alive
ars-technica.config.js
pixel.condenastdigital.com/config/v2/production/
6 KB
2 KB
Script
General
Full URL
https://pixel.condenastdigital.com/config/v2/production/ars-technica.config.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.239 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
b8c4372ca59117502caeba7bb1417972a288bd5abc34ea866c5c04f02871dcb0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:36 GMT
Content-Encoding
gzip
Age
404080
X-Cache
HIT, HIT
Connection
keep-alive
Content-Length
1029
x-amz-id-2
BOL4iUPEB4E6WMoO7mABfQDHmczxXQnQPWQnIAlxCng2CpKkLlie//r/+6Yl4DLA0AolJvUab0M=
X-Served-By
cache-iad2130-IAD, cache-hhn4032-HHN
Access-Control-Allow-Origin
*
Last-Modified
Thu, 07 Nov 2019 15:13:43 GMT
Server
AmazonS3
X-Timer
S1573543716.219378,VS0,VE0
ETag
"ba03055adc90148c3e758315cc05b140"
Vary
Accept-Encoding
x-amz-request-id
F35B854E20AAFB40
Via
1.1 varnish, 1.1 varnish
Expires
Thu, 07 Nov 2019 21:13:55 GMT
Cache-Control
no-cache, public, max-age=604800
Accept-Ranges
bytes
Content-Type
application/javascript
X-Cache-Hits
3, 1266
publishertag.js
static.criteo.net/js/ld/
87 KB
27 KB
Script
General
Full URL
https://static.criteo.net/js/ld/publishertag.js
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
178.250.2.130 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
nginx /
Resource Hash
40483fac4e86b90f4d46c4b9ab5b5a25662849de0c9789e571abc23ef1217a6e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
last-modified
Fri, 25 Oct 2019 13:44:17 GMT
server
nginx
etag
W/"5db2fc31-15cda"
status
200
content-type
text/javascript
access-control-allow-origin
*
cache-control
max-age=86400, public
timing-allow-origin
*
expires
Wed, 13 Nov 2019 07:28:36 GMT
identity
api.rlcdn.com/api/
0
0

rid
match.adsrvr.org/track/
109 B
536 B
XHR
General
Full URL
https://match.adsrvr.org/track/rid?ttd_pid=casale&fmt=json&p=183973
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
63.32.23.112 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-63-32-23-112.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
663142ee13def5efdf110fddb65ad09a497c256d7986a252743998c8690e90fb

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
x-aspnet-version
4.0.30319
status
200
vary
Origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
cache-control
private
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Content-Length, Content-Encoding, Vary, Cache-Control, Accept
content-length
109
expires
Thu, 12 Dec 2019 07:28:36 GMT
idsv2
mid.rkdms.com/
0
0

yi.js
mb.moatads.com/
1 KB
2 KB
Script
General
Full URL
https://mb.moatads.com/yi.js?ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&confidence=2&pcode=condenastprebidheader987326845656&callback=MoatNadoAllJsonpRequest_36017700
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/condenastprebidheader987326845656/moatheader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.10.64.227 London, United Kingdom, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-3-10-64-227.eu-west-2.compute.amazonaws.com
Software
TornadoServer/4.5.3 /
Resource Hash
5cac2546564c0c2f863a7b8f870e37fd82d9d1372d321e185cd0222a6797773f

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
server
TornadoServer/4.5.3
etag
"504741e902d65ca9b4b30e18e5cd5359899b24a0"
content-type
text/html; charset=UTF-8
status
200
cache-control
max-age=900
timing-allow-origin
*
content-length
1525
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&t=1573543716221&de=629900827160&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatRendered=0&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=0&zMoatSafetyTargetingSet=0&zMoatEmptySlot=0&zMoatNadoDataLoadTime=Not%20Loaded&zMoatAllDataLoadTime=Not%20Loaded&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&ac=1&bq=11&f=0&na=1695309607&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:36 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 12 Nov 2019 07:28:36 GMT
/
prod-native.actionbutton.co/ Frame 3DA2
0
0
Document
General
Full URL
https://prod-native.actionbutton.co/?isNativeEmbed=true&722154a6-97e8-4a81-8686-390658194ec0
Requested by
Host: embed.actionbutton.co
URL: https://embed.actionbutton.co/widget/widget.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2043:2800:11:8cf6:b500:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash

Request headers

:method
GET
:authority
prod-native.actionbutton.co
:scheme
https
:path
/?isNativeEmbed=true&722154a6-97e8-4a81-8686-390658194ec0
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/

Response headers

status
200
content-type
text/html
date
Mon, 11 Nov 2019 21:52:01 GMT
last-modified
Mon, 11 Nov 2019 21:51:53 GMT
cache-control
max-age=31536000,public
server
AmazonS3
content-encoding
gzip
vary
Accept-Encoding
x-cache
Hit from cloudfront
via
1.1 616f617776e843142ab5d87231cb3526.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA54
x-amz-cf-id
8kSOdPlIch5P89NWq8IkeSkFN9s7acmUnGTdFTR_sih_nGacuKF-kQ==
age
34552
/
r.skimresources.com/api/
Redirect Chain
  • https://r.skimresources.com/api/
  • https://r.skimresources.com/api/?xguid=01DSF879E9Y6D07VTNT2WWFJ06&persistence=1&checksum=0ef03bc71c97c66a9e217b08e77237eb04ec54a7739d9a14e4941362eae739af
152 B
459 B
XHR
General
Full URL
https://r.skimresources.com/api/?xguid=01DSF879E9Y6D07VTNT2WWFJ06&persistence=1&checksum=0ef03bc71c97c66a9e217b08e77237eb04ec54a7739d9a14e4941362eae739af
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
0448d69bb20693f8bb4a6a8add68173303e68ff45778f616cde0683b7f97e698
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
openresty/1.11.2.5
status
200
vary
Accept-Encoding
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google

Redirect headers

date
Tue, 12 Nov 2019 07:28:36 GMT
via
1.1 google
server
openresty/1.11.2.5
status
307
location
//r.skimresources.com/api/?xguid=01DSF879E9Y6D07VTNT2WWFJ06&persistence=1&checksum=0ef03bc71c97c66a9e217b08e77237eb04ec54a7739d9a14e4941362eae739af
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
text/html
alt-svc
clear
content-length
193
robots.txt
t.skimresources.com/api/v2/ Frame 7A83
0
105 B
Image
General
Full URL
https://t.skimresources.com/api/v2/robots.txt?__skimjs_preflight__please_ignore__=true&rnd=0.006724040073962323
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
206
date
Tue, 12 Nov 2019 07:28:36 GMT
via
1.1 google
server
Python/3.7 aiohttp/3.5.4
alt-svc
clear
content-length
0
content-type
text/plain charset=UTF-8
px.gif
p.skimresources.com/
43 B
473 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=1&rn=10.926531593137824
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
date
Tue, 12 Nov 2019 07:28:36 GMT
x-guploader-uploadid
AEnB2UqDPmZP0fPxBoBgKlwry-1m4v3IFrQRVYCU9O5qnzy2ZK2qg9HQKpi9EH1tP5__PmcwCPIzt_i5RCJHLp56XMxIkfB67A
x-goog-storage-class
MULTI_REGIONAL
status
200
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-hw
1573543716.cds012.fr8.hn,1573543716.cds054.fr8.c
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
px.gif
p.skimresources.com/
43 B
107 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=2&rn=10.926531593137824
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
date
Tue, 12 Nov 2019 07:28:36 GMT
x-guploader-uploadid
AEnB2UqDPmZP0fPxBoBgKlwry-1m4v3IFrQRVYCU9O5qnzy2ZK2qg9HQKpi9EH1tP5__PmcwCPIzt_i5RCJHLp56XMxIkfB67A
x-goog-storage-class
MULTI_REGIONAL
status
200
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-hw
1573543716.cds012.fr8.hn,1573543716.cds054.fr8.c
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
widgets.js
platform.twitter.com/
95 KB
29 KB
Script
General
Full URL
https://platform.twitter.com/widgets.js?_=1573543716165
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-227ecd1ec6.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/4195) /
Resource Hash
f5b5ac5fdb8870504505be0a9522061f905e5c1b25a927f877303785129cb3f9

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:36 GMT
Content-Encoding
gzip
Last-Modified
Tue, 22 Oct 2019 23:03:20 GMT
Server
ECS (fcn/4195)
Etag
"dbb5834a50c19a7a8e3ad3ae8f1c1329+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-control-allow-origin
*
Cache-Control
public, max-age=1800
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
28705
yubikey-promo-2x-f8e0c5b722.png
cdn.arstechnica.net/wp-content/themes/ars/assets/img/
50 KB
50 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/img/yubikey-promo-2x-f8e0c5b722.png
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-227ecd1ec6.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
9142187aab08da4e5de78a21486593c9c167cf2d221878714c852b490bc31d25

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-af0123dfd5.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
50883
x-cf-tsc
1565730172
x-cf2
H
last-modified
Tue, 13 Aug 2019 20:51:03 GMT
server
CFS 0215
x-cff
B
etag
"5d5322b7-c6c3"
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
3
accept-ranges
bytes
x-cf-rand
7.170
expires
Tue, 07 Jan 2020 07:28:36 GMT
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ded8aafe08adcc23835de89f62fbee0b98184f32296c7679ab5b5a358f044f63

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&app=playerservice&cCh=videos%2Fshow&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pID=&sID=&uId=&xid=&_ts=2019-11-12T07%3A28%3A36.289Z&_c=error&_t=Interlude%20Insertion%20Error&dim1=%7B%22interludeFailure%22%3A%22unsupported%20template%22%2C%22pageTemplate%22%3A%22article%7Creport%22%2C%22url%22%3A%22information-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%7D&dim3=Availability%3A%20unsupported%20template
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 12 Nov 2019 07:28:36 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
id
dpm.demdex.net/
6 KB
2 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=3.3.0&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_orgid=F7093025512D2B690A490D44%40AdobeOrg&d_nsid=0&ts=1573543716315
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.16.200.95 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-16-200-95.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
204f1e10fac741894112214a038c9213f7b0bb6e6bf3bee516c95798500da9ec
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v052-075d0dea0.edge-irl1.demdex.com 5.62.4.20191107154045 5ms (+0ms)
Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
Content-Encoding
gzip
X-TID
X3QrLFBPTJs=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
1600
Expires
Thu, 01 Jan 1970 00:00:00 GMT
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
dbb67c620eaabf6679a314db18d3ae43037aef71ab27422e6feec08ee987cc0a
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 19 Aug 2019 17:22:41 GMT
server
Golfe2
age
3299
date
Tue, 12 Nov 2019 06:33:37 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
17803
expires
Tue, 12 Nov 2019 08:33:37 GMT
quant.js
secure.quantserve.com/
12 KB
6 KB
Script
General
Full URL
https://secure.quantserve.com/quant.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.248 , United Kingdom, ASN27281 (QUANTCAST - Quantcast Corporation, US),
Reverse DNS
Software
QS /
Resource Hash
404a9b0ffbcc813e8ddbb8d8510a24a69c09079282f8083ee94f4adc5d627176

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:36 GMT
Content-Encoding
gzip
Last-Modified
Tue, 12-Nov-2019 07:28:36 GMT
Server
QS
ETag
M0-e2b9884a
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=604800
Connection
keep-alive
Content-Length
5456
Expires
Tue, 19 Nov 2019 07:28:36 GMT
PageName=information%20technology,SiteID=Ars%20Technica,CampaignID=1802C,Channel=website,CreativeID=undefined
d.turn.com/r/dd/id/L21rdC84MTYvY2lkLzI4NTk1MjExL3QvMA/kv/
253 B
721 B
Script
General
Full URL
https://d.turn.com/r/dd/id/L21rdC84MTYvY2lkLzI4NTk1MjExL3QvMA/kv/PageName=information%20technology,SiteID=Ars%20Technica,CampaignID=1802C,Channel=website,CreativeID=undefined
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_CBC
Server
46.228.164.13 , United Kingdom, ASN56396 (TURN, GB),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
20465edf295d890db80e550613f7eb6052b96f1ffd6168e1f2b34c07d9c174b5

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:36 GMT
Cache-Control
max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0
Server
Apache-Coyote/1.1
P3P
policyref="/w3c/p3p.xml", CP="NOI CURa DEVa TAIa PSAa PSDa IVAa IVDa OUR IND UNI NAV"
Content-Length
253
Content-Type
text/javascript;charset=UTF-8
fbevents.js
connect.facebook.net/en_US/
122 KB
27 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
981be39924f4c8320f4daa8b8cdd7468455e46a30bd0cfef24ba5c74c2a6b12d
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-23=":443"; ma=3600
content-length
27377
x-xss-protection
0
pragma
public
x-fb-debug
H2hHDBq9D1G+z5ImZdQkERsUJN/g0hVfUIEXCPoCPM30xYQ/aw8aY4wIfil9vgH9c+2QKiF9cH7M26CMAlfYCw==
x-fb-trip-id
420120009
x-frame-options
DENY
date
Tue, 12 Nov 2019 07:28:36 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
expires
Sat, 01 Jan 2000 00:00:00 GMT
uwt.js
static.ads-twitter.com/
5 KB
2 KB
Script
General
Full URL
https://static.ads-twitter.com/uwt.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.12.157 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
319949c8c08b86e9c35ea542c0dc0c30cedaa9b8d3d3c3327a36c91aefbd8af5

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
age
83701
x-cache
HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
1954
x-served-by
cache-fra19183-FRA
last-modified
Tue, 23 Jan 2018 20:09:00 GMT
x-timer
S1573543716.349392,VS0,VE0
etag
"b7b33882a4f3ffd5cbf07434f3137166+gzip"
vary
Accept-Encoding,Host
content-type
application/javascript; charset=utf-8
via
1.1 varnish
cache-control
no-cache
accept-ranges
bytes
spm.v1.min.js
ak.sail-horizon.com/spm/
118 KB
43 KB
Script
General
Full URL
https://ak.sail-horizon.com/spm/spm.v1.min.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.44 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-44.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
db84a28d93c321517263ee05f6f64fbf89569e423d2b5bec5f24e4c2d7f54663

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:21:28 GMT
content-encoding
gzip
last-modified
Thu, 24 Oct 2019 20:42:52 GMT
server
Apache
age
444
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/javascript
status
200
cache-control
max-age=600; must-revalidate
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-length
43149
via
1.1 9c7c26f5beeb09381cea450ea3581b37.cloudfront.net (CloudFront)
x-amz-cf-id
lagwT02J2qWnj07XA_OmuNlYGAcX0tebfkZhJTt7rfLC1z7AUNCUBg==
i.js
tag.bounceexchange.com/2806/
9 KB
3 KB
Script
General
Full URL
https://tag.bounceexchange.com/2806/i.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.92.63 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
63.92.190.35.bc.googleusercontent.com
Software
fasthttp /
Resource Hash
bbc9cbc24ff0e2e16d6115d249004384c43beda24ac77125f750c5460985b287

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:35 GMT
content-encoding
gzip
server
fasthttp
etag
fe9cd1e0bdf20f
content-type
text/plain; charset=utf-8
status
200
cache-control
no-cache, must-revalidate
x-region
europe-west3
alt-svc
clear
content-length
3171
via
1.1 google
57
a.ad.gt/api/v1/u/matches/
3 KB
2 KB
Script
General
Full URL
https://a.ad.gt/api/v1/u/matches/57
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.24.200.26 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-24-200-26.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
393c7d4621fafa542942b1aaefe2b42fd95f2a50614f5508f62fbee425842707

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:37 GMT
Content-Encoding
gzip
Server
nginx/1.8.1
Connection
keep-alive
Content-Length
1195
Content-Type
text/html; charset=utf-8
insight.min.js
snap.licdn.com/li.lms-analytics/
3 KB
2 KB
Script
General
Full URL
https://snap.licdn.com/li.lms-analytics/insight.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:296::25ea , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
41dd5e421fe221a7d2921d6fa2b36e8b01a9f2c054aaef5fad866fe896c1d1e0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:36 GMT
Content-Encoding
gzip
Last-Modified
Mon, 07 Oct 2019 16:41:31 GMT
X-CDN
AKAM
Vary
Accept-Encoding
Content-Type
application/x-javascript;charset=utf-8
Cache-Control
max-age=63338
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1576
beacon.js
www.medtargetsystem.com/javascript/
135 KB
39 KB
Script
General
Full URL
https://www.medtargetsystem.com/javascript/beacon.js?v2.5.12
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.3.171.116 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-3-171-116.compute-1.amazonaws.com
Software
Apache/2.4.7 (Ubuntu) /
Resource Hash
f9fa577e5bfe36337ea34f847f3f6e1ce3164e7a83dbd97e47beb36079ec390a

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:36 GMT
Content-Encoding
gzip
Last-Modified
Mon, 28 Oct 2019 18:01:37 GMT
Server
Apache/2.4.7 (Ubuntu)
ETag
"21c0d-595fc4a748240-gzip"
Vary
X-Forwarded-Proto,Accept-Encoding
Content-Type
application/javascript
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
39401
scevent.min.js
sc-static.net/
13 KB
5 KB
Script
General
Full URL
https://sc-static.net/scevent.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.78.33 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-78-33.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
ce955c2abb1b3639be7d38357b192b262f73576e7c2408c75200f3d8cda33913

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 11 Nov 2019 23:04:16 GMT
content-encoding
gzip
last-modified
Mon, 11 Nov 2019 23:04:13 GMT
server
AmazonS3
age
30261
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, s-maxage=86400, max-age=600
x-amz-cf-pop
FRA2-C2
x-amz-cf-id
RFJoXr04q-1BkzNmIQ17AyjV2n1jPhcAGjAOPo0hfUUqhelH6XYaHw==
via
1.1 83caebe1f817a31bd75ba17dff7ae1a6.cloudfront.net (CloudFront)
b10882a1-8446-4e7d-bfb2-ce2c770ad910.js
cdn.cookielaw.org/consent/
381 KB
87 KB
Script
General
Full URL
https://cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8F9F) /
Resource Hash
647793095a954446665b7082f638fd2707a0af4e47e3c8f60f3ea0c6b4f44a5f

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
content-md5
xZZ0nI3K1jsMHIrMrqCPLA==
x-cache
HIT
status
200
content-length
89102
x-ms-lease-status
unlocked
last-modified
Mon, 11 Nov 2019 17:54:20 GMT
server
ECAcc (frc/8F9F)
etag
0x8D766D02E075710
vary
Accept-Encoding
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
1385215a-401e-0051-1a27-99c613000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Tue, 12 Nov 2019 11:28:36 GMT
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035094&ns__t=1573543716329&ns_c=UTF-8&c8=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea%20%7C%20Ars...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1573543716329&ns_c=UTF-8&c8=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea%20%7C%20Ar...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1573543716329&ns_c=UTF-8&c8=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&c9=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.19.43.224 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-43-224.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:36 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1573543716329&ns_c=UTF-8&c8=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&c9=
Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:36 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
check
pixel.tapad.com/idsync/ex/receive/
Redirect Chain
  • https://pixel.tapad.com/idsync/ex/receive?partner_id=ADB&partner_device_id=undefined
  • https://pixel.tapad.com/idsync/ex/receive/check?partner_id=ADB&partner_device_id=undefined
95 B
352 B
Image
General
Full URL
https://pixel.tapad.com/idsync/ex/receive/check?partner_id=ADB&partner_device_id=undefined
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.227.248.159 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
159.248.227.35.bc.googleusercontent.com
Software
Jetty(8.1.13.v20130916) /
Resource Hash
3eb10792d1f0c7e07e7248273540f1952d9a5a2996f4b5df70ab026cd9f05517

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
via
1.1 google
server
Jetty(8.1.13.v20130916)
p3p
policyref="http://tapad-taptags.s3.amazonaws.com/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
status
200
content-type
image/png
alt-svc
clear
content-length
95

Redirect headers

date
Tue, 12 Nov 2019 07:28:36 GMT
via
1.1 google
server
Jetty(8.1.13.v20130916)
status
302
p3p
policyref="http://tapad-taptags.s3.amazonaws.com/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
location
https://pixel.tapad.com/idsync/ex/receive/check?partner_id=ADB&partner_device_id=undefined
alt-svc
clear
content-length
0
check
pixel.tapad.com/idsync/ex/receive/
Redirect Chain
  • https://pixel.tapad.com/idsync/ex/receive?partner_id=648&partner_device_id=undefined
  • https://pixel.tapad.com/idsync/ex/receive/check?partner_id=648&partner_device_id=undefined
95 B
341 B
Image
General
Full URL
https://pixel.tapad.com/idsync/ex/receive/check?partner_id=648&partner_device_id=undefined
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.227.248.159 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
159.248.227.35.bc.googleusercontent.com
Software
Jetty(8.1.13.v20130916) /
Resource Hash
3eb10792d1f0c7e07e7248273540f1952d9a5a2996f4b5df70ab026cd9f05517

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
via
1.1 google
server
Jetty(8.1.13.v20130916)
p3p
policyref="http://tapad-taptags.s3.amazonaws.com/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
status
200
content-type
image/png
alt-svc
clear
content-length
95

Redirect headers

date
Tue, 12 Nov 2019 07:28:36 GMT
via
1.1 google
server
Jetty(8.1.13.v20130916)
status
302
p3p
policyref="http://tapad-taptags.s3.amazonaws.com/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
location
https://pixel.tapad.com/idsync/ex/receive/check?partner_id=648&partner_device_id=undefined
alt-svc
clear
content-length
0
plugin.js
plugin.mediavoice.com/
334 KB
124 KB
Script
General
Full URL
https://plugin.mediavoice.com/plugin.js
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:d983 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
7caf10f48745e4155020e00e893a89bfce7f5110ca26c92df38594e8e428cf9a

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
cf-cache-status
HIT
age
41473
status
200
content-type
application/javascript
content-length
126367
timing-allow-origin
*
access-control-allow-origin
*
last-modified
Fri, 08 Nov 2019 19:57:12 GMT
server
cloudflare
etag
W/"5dc5c898-5365d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, OPTIONS
x-varnish
2111327538 2111327515
via
1.1 varnish
cache-control
max-age=43200
access-control-allow-credentials
true
accept-ranges
bytes
cf-ray
5346ca435fbf5940-VIE
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
expires
Tue, 12 Nov 2019 07:57:20 GMT
condenastcorporate
polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/organization/
181 B
595 B
XHR
General
Full URL
https://polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/organization/condenastcorporate
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
6bd131d59efb6aa6a2d98ce4af498a811c84f74148129e140ff5a76904ca9f74

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
server
cloudflare
status
200
etag
W/"4ed41fc03a3c3b67ac78af86ee19d7f1"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-Country, CF-Ray
cache-control
max-age=86400
x-country
DE
cf-ray
5346ca436fd759f4-VIE
ads
securepubads.g.doubleclick.net/gampad/
424 B
707 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=1024221985645597&correlator=1659050529412960&output=ldjh&impl=fifs&adsid=NT&eid=21063145&vrg=2019110401&guci=1.2.0.0.2.2.0.0&plat=1%3A536903688%2C2%3A536903688%2C8%3A134250504&sc=1&sfv=1-0-36&ecs=20191112&iu_parts=3379%2Cconde.ars%2Cinterstitial%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=1x1&ists=1&prev_scp=pos%3Dinterstitial%26ctx_slot_type%3Dout_of_page%26ctx_slot_rn%3D0%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dout_of_page_0&eri=1&cust_params=amznbid%3D0%26amznp%3D0%26m_data%3Dwaiting%26m_safety%3Dwaiting%26m_categories%3Dwaiting%26m_mv%3Dwaiting%26m_gv%3Dwaiting%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.30.9%26ctx_page_slug%3Dindian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%26cnt_tags%3Ddtrack%252Cindia%252Cnorth-korea%252Cnuclear-energy%252Cnuclear-reactor-control-systems%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D&cookie_enabled=1&bc=31&abxe=1&lmt=1573543716&dt=1573543716352&dlt=1573543715931&idt=362&frm=20&biw=1585&bih=1200&oid=3&adxs=0&adys=0&adks=2746652139&ucis=1&ifi=1&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&dssz=61&icsg=140782589706240&mso=262144&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1585x1&msz=1585x1&ga_vid=97489540.1573543716&ga_sid=1573543716&ga_hid=719823506&fws=4&ohw=1585
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019110401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
cafe /
Resource Hash
ec0f3dfd5eb3d4da913ad37d2265215dfedf4e6bbfebcb597b6b3459cc325d0c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
214
x-xss-protection
0
google-lineitem-id
-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2019110401.js
securepubads.g.doubleclick.net/gpt/
64 KB
25 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019110401.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019110401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
sffe /
Resource Hash
d3cd091705544e4df29bbee72ca66f1233f6fa01447742156675c21ba59e6e15
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 04 Nov 2019 14:08:43 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
25051
x-xss-protection
0
expires
Tue, 12 Nov 2019 07:28:36 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-36/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-36/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019110401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&t=1573543716221&de=629900827160&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatRendered=0&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=0&zMoatSafetyTargetingSet=0&zMoatEmptySlot=0&zMoatNadoDataLoadTime=Not%20Loaded&zMoatAllDataLoadTime=Not%20Loaded&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&ac=1&bq=11&f=0&zn=0&na=2066393172&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:36 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 12 Nov 2019 07:28:36 GMT
YXJzdGVjaG5pY2EuY29t
tcheck.outbrainimg.com/tcheck/check/
16 B
477 B
XHR
General
Full URL
https://tcheck.outbrainimg.com/tcheck/check/YXJzdGVjaG5pY2EuY29t
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573543716164
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
929701ed632814943e3df803ddd9e3f179ccf889c0ad7b7f3392bd8d109b174f
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
ETag
W/"10-us8lSJutAxKqLzf8c1+n5XstcwY"
Access-Control-Max-Age
43200
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=39001
Date
Tue, 12 Nov 2019 07:28:36 GMT
Connection
keep-alive
Access-Control-Allow-Credentials
false
Content-Length
16
Expires
Tue, 12 Nov 2019 18:18:37 GMT
widget_iframe.2d991e3dfc9abb2549972ce8b64c5d85.html
platform.twitter.com/widgets/ Frame 63FB
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/widget_iframe.2d991e3dfc9abb2549972ce8b64c5d85.html?origin=https%3A%2F%2Farstechnica.com
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js?_=1573543716165
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41AB) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/

Response headers

Content-Encoding
gzip
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Tue, 12 Nov 2019 07:28:36 GMT
Etag
"7d3f6ed140174a20e7c8be261a70a863+gzip"
Last-Modified
Tue, 22 Oct 2019 22:27:25 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/41AB)
Vary
Accept-Encoding
X-Cache
HIT
Content-Length
5816
sparrow.min.js
pixel.condenastdigital.com/
38 KB
14 KB
Script
General
Full URL
https://pixel.condenastdigital.com/sparrow.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.239 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
aece3989759ce8b9a715ba342a604316f14a06ff35d5d4ee0cb5c7dfc8bbecc6

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:36 GMT
Content-Encoding
gzip
Age
315676
X-Cache
HIT, HIT
Connection
keep-alive
Content-Length
13266
x-amz-id-2
G22jDR/T8Gn5E/DpiqgzExuok1rN1IkBMU610B7kk+5zBa3VSyC9OSc2tGwSwko2nJI4oLiZ+R8=
X-Served-By
cache-iad2128-IAD, cache-hhn4032-HHN
Access-Control-Allow-Origin
*
Last-Modified
Fri, 26 Jul 2019 15:47:25 GMT
Server
AmazonS3
X-Timer
S1573543716.411192,VS0,VE0
ETag
"dba402ad6593e4f796c1bbad29c3e81e"
Vary
Accept-Encoding
x-amz-request-id
DEC7F0F62070489D
Via
1.1 varnish, 1.1 varnish
Expires
Fri, 26 Jul 2019 21:47:24 GMT
Cache-Control
no-cache, public, max-age=604800
Accept-Ranges
bytes
Content-Type
application/javascript
X-Cache-Hits
1, 12416
linkid.js
www.google-analytics.com/plugins/ua/
2 KB
935 B
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/linkid.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
92fca55833f48b4289ac8f1cedd48752b580fce4ec4b5d81670b8193d6e51b54
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 06:31:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 22 Oct 2019 18:15:00 GMT
server
sffe
age
3441
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
859
x-xss-protection
0
expires
Tue, 12 Nov 2019 07:31:15 GMT
publisher:getClientId
ampcid.google.com/v1/
74 B
528 B
XHR
General
Full URL
https://ampcid.google.com/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
991bfe84fec788f2b7d432b99a60c1e2aa2e799bc0137da8cf478299d0fc9a10
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
94
x-xss-protection
0
ads
securepubads.g.doubleclick.net/gampad/
5 KB
3 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=1024221985645597&correlator=1659050529412960&output=ldjh&impl=fifs&adsid=NT&eid=21063145&vrg=2019110401&guci=1.2.0.0.2.2.0.0&plat=1%3A536903688%2C2%3A536903688%2C8%3A134250504&sc=1&sfv=1-0-36&ecs=20191112&iu_parts=3379%2Cars.dart%2Cinformation-technology&enc_prev_ius=0%2F1%2F2&prev_iu_szs=300x140&prev_scp=pos%3Dsponsor%26ctx_slot_type%3Dnative_xrail%26ctx_slot_rn%3D0%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dnative_xrail_0&eri=1&cust_params=amznbid%3D0%26amznp%3D0%26m_data%3Dwaiting%26m_safety%3Dwaiting%26m_categories%3Dwaiting%26m_mv%3Dwaiting%26m_gv%3Dwaiting%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.30.9%26ctx_page_slug%3Dindian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%26cnt_tags%3Ddtrack%252Cindia%252Cnorth-korea%252Cnuclear-energy%252Cnuclear-reactor-control-systems%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D&cookie_enabled=1&bc=31&abxe=1&lmt=1573543716&dt=1573543716420&dlt=1573543715931&idt=362&frm=20&biw=1585&bih=1200&oid=3&adxs=1063&adys=786&adks=1840483542&ucis=2&ifi=2&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&dssz=61&icsg=8798915788800&mso=262144&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=300x0&msz=300x140&ga_vid=97489540.1573543716&ga_sid=1573543716&ga_hid=719823506&fws=516&ohw=300
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019110401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
cafe /
Resource Hash
068d07a0c197f287da66d1d80fee4f0594724b5706dd15d9bb2a67f074e0716d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
2789
x-xss-protection
0
google-lineitem-id
4736014287
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138237302059
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
iab
api.skimlinks.mgr.consensu.org/
772 B
636 B
XHR
General
Full URL
https://api.skimlinks.mgr.consensu.org/iab?nocache=1573543716451
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.40.172 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
172.40.190.35.bc.googleusercontent.com
Software
nginx/1.14.0 /
Resource Hash
4898c2b9f8c2f931ef6a819d36e0019867931d9519af933ab4bd5edce724b2a8
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
nginx/1.14.0
access-control-allow-headers
*
status
200
vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, DELETE, OPTIONS
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google
228464857488266
connect.facebook.net/signals/config/
348 KB
85 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/228464857488266?v=2.9.11&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
6ee5d9c83001e5a1812665cd55ff596b5da0814f56c683eec02ef74ac5ed4ff6
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-23=":443"; ma=3600
content-length
86576
x-xss-protection
0
pragma
public
x-fb-debug
P5oUxBTQfAqdt0SIwkwc1Ycom+f+6CFYSJkkTx/xykA1AqCDYjK/U0XRQbmcFEUDUTp/jxDKTc7yCR7s8mp+5g==
x-fb-trip-id
420120009
x-frame-options
DENY
date
Tue, 12 Nov 2019 07:28:36 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
dwce_cheq_events
log.outbrainimg.com/loggerServices/
4 B
344 B
XHR
General
Full URL
https://log.outbrainimg.com/loggerServices/dwce_cheq_events?timestamp=1573543716460&sessionId=4ca9de42-84ff-576f-eb53-0083afeb6ccd&url=arstechnica.com&cheqSource=1&cheqEvent=0&exitReason=2
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573543716164
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.63 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:36 GMT
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
close
X-TraceId
89dc851b7318069d0e17a3b0f9084dfc
Content-Length
4
Expires
0
arstechnica.com
srv-2019-11-12-07.config.parsely.com/config/
419 B
837 B
Script
General
Full URL
https://srv-2019-11-12-07.config.parsely.com/config/arstechnica.com
Requested by
Host: d1z2jf7jlzjs58.cloudfront.net
URL: https://d1z2jf7jlzjs58.cloudfront.net/p.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.20.65.175 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-20-65-175.compute-1.amazonaws.com
Software
/ Express
Resource Hash
a663452906785bc032e28793fba5bc3e073221ad154a575ca4c95dcda1922faa

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:36 GMT
Cache-Control
private, no-cache
ETag
W/"1a3-r9LgfH7L5pr4N5r7S/8gSA"
Connection
keep-alive
X-Powered-By
Express
Content-Length
419
Content-Type
text/javascript; charset=utf-8
collect
px.ads.linkedin.com/
Redirect Chain
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-kor...
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D434737%26url%3Dhttps%253A%252F%252Farstechnica.com%252Finformation-technology%252...
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-kor...
0
93 B
Image
General
Full URL
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&time=1573543716464&liSync=true
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:f500:11:101::b93f:9005 , Ireland, ASN14413 (LINKEDIN - LinkedIn Corporation, US),
Reverse DNS
Software
Play /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:37 GMT
content-encoding
gzip
server
Play
vary
Accept-Encoding
x-li-fabric
prod-lva1
status
200
x-li-proto
http/2
x-li-pop
prod-tln1
content-type
application/javascript
content-length
20
x-li-uuid
Bg4ocqxZ1hXg1DsvMSsAAA==

Redirect headers

date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
302
vary
Accept-Encoding
content-length
20
x-li-uuid
BaXcZKxZ1hWgzhdB2ioAAA==
server
Play
pragma
no-cache
x-li-pop
prod-tln1
x-frame-options
sameorigin
expect-ct
max-age=86400, report-uri="https://www.linkedin.com/platform-telemetry/ct"
strict-transport-security
max-age=2592000
x-li-fabric
prod-lva1
location
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&time=1573543716464&liSync=true
x-xss-protection
1; mode=block
cache-control
no-cache, no-store
content-security-policy
default-src *; connect-src 'self' static.licdn.com media.licdn.com static-exp1.licdn.com static-exp2.licdn.com static-exp3.licdn.com media-exp1.licdn.com media-exp2.licdn.com https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com https://dpm.demdex.net/id https://lnkd.demdex.net/event blob:; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' platform.linkedin.com spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com https://snap.licdn.com/li.lms-analytics/insight.min.js; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'; report-uri https://www.linkedin.com/platform-telemetry/csp?f=l
x-li-proto
http/2
expires
Thu, 01 Jan 1970 00:00:00 GMT
rules-p-Jjy-Cyr1NZGRz.js
rules.quantcount.com/
4 KB
2 KB
Script
General
Full URL
https://rules.quantcount.com/rules-p-Jjy-Cyr1NZGRz.js
Requested by
Host: secure.quantserve.com
URL: https://secure.quantserve.com/quant.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2156:6200:6:44e3:f8c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
efdbd8582066a12cf45115f1e150d2a8de06bf6b14db3feca98b116efeb9e0bb

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 06:34:13 GMT
content-encoding
gzip
last-modified
Mon, 19 Mar 2018 22:18:17 GMT
server
AmazonS3
age
3264
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=3600
x-amz-cf-pop
FRA50-C1
x-amz-cf-id
9Nw6TsNKPGapybKPtjogNmK928Ncly-uv_LypwJko7sz_-lidy9i2w==
via
1.1 9128c49d19c76fd86ec4c647434ccb0a.cloudfront.net (CloudFront)
ijs_all_modules_388015b95703e0f662a36d527ea23867.js
assets.bounceexchange.com/assets/smart-tag/versioned/
347 KB
87 KB
Script
General
Full URL
https://assets.bounceexchange.com/assets/smart-tag/versioned/ijs_all_modules_388015b95703e0f662a36d527ea23867.js
Requested by
Host: tag.bounceexchange.com
URL: https://tag.bounceexchange.com/2806/i.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.98.72.95 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
95.72.98.34.bc.googleusercontent.com
Software
UploadServer /
Resource Hash
cdbfd216b249673e25af57b64fefa79a150bf6c2b2b6d620218137743fe11660

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 14:26:06 GMT
content-encoding
gzip
age
493350
x-guploader-uploadid
AEnB2UoD50O1ZBKYc5E8e-mTIalun1eA4wYlkCmIqzH15WZUWYU5NX4RXQC66YZpJywilLexjU49cqvxCdb-5VmsxESgWj2CPA
x-goog-storage-class
MULTI_REGIONAL
status
200
x-goog-metageneration
1
x-goog-stored-content-encoding
gzip
alt-svc
clear
content-length
88634
last-modified
Thu, 31 Oct 2019 17:42:37 GMT
server
UploadServer
etag
"0d808ebf860c1020ff3ed0ebbea7a9ad"
vary
Accept-Encoding
x-goog-hash
crc32c=gvgmlQ==, md5=DYCOv4YMECD/PtDrvqeprQ==
x-goog-generation
1572543757732903
access-control-allow-origin
*
cache-control
public,max-age=31536000
x-goog-stored-content-length
88634
accept-ranges
bytes
content-type
text/javascript
expires
Thu, 05 Nov 2020 14:26:06 GMT
cygnus
as-sec.casalemedia.com/
66 B
938 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=321388&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A70862503%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2233%22%2C%22siteID%22%3A%22375863%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2231%22%2C%22siteID%22%3A%22375863%22%7D%2C%22id%22%3A%222%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%2C%22user%22%3A%7B%22eids%22%3A%5B%7B%22source%22%3A%22adserver.org%22%2C%22uids%22%3A%5B%7B%22id%22%3A%229b012699-d85e-4715-92c3-9b5bef93f1de%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID%22%7D%7D%2C%7B%22id%22%3A%22FALSE%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_LOOKUP%22%7D%7D%2C%7B%22id%22%3A%222019-11-12T07%3A28%3A36%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_CREATED_AT%22%7D%7D%5D%7D%5D%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
0e7b81f00b330f97095174271e112c5bf0156ce76925b37c0369b7bad0ae4be3

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:36 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript
Content-Length
86
Expires
Tue, 12 Nov 2019 07:28:36 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
257 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=15&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&p_screen_res=1600x1200&site_id=217438&zone_id=1070068&kw=rp.fastlane&tk_flint=index&rand=0.4420921257003325&alt_size_ids=10
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.143 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
c9435d3333c97dd69359ca2ac6cae97cf79b69d82ba6f3ed99150ea926197601

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:36 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=45
Content-Length
257
Expires
Wed, 17 Sep 1975 21:32:10 GMT
ADTECH;apid=1A0a3c4c2c-051e-11ea-a792-12ce909f321e;cfp=1;rndc=1573543715;cmd=bid;cors=yes;v=2;misc=1573543716488;callback=window.headertag.AolHtb.adResponseCallbacks._xp6tSSQu
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1573543716488;callback=window.headertag.AolHtb.adResponseCallbacks._xp6tSSQu;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1573543716;cmd=bid;cors=yes;v=2;misc=1573543716488;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1A0a3c4c2c-051e-11ea-a792-12ce909f321e;cfp=1;rndc=1573543715;cmd=bid;cors=yes;v=2;misc=1573543716488;callback=...
104 B
160 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1A0a3c4c2c-051e-11ea-a792-12ce909f321e;cfp=1;rndc=1573543715;cmd=bid;cors=yes;v=2;misc=1573543716488;callback=window.headertag.AolHtb.adResponseCallbacks._xp6tSSQu
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
a8c99d2e46566fa3adef002d43246a6ccacf6da4aebed42f285549371e04d8c8

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 Nov 2019 07:28:37 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
text/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
104
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 12 Nov 2019 07:28:36 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1A0a3c4c2c-051e-11ea-a792-12ce909f321e;cfp=1;rndc=1573543715;cmd=bid;cors=yes;v=2;misc=1573543716488;callback=window.headertag.AolHtb.adResponseCallbacks._xp6tSSQu
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A0a3c8052-051e-11ea-bb25-12b295be6374;cfp=1;rndc=1573543716;cmd=bid;cors=yes;v=2;misc=1573543716488;callback=window.headertag.AolHtb.adResponseCallbacks._am0f6cnE
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1573543716488;callback=window.headertag.AolHtb.adResponseCallbacks._am0f6cnE;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1573543715;cmd=bid;cors=yes;v=2;misc=1573543716488;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1A0a3c8052-051e-11ea-bb25-12b295be6374;cfp=1;rndc=1573543716;cmd=bid;cors=yes;v=2;misc=1573543716488;callback=...
104 B
161 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1A0a3c8052-051e-11ea-bb25-12b295be6374;cfp=1;rndc=1573543716;cmd=bid;cors=yes;v=2;misc=1573543716488;callback=window.headertag.AolHtb.adResponseCallbacks._am0f6cnE
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
169467e8002541f74afdb13d1119af77cd854b59040023626523dd9fd2f3a4d2

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 Nov 2019 07:28:36 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
text/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
104
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 12 Nov 2019 07:28:36 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1A0a3c8052-051e-11ea-bb25-12b295be6374;cfp=1;rndc=1573543716;cmd=bid;cors=yes;v=2;misc=1573543716488;callback=window.headertag.AolHtb.adResponseCallbacks._am0f6cnE
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
placementbid.json
an.facebook.com/v2/
95 B
1 KB
XHR
General
Full URL
https://an.facebook.com/v2/placementbid.json?sdk=5.5.web&placementids%5B%5D=2038188213062675_2473096466238512&adformats%5B%5D=300x250&cachebuster=fP07uYrVvUqT40JbyjnXjcZr81ECBcIl2bLKOGXJ8JtzbJFmzgzKOztn&platform=2061185240785516&adapterver=2.1.0
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:800e:face:b00c:0:2 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
57d9e69cb4752d577ea0ee335ae1635f2eca55672a4b7da99b9029a8a733a38d
Security Headers
Name Value
Content-Security-Policy default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

strict-transport-security
max-age=15552000; preload
content-encoding
br
x-content-type-options
nosniff
x-fb-an-errors
access-control-expose-headers
X-FB-AN-Request-ID, X-FB-AN-Errors, X-FB-AN-Bid-Count
x-fb-an-request-id
449202336183857429
status
200
alt-svc
h3-23=":443"; ma=3600
x-xss-protection
0
pragma
no-cache
x-fb-debug
e1zx68xuwmik3bbJKxnLacqN6o9cAxxPgKiilp/cZMqpBpOz8BbY5Z+qoTg8e6neZglO/CKRIyoey9l+MGucQw==
x-frame-options
DENY
date
Tue, 12 Nov 2019 07:28:36 GMT
vary
Accept-Encoding
content-type
text/javascript; charset=utf-8
access-control-allow-origin
https://arstechnica.com
x-fb-an-bid-count
0
cache-control
private, no-cache, no-store, must-revalidate
access-control-allow-credentials
true
content-security-policy
default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
cygnus
as-sec.casalemedia.com/
66 B
938 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=321388&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A58633739%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%227%22%2C%22siteID%22%3A%22375847%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%228%22%2C%22siteID%22%3A%22375847%22%7D%2C%22id%22%3A%222%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%2C%22user%22%3A%7B%22eids%22%3A%5B%7B%22source%22%3A%22adserver.org%22%2C%22uids%22%3A%5B%7B%22id%22%3A%229b012699-d85e-4715-92c3-9b5bef93f1de%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID%22%7D%7D%2C%7B%22id%22%3A%22FALSE%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_LOOKUP%22%7D%7D%2C%7B%22id%22%3A%222019-11-12T07%3A28%3A36%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_CREATED_AT%22%7D%7D%5D%7D%5D%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
c9d58e4614da1748db062e2c261e43c5ed7318f86b1b08a9d098b755e88f616e

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:36 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript
Content-Length
86
Expires
Tue, 12 Nov 2019 07:28:36 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
256 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=2&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&p_screen_res=1600x1200&site_id=217438&zone_id=1070068&kw=rp.fastlane&tk_flint=index&rand=0.5629598776167091&alt_size_ids=57
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.143 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
5bdb86c5c807ebb62affaf97b3126a7f4aa0ef4fdf922b2a2783133f7b09469f

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:36 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=490
Content-Length
256
Expires
Wed, 17 Sep 1975 21:32:10 GMT
ADTECH;apid=1A0a3c5532-051e-11ea-8205-1274c1fe5bf6;cfp=1;rndc=1573543715;cmd=bid;cors=yes;v=2;misc=1573543716491;callback=window.headertag.AolHtb.adResponseCallbacks._QHXy3ZQm
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1573543716491;callback=window.headertag.AolHtb.adResponseCallbacks._QHXy3ZQm;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1573543715;cmd=bid;cors=yes;v=2;misc=1573543716491;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1A0a3c5532-051e-11ea-8205-1274c1fe5bf6;cfp=1;rndc=1573543715;cmd=bid;cors=yes;v=2;misc=1573543716491;callback=...
104 B
137 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1A0a3c5532-051e-11ea-8205-1274c1fe5bf6;cfp=1;rndc=1573543715;cmd=bid;cors=yes;v=2;misc=1573543716491;callback=window.headertag.AolHtb.adResponseCallbacks._QHXy3ZQm
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
7e21940a8184cbe0428e8acfdc5f0db1fabdddb96dc3a19cf505c7f64921b20a

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 Nov 2019 07:28:36 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
text/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
104
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 12 Nov 2019 07:28:36 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1A0a3c5532-051e-11ea-8205-1274c1fe5bf6;cfp=1;rndc=1573543715;cmd=bid;cors=yes;v=2;misc=1573543716491;callback=window.headertag.AolHtb.adResponseCallbacks._QHXy3ZQm
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A0a3c7756-051e-11ea-a177-121ea8d7377c;cfp=1;rndc=1573543715;cmd=bid;cors=yes;v=2;misc=1573543716491;callback=window.headertag.AolHtb.adResponseCallbacks._KL2wtFBU
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1573543716491;callback=window.headertag.AolHtb.adResponseCallbacks._KL2wtFBU;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1573543715;cmd=bid;cors=yes;v=2;misc=1573543716491;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;apid=1A0a3c7756-051e-11ea-a177-121ea8d7377c;cfp=1;rndc=1573543715;cmd=bid;cors=yes;v=2;misc=1573543716491;callback=...
103 B
136 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;apid=1A0a3c7756-051e-11ea-a177-121ea8d7377c;cfp=1;rndc=1573543715;cmd=bid;cors=yes;v=2;misc=1573543716491;callback=window.headertag.AolHtb.adResponseCallbacks._KL2wtFBU
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.89 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
37ae29f3c2783a3dc9d26b60b60e9e0b508f6b671de8a81bf8a4f5573bcc5025

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 Nov 2019 07:28:36 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
text/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
103
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 12 Nov 2019 07:28:36 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;apid=1A0a3c7756-051e-11ea-a177-121ea8d7377c;cfp=1;rndc=1573543715;cmd=bid;cors=yes;v=2;misc=1573543716491;callback=window.headertag.AolHtb.adResponseCallbacks._KL2wtFBU
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
Cookie set dest5.html
condenast.demdex.net/ Frame 0574
0
0
Document
General
Full URL
https://condenast.demdex.net/dest5.html?d_nsid=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.241.149.220 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-241-149-220.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Host
condenast.demdex.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Accept-Encoding
gzip, deflate, br
Cookie
demdex=21366057696966911062917538222859747648
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/

Response headers

Accept-Ranges
bytes
Cache-Control
max-age=21600
Content-Encoding
gzip
Content-Type
text/html
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified
Thu, 07 Nov 2019 17:24:39 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Pragma
no-cache
Set-Cookie
demdex=21366057696966911062917538222859747648;Path=/;Domain=.demdex.net;Expires=Sun, 10-May-2020 07:28:36 GMT;Max-Age=15552000
Strict-Transport-Security
max-age=31536000; includeSubDomains
Vary
Accept-Encoding, User-Agent
X-TID
Nj782MDnQBc=
Content-Length
2764
Connection
keep-alive
id
sstats.arstechnica.com/
49 B
684 B
XHR
General
Full URL
https://sstats.arstechnica.com/id?d_visid_ver=3.3.0&d_fieldgroup=A&mcorgid=F7093025512D2B690A490D44%40AdobeOrg&mid=21558587123861134032896012736201280921&ts=1573543716504
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.140.41.50 , United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
arstechnica.com.ssl.d1.sc.omtrdc.net
Software
Omniture DC /
Resource Hash
e414c279f250438fbf8cce494ed56a7b7226cc18ea0425e4adafd89b41ba52a6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Date
Tue, 12 Nov 2019 07:28:36 GMT
X-Content-Type-Options
nosniff
Server
Omniture DC
xserver
www280
Vary
Origin
X-C
ms-6.11.2
P3P
CP="This is not a P3P policy"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/x-javascript
Keep-Alive
timeout=15
Content-Length
49
X-XSS-Protection
1; mode=block
ibs:dpid=411&dpuuid=XcpfJAAAFatb5xKk
dpm.demdex.net/
Redirect Chain
  • https://cm.everesttech.net/cm/dd?d_uuid=21366057696966911062917538222859747648
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=XcpfJAAAFatb5xKk
42 B
873 B
Image
General
Full URL
https://dpm.demdex.net/ibs:dpid=411&dpuuid=XcpfJAAAFatb5xKk
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.16.200.95 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-16-200-95.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

DCS
dcs-prod-irl1-v052-0ed94ef0e.edge-irl1.demdex.com 5.62.4.20191107154045 1ms (+0ms)
Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Content-Type-Options
nosniff
X-TID
lvF/FE9aRsc=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT

Redirect headers

Date
Tue, 12 Nov 2019 07:28:35 GMT
Server
AMO-cookiemap/1.1
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Location
https://dpm.demdex.net/ibs:dpid=411&dpuuid=XcpfJAAAFatb5xKk
Cache-Control
no-cache
Connection
Keep-Alive
Keep-Alive
timeout=15,max=100
Content-Length
0
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=44&t=1573543716221&de=629900827160&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatRendered=0&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=0&zMoatSafetyTargetingSet=0&zMoatEmptySlot=0&zMoatNadoDataLoadTime=241&zMoatAllDataLoadTime=241&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&ac=1&bq=11&f=0&zn=0&if=241&na=1769302933&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:36 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 12 Nov 2019 07:28:36 GMT
/
infinityid.condenastdigital.com/
36 B
1 KB
XHR
General
Full URL
https://infinityid.condenastdigital.com/?rand=1573543716565
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.225.242.81 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-3-225-242-81.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
b176680709235ef7174e909e4c2faa12efd41014c5183aca89b8905ace2c7f0d

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

Date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
Server
nginx/1.15.8
vary
origin,accept-encoding
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
transfer-encoding
chunked
content
4d.condenastdigital.com/
4 KB
2 KB
XHR
General
Full URL
https://4d.condenastdigital.com/content?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.231.252.38 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-231-252-38.compute-1.amazonaws.com
Software
/
Resource Hash
3f03bb9ff7002ff267b5b90ee13cf99362930c3aa5a15be64eb34fce26598d9f

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

Date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-11-12T07%3A28%3A36.566Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cCh=information%20technology&cTi=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cCl=603&cId=1593135&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&pRt=referral&pHp=%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pWw=1600&pWh=1200&pPw=1600&pPh=3700&pSw=1600&pSh=1200&uID=24123826-30dd-4bbb-9702-435db0daf0b1&uNw=1&uUq=1&sID=1d3d3211-bab1-4220-a1e5-cb3d0a824733&pID=44e31dbe-5811-4fc0-84d6-a00804b159a0&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Finterstitial%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3Anull%2C%22campaignId%22%3Anull%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22_out_of_page_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Atrue%2C%22isFirstRequested%22%3Atrue%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22out_of_page_0%22%2C%22outOfPage%22%3Atrue%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%221x1%22%2C%22slug%22%3A%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%7D&dim3=%7B%22footerStart%22%3A1573543716014%2C%22headerStart%22%3A1573543715999%2C%22navigationStart%22%3A1573543714287%2C%22pubAdsReady%22%3A1573543716299%2C%22injected%22%3A1573543716559%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22interstitial%22%5D%2C%22ctx_slot_type%22%3A%5B%22out_of_page%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22out_of_page_0%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%220%22%5D%2C%22amznp%22%3A%5B%220%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22unsafe%22%5D%2C%22m_categories%22%3A%5B%22moat_unsafe%22%2C%22gv_crime%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%5D%2C%22cnt_tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%220lw01o%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22zlqtg4%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_GIOPHEv_0c_%22%5D%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 12 Nov 2019 07:28:36 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
adsct
t.co/i/
43 B
449 B
Image
General
Full URL
https://t.co/i/adsct?p_id=Twitter&p_user_id=0&txn_id=o1o49&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.133 , United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=0
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
content-length
65
x-xss-protection
0
x-response-time
117
pragma
no-cache
last-modified
Tue, 12 Nov 2019 07:28:36 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=0
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
9b53846885a668c3a46696ad45888127
x-transaction
00e379b1001d9ebb
expires
Tue, 31 Mar 1981 05:00:00 GMT
publisher:getClientId
ampcid.google.de/v1/
3 B
457 B
XHR
General
Full URL
https://ampcid.google.de/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
23
x-xss-protection
0
view
securepubads.g.doubleclick.net/pcs/ Frame 2C0D
0
75 B
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvdmmDL9hX90QNcKMiSu7jqBFRcvN8ROIrCwSHj6T0Pi_mgyDyU9sJTE3W2fXutiIhjkrVH9_-Df0OZEiXzHV_crCYZ9w3UEwyrpXcI43wB55Td1qSLsXarbP2HYB2de7c6629DPZaJKaWfEKoDlHHulpagwgSSFDKX6QavxR68CHy_AGuGrzJEZbhqCpPHU5R6C2hE-RYT9V4e431HDsIuPKH7on_j04ugnHb4iCTuUeLq1kGpyuVtcxvlSy4fU6x8JftdiGsYNUf9Ro3bP9MUWNNk&sai=AMfl-YRni4wqrCFnAYD-SPrEg7LmlARbbnHca0HOePtWNPnxDGLiFTVCIuFoXmx2y_xLgJluaC_RCF5fq-mgNv33sEvpAlXfrjgQb5E7zrARBg&sig=Cg0ArKJSzAmVBy9RIixLEAE&urlfix=1&adurl=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 12 Nov 2019 07:28:36 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
creative.js
static.polarcdn.com/creative/ Frame 2C0D
315 KB
119 KB
Script
General
Full URL
https://static.polarcdn.com/creative/creative.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019110401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:f87e , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
ea29e95dd9724418dd2f737bcc7566758f22d61f4d5086195031c6cfbc4d22fa

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
cf-cache-status
HIT
age
7070
cf-ray
5346ca45190659a0-VIE
status
200
cf-ipcountry
DE
content-type
application/javascript
content-length
121310
access-control-allow-origin
*
last-modified
Fri, 08 Nov 2019 19:57:36 GMT
server
cloudflare
etag
W/"5dc5c8b0-4ea94"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, OPTIONS
x-varnish
1200883868 1200882833
via
1.1 varnish
access-control-expose-headers
CF-IPCountry
cache-control
max-age=10800
access-control-allow-credentials
true
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
expires
Tue, 12 Nov 2019 08:25:34 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 2C0D
77 KB
29 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019110401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
3cce2a24544c35f594cc3f662c67eb79393104a7b62fd00090671db641e8eb05
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1573475478201178"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
29292
x-xss-protection
0
expires
Tue, 12 Nov 2019 07:28:36 GMT
moatad.js
z.moatads.com/condenastdfp9588492144/ Frame 2C0D
295 KB
99 KB
Script
General
Full URL
https://z.moatads.com/condenastdfp9588492144/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019110401.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
84f74a5d1633faa66de175a941f55d8b0a0cd00d3a7ff7ccae25eed6d219c9f7

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:36 GMT
Content-Encoding
gzip
Last-Modified
Mon, 04 Nov 2019 20:34:18 GMT
Server
AmazonS3
x-amz-request-id
2D843AB369039F6E
ETag
"2572e86635e18cef1b7a461da551a8bc"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=6999
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
100422
x-amz-id-2
dOIPVbh0TyjTsIVsEUFwB4sQkAH6TEZNyfyRRvFqUWyNVF7cqnuIjh8i6yqSPBA0pLMFRqlTcvk=
osd.js
www.googletagservices.com/activeview/js/current/
78 KB
29 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019110401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
10f00cef14dd32e5aae14d76fb0b45502d429baac7a810cf5492dcbd03ac5604
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1573475478201178"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
29405
x-xss-protection
0
expires
Tue, 12 Nov 2019 07:28:36 GMT
p-Jjy-Cyr1NZGRz.gif
pixel.quantserve.com/pixel/
35 B
292 B
Image
General
Full URL
https://pixel.quantserve.com/pixel/p-Jjy-Cyr1NZGRz.gif?labels=_campaign.media.Advertiser%20ID.1454517775.Campaign%20ID.2338761482.Line%20Item%20ID.4736014287
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.248 , United Kingdom, ASN27281 (QUANTCAST - Quantcast Corporation, US),
Reverse DNS
Software
QS /
Resource Hash
a0d3a0aff7dc3bf32d2176fc3dcda6e7aba2867c4f4d1f7af6355d2cfc6c44f8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:36 GMT
Server
QS
Content-Type
image/gif
Cache-Control
private, no-cache, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
35
Expires
Fri, 04 Aug 1978 12:00:00 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-11-12T07%3A28%3A36.607Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cCh=information%20technology&cTi=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cCl=603&cId=1593135&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&pRt=referral&pHp=%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pWw=1600&pWh=1200&pPw=1600&pPh=3700&pSw=1600&pSh=1200&uID=24123826-30dd-4bbb-9702-435db0daf0b1&sID=1d3d3211-bab1-4220-a1e5-cb3d0a824733&pID=44e31dbe-5811-4fc0-84d6-a00804b159a0&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fars.dart%2Finformation-technology%22%2C%22advertiserId%22%3A1454517775%2C%22campaignId%22%3A2338761482%2C%22creativeId%22%3A138237302059%2C%22elementId%22%3A%22native_xrail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Atrue%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3A4736014287%2C%22name%22%3A%22native_xrail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x140%22%2C%22slug%22%3A%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%7D&dim3=%7B%22footerStart%22%3A1573543716014%2C%22headerStart%22%3A1573543715999%2C%22navigationStart%22%3A1573543714287%2C%22pubAdsReady%22%3A1573543716299%2C%22injected%22%3A1573543716607%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22sponsor%22%5D%2C%22ctx_slot_type%22%3A%5B%22native_xrail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22native_xrail_0%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%220%22%5D%2C%22amznp%22%3A%5B%220%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22unsafe%22%5D%2C%22m_categories%22%3A%5B%22moat_unsafe%22%2C%22gv_crime%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%5D%2C%22cnt_tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%220lw01o%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22zlqtg4%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_GIOPHEv_0c_%22%5D%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 12 Nov 2019 07:28:36 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
moment~timeline~tweet.f41b02dcb58512d8e9f6d4178eb28452.js
platform.twitter.com/js/
24 KB
8 KB
Script
General
Full URL
https://platform.twitter.com/js/moment~timeline~tweet.f41b02dcb58512d8e9f6d4178eb28452.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js?_=1573543716165
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40E1) /
Resource Hash
7c46604c0440be3fd2d6a5e217846cde699e81422afd52625b633bc28cfe3446

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:36 GMT
Content-Encoding
gzip
Last-Modified
Tue, 22 Oct 2019 22:27:17 GMT
Server
ECS (fcn/40E1)
Etag
"acaa80339e9cea48739803700d80ebfb+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
7914
tweet.25ae5aee3c2602da5d36fbf6c51215cf.js
platform.twitter.com/js/
19 KB
7 KB
Script
General
Full URL
https://platform.twitter.com/js/tweet.25ae5aee3c2602da5d36fbf6c51215cf.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js?_=1573543716165
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41AD) /
Resource Hash
bd13404866644f19bfd9bb0d8c96f58536885414ba14fcae712da48d22e74631

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:36 GMT
Content-Encoding
gzip
Last-Modified
Tue, 22 Oct 2019 22:27:17 GMT
Server
ECS (fcn/41AD)
Etag
"e76dffef1c1edce4c8dc5febdf76528c+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
6322
i
tr.snapchat.com/cm/ Frame 340B
0
0
Document
General
Full URL
https://tr.snapchat.com/cm/i?
Requested by
Host: sc-static.net
URL: https://sc-static.net/scevent.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.186.226.184 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
184.226.186.35.bc.googleusercontent.com
Software
nginx/1.17.3 /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

:method
GET
:authority
tr.snapchat.com
:scheme
https
:path
/cm/i?
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/

Response headers

status
200
server
nginx/1.17.3
date
Tue, 12 Nov 2019 07:28:36 GMT
content-type
text/html
content-length
0
strict-transport-security
max-age=31536000; includeSubDomains
via
1.1 google
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
/
polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/ Frame 8811
0
0
Document
General
Full URL
https://polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/
Requested by
Host: plugin.mediavoice.com
URL: https://plugin.mediavoice.com/plugin.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

:method
GET
:authority
polarcdn-terrax.com
:scheme
https
:path
/privacy/v1.0.0/html/optout/readwrite/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate

Response headers

status
200
date
Tue, 12 Nov 2019 07:28:36 GMT
content-type
text/html; charset=utf-8
content-length
1242
set-cookie
__cfduid=dad86912e116dfb47445b33221b7adade1573543716; expires=Wed, 11-Nov-20 07:28:36 GMT; path=/; domain=.polarcdn-terrax.com; HttpOnly
vary
Accept-Encoding
access-control-allow-headers
Authorization
access-control-expose-headers
CF-IPCountry, X-Country, CF-Ray
cache-control
max-age=900
access-control-allow-origin
*
access-control-allow-methods
GET
timing-allow-origin
*
content-encoding
gzip
x-varnish
1715727836 1715715413
via
1.1 varnish
cf-cache-status
HIT
age
124
accept-ranges
bytes
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
5346ca452e028c98-VIE
bid
c.amazon-adsystem.com/e/dtb/
23 B
369 B
XHR
General
Full URL
https://c.amazon-adsystem.com/e/dtb/bid?src=3035&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pid=qL4wTGzYxnZio&cb=0&ws=1600x1200&v=7.43.00&t=1000&slots=%5B%7B%22sd%22%3A%22siderail_0%22%2C%22s%22%3A%5B%22300x250%22%2C%22300x600%22%5D%7D%2C%7B%22sd%22%3A%22post_nav_0%22%2C%22s%22%3A%5B%22728x90%22%2C%22970x250%22%5D%7D%5D&pj=%7B%22si_section%22%3A%22information-technology%22%7D&cfgv=0&gdprl=%7B%22status%22%3A%22cmp-timeout%22%7D
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.86.250 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-86-250.fra2.r.cloudfront.net
Software
Server /
Resource Hash
745a085b52b8371ec6705413fca70a28c6d8bff0db480e6b124bd08c54e95ef8

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
via
1.1 a10d58b5ce965502cc34c5b27682fe23.cloudfront.net (CloudFront)
server
Server
x-amz-cf-pop
FRA2-C2
status
200
vary
User-Agent
x-cache
Miss from cloudfront
content-type
text/javascript;charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
timing-allow-origin
*
content-length
23
x-amz-cf-id
xcUvSlmUeXQhljAmDtuO6Zf5iX2DgztvlcrR3fTjjxvZ5Rf5jY_e7A==
5b27ee7e8c1abc4e7900000f
api.cnevids.com/v1/video_groups/
46 KB
8 KB
XHR
General
Full URL
https://api.cnevids.com/v1/video_groups/5b27ee7e8c1abc4e7900000f?endpoint=oo.arstechnica
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-227ecd1ec6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.193.78.244 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-193-78-244.compute-1.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
754e6fd94dad06b99a2da35ee6cfb6be2733d1e1655668c56390a7ad65c53127
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/*
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

Date
Tue, 12 Nov 2019 07:28:36 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
7808
X-XSS-Protection
1; mode=block
X-Request-Id
55f065d8-73b5-422b-bf03-78060715a215
X-Runtime
0.002522
X-Backend-Node
10.110.10.11
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
X-Frame-Options
SAMEORIGIN
ETag
W/"fb0b8a3501057cbb341c33fb961bd846"
X-Download-Options
noopen
Vary
Accept-Encoding, Origin
Access-Control-Allow-Methods
GET, PUT, POST, DELETE, OPTIONS
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
/
www.facebook.com/tr/
44 B
347 B
Image
General
Full URL
https://www.facebook.com/tr/?id=228464857488266&ev=PageView&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&rl=&if=false&ts=1573543716660&cd[SiteSection]=information%20technology&cd[PageTags]=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cd[Brand]=Pitchfork&sw=1600&sh=1200&v=2.9.11&r=stable&ec=0&o=30&fbp=fb.1.1573543716659.2145619428&it=1573543716457&coo=false&rqm=GET
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
alt-svc
h3-23=":443"; ma=3600
content-length
44
expires
Tue, 12 Nov 2019 07:28:36 GMT
collect
www.google-analytics.com/
35 B
109 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j79&a=719823506&t=pageview&_s=1&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&dr=%2F&dp=%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&ul=en-us&de=UTF-8&dt=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea%20%7C%20Ars%20Technica&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=aChAgUAjAAQC~&jid=605022974&gjid=866419302&cid=97489540.1573543716&tid=UA-31997-1&_gid=707091628.1573543717&gtm=2wgav3NLXNPCQ&cg1=article%7Creport&cg2=information-technology&cg3=information%20technology&cd1=GTM-NLXNPCQ&cd2=137&cd4=&cd6=Tue%20Nov%2012%202019%2008%3A28%3A36%20GMT%2B0100%20(Central%20European%20Standard%20Time)&cd7=1573543716319.ma2j6ixr&cd8=-1&cd9=Mozilla%2F5.0%20(Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5)%20AppleWebKit%2F537.36%20(KHTML%2C%20like%20Gecko)%20Chrome%2F74.0.3729.169%20Safari%2F537.36&cd10=English&cd11=desktop&cd12=0&cd13=Tag%20Name%3A%20GA%20-%20Pageview%20-%20Core%20Pageview%20-%20All%20Pages&cd20=none&cd25=Sean%20Gallagher&cd26=1593135&cd27=603&cd28=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea&cd29=web&cd32=2019-10-29T15%3A47%3A47%2B00%3A00&cd34=2019-10-30T12%3A56%3A25%2B00%3A00&cd35=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cd36=web&cd43=Ars%20Technica&cd45=Adblock%20Enabled%20-%20false&cd62=https%3A%2F%2Farstechnica.com%2F%3Fp%3D1593135&cd63=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cd65=&cd72=1.0.0&cd92=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cd93=information%20technology&cd97=-1303530583&cd98=article%7Creport&cd103=&cd113=data-layer-loaded&cd3=97489540.1573543716&z=112076917
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 30 Oct 2019 18:34:08 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
1083268
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j79&tid=UA-31997-1&cid=97489540.1573543716&jid=605022974&gjid=866419302&_gid=707091628.1573543717&_u=aChAgUAjAAQC~&z=300417292
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=97489540.1573543716&jid=605022974&_v=j79&z=300417292
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=97489540.1573543716&jid=605022974&_v=j79&z=300417292&slf_rd=1&random=3869058567
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=97489540.1573543716&jid=605022974&_v=j79&z=300417292&slf_rd=1&random=3869058567
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 Nov 2019 07:28:36 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 12 Nov 2019 07:28:36 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=97489540.1573543716&jid=605022974&_v=j79&z=300417292&slf_rd=1&random=3869058567
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
local_storage_frame10.min.html
assets.bounceexchange.com/assets/bounce/ Frame 534B
0
0
Document
General
Full URL
https://assets.bounceexchange.com/assets/bounce/local_storage_frame10.min.html
Requested by
Host: assets.bounceexchange.com
URL: https://assets.bounceexchange.com/assets/smart-tag/versioned/ijs_all_modules_388015b95703e0f662a36d527ea23867.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.98.72.95 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
95.72.98.34.bc.googleusercontent.com
Software
UploadServer /
Resource Hash

Request headers

:method
GET
:authority
assets.bounceexchange.com
:scheme
https
:path
/assets/bounce/local_storage_frame10.min.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/

Response headers

status
200
x-guploader-uploadid
AEnB2UpVrvY7-FxBwPRBArI-ti8SGO6nwaElR0vVgxAx2nlqgk4QG3tzVHEfpWozpXOotocOlZULjoH7Ox9u63gfJ-QlYH8Hgg
date
Wed, 06 Nov 2019 14:26:06 GMT
expires
Thu, 05 Nov 2020 14:26:06 GMT
last-modified
Thu, 25 Jul 2019 15:10:57 GMT
etag
"55fccc7bc73db2181e976f1ccec90e2c"
x-goog-generation
1564067457180148
x-goog-metageneration
2
x-goog-stored-content-encoding
gzip
x-goog-stored-content-length
995
content-type
text/html
content-encoding
gzip
x-goog-hash
crc32c=z+risA== md5=VfzMe8c9shgel28czskOLA==
x-goog-storage-class
MULTI_REGIONAL
accept-ranges
bytes
vary
Accept-Encoding
content-length
995
access-control-allow-origin
*
server
UploadServer
cache-control
public, max-age=31536000
age
493350
alt-svc
clear
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1573543716221&de=629900827160&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=_out_of_page_0&zMoatRendered=1&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=1&zMoatPageDataTargetingSet=1&zMoatSafetyTargetingSet=1&zMoatEmptySlot=1&zMoatNadoDataLoadTime=241&zMoatAllDataLoadTime=241&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&ac=1&bq=11&f=0&zn=0&if=241&na=2086968918&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:36 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 12 Nov 2019 07:28:36 GMT
p
tr.snapchat.com/ Frame 60B3
0
0
Document
General
Full URL
https://tr.snapchat.com/p
Requested by
Host: sc-static.net
URL: https://sc-static.net/scevent.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.186.226.184 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
184.226.186.35.bc.googleusercontent.com
Software
nginx/1.17.3 /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

:method
POST
:authority
tr.snapchat.com
:scheme
https
:path
/p
content-length
398
pragma
no-cache
cache-control
no-cache
origin
https://arstechnica.com
upgrade-insecure-requests
1
content-type
application/x-www-form-urlencoded
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
accept-encoding
gzip, deflate, br
Origin
https://arstechnica.com
Upgrade-Insecure-Requests
1
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/

Response headers

status
200
server
nginx/1.17.3
date
Tue, 12 Nov 2019 07:28:36 GMT
content-type
text/html
content-length
0
access-control-allow-origin
*
cache-control
no-cache, no-transform
set-cookie
sc_at=v2|H4sIAAAAAAAAAAXBgQ0AQQQEwIokJ3afL+cIVSj+ZsqiqVGi/6SgMZLoEDDnFuOWn12lG2Gu354HtPU5nTIAAAA=;SameSite=None;Version=1;Comment=;Domain=.snapchat.com;Path=/;Max-Age=33696000;Secure
strict-transport-security
max-age=31536000; includeSubDomains
via
1.1 google
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
syndication
syndication.twitter.com/i/jot/
43 B
124 B
Image
General
Full URL
https://syndication.twitter.com/i/jot/syndication?l=%7B%22_category_%22%3A%22syndicated_impression%22%2C%22triggered_on%22%3A1573543716729%2C%22dnt%22%3Afalse%2C%22event_namespace%22%3A%7B%22client%22%3A%22tfw%22%2C%22page%22%3A%22tweet%22%2C%22action%22%3A%22impression%22%7D%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.136 , United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
content-length
65
x-xss-protection
0
x-response-time
115
pragma
no-cache
last-modified
Tue, 12 Nov 2019 07:28:36 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=631138519
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
06b813f787b6d3abefd8e24327b994e2
x-transaction
00e4bda500fd0aa1
expires
Tue, 31 Mar 1981 05:00:00 GMT
tweets.json
cdn.syndication.twimg.com/
9 KB
3 KB
Script
General
Full URL
https://cdn.syndication.twimg.com/tweets.json?callback=__twttr.callbacks.cb0&ids=1188853620541775872&lang=en&suppress_response_codes=true&theme=light&tz=GMT%2B0100
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js?_=1573543716165
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/418F) /
Resource Hash
6a2a3858d8c86db18bcd8bd2f51b45dbb262222b8f56706aca9275417feaafd3
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-cache
HIT
status
200
content-disposition
attachment; filename=jsonp.jsonp
vary
Accept-Encoding
content-length
2390
x-xss-protection
0
x-response-time
133
last-modified
Tue, 12 Nov 2019 07:27:57 GMT
server
ECS (fcn/418F)
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=631138519
content-type
application/javascript;charset=utf-8
cache-control
must-revalidate, max-age=60
x-connection-hash
56a43f459796a4bad4e49554a3d3e503
accept-ranges
bytes
timing-allow-origin
*
x-transaction
0067515b0016db7c
expires
Tue, 12 Nov 2019 07:29:36 GMT
/
polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/ Frame 12F5
0
0
Document
General
Full URL
https://polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

:method
GET
:authority
polarcdn-terrax.com
:scheme
https
:path
/privacy/v1.0.0/html/optout/readwrite/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
accept-encoding
gzip, deflate, br
cookie
__cfduid=dad86912e116dfb47445b33221b7adade1573543716
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate

Response headers

status
200
date
Tue, 12 Nov 2019 07:28:36 GMT
content-type
text/html; charset=utf-8
content-length
1242
vary
Accept-Encoding
access-control-allow-headers
Authorization
access-control-expose-headers
CF-IPCountry, X-Country, CF-Ray
cache-control
max-age=900
access-control-allow-origin
*
access-control-allow-methods
GET
timing-allow-origin
*
content-encoding
gzip
x-varnish
1715727836 1715715413
via
1.1 varnish
cf-cache-status
HIT
age
124
accept-ranges
bytes
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
5346ca45ce558c98-VIE
wt
polarcdn-pentos.com/ Frame 2C0D
3 B
66 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=1&n=3&p=UNKNOWN&s=1&u=11ee2d43-f5bc-4447-8d68-364b94f86e8e&v=2%2F85bc8a5&w=1.163.0&y=w&z=v1.6.48&pas=asa-web&pag2=%2F3379%2Fars.dart&pai=91775&d=arstechnica.com&l=&pajs=&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&paio=1&pasb=1&cu=fb2d10b26919e25e37e4841e4787291b&t=arx&parcid=ab918&parid=d6f58&parin=1&partm=0&par=s&maxts=0.012&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&_=1573543716740
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.192.78 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
age
46068
cf-ray
5346ca46192396d4-FRA
status
200
content-length
3
x-amz-id-2
fdX907fwNt8pr3tw3gr73uFQXky3viGiZTMtdYbPcadu4V04bAegc8VyKwcCSRJX1hpdYoYX62c=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
x-amz-request-id
E1FE302C79362616
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
content-type
application/octet-stream
wt
polarcdn-pentos.com/ Frame 2C0D
3 B
596 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=2&n=3&p=UNKNOWN&s=1&u=11ee2d43-f5bc-4447-8d68-364b94f86e8e&v=2%2F85bc8a5&w=1.163.0&y=w&z=v1.6.48&pas=asa-web-polarpmp&pag1=conde_customcontent_market&pag2=brand_arstechnica&paenb=y&pai=91775&d=arstechnica.com&l=&pajs=&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&paio=1&pasb=1&cu=fb2d10b26919e25e37e4841e4787291b&t=atx&parcid=ab918&parid=a6342&parin=2&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&_=1573543716741
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.192.78 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
age
46068
cf-ray
5346ca46192496d4-FRA
status
200
content-length
3
x-amz-id-2
fdX907fwNt8pr3tw3gr73uFQXky3viGiZTMtdYbPcadu4V04bAegc8VyKwcCSRJX1hpdYoYX62c=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
x-amz-request-id
E1FE302C79362616
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
content-type
application/octet-stream
req
bw-prod.plrsrvcs.com/ Frame 2C0D
3 KB
3 KB
XHR
General
Full URL
https://bw-prod.plrsrvcs.com/req
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6811:dc0f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
3df648ffa170ec3a0117758289f45688c2c24734ef4883f4aed2358d557e5adf

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
x-openrtb-version
2.3
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors
Content-Type
application/json

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
via
1.1 google
x-polar-trace-id
cf-cache-status
DYNAMIC
x-polar-response-id
154c05718ca34d3fa000d9fed20d1794
status
200
cf-ipcountry
DE
x-polar-h
87134-11
x-polar-t
0.003
content-encoding
gzip
alt-svc
clear
pragma
no-cache
server
cloudflare
x-polar-misses
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
*
access-control-expose-headers
CF-IPCountry
cache-control
no-cache, no-store, must-revalidate
cf-ray
5346ca4659a7cbc8-VIE
expires
0
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1573543716221&de=629900827160&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=native_xrail_0&zMoatRendered=2&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=2&zMoatPageDataTargetingSet=2&zMoatSafetyTargetingSet=2&zMoatEmptySlot=1&zMoatNadoDataLoadTime=241&zMoatAllDataLoadTime=241&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&ac=1&bq=11&f=0&zn=0&if=241&na=92787933&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:36 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 12 Nov 2019 07:28:36 GMT
5dc1b51838d069610fb0def7.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady45454152
player.cnevids.com/script/video/
63 KB
21 KB
Script
General
Full URL
https://player.cnevids.com/script/video/5dc1b51838d069610fb0def7.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady45454152
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-227ecd1ec6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.78.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-78-104.fra2.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
e5fcc096942ef2b455b92e77ec7c052e93a44953b9c566309413fbd09589d463
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:36 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Amz-Cf-Pop
FRA2-C2
X-Cache
Miss from cloudfront
Status
200 OK
Connection
keep-alive
Content-Length
20735
X-XSS-Protection
1; mode=block
X-Request-Id
73c2fcdd-2fe0-4ee8-8d55-a27428c7411b
X-Runtime
0.006204
X-Backend-Node
10.110.72.103
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"526bc93a0f1799d490a88ebcd3c95f46"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 ec9e3bc729d9c6d55ed32446408ad62f.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Id
Axd9xaDPsro0o5U50sp2-r1b9WaEyjlIqaf40FSvX-gTKRgvf7R9Nw==
arstechnica_unsolved-mysteries-bioware-answers-unsolved-mysteries-of-the-mass-effect-universe.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1573140819/
11 KB
12 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1573140819/arstechnica_unsolved-mysteries-bioware-answers-unsolved-mysteries-of-the-mass-effect-universe.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.158 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-158.fra2.r.cloudfront.net
Software
Cloudinary /
Resource Hash
de24551bd4396fc8579b2d87ce01944553dd48fb52775d14373725a50efa0c37
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 08 Nov 2019 14:35:45 GMT
Via
1.1 882f747f39885162595630c95dd0012d.cloudfront.net (CloudFront)
Age
319787
X-Cache
Hit from cloudfront
Server-Timing
cloudinary;dur=112;start=2019-11-08T14:35:45.689Z,cld-id;desc=555a3491395f2119db357e871f2eced0,fastly;dur=0;total=205;start=2019-11-08T14:35:45.643Z;desc=MISS,rtt;dur=0
Connection
keep-alive
Content-Length
11417
X-Request-Id
555a3491395f2119db357e871f2eced0
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 08 Nov 2019 14:35:23 GMT
Server
Cloudinary
ETag
"3e8509d06c6610d54babcac0d91e5d93"
Strict-Transport-Security
max-age=604800
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Server-Timing
Cache-Control
public, no-transform, immutable, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
3ADHHVZe4PmZdnyuvMLOeyzFZOGJHKi1nyqkw_yuXAqRTPC4tzJTlQ==
arstechnica_war-stories-civilization.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1569003425/
16 KB
17 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1569003425/arstechnica_war-stories-civilization.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.158 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-158.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
1c7dcc8216c6f82da2998ceeac2523632c7f9bffe510824b6d082621201f2012

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 23 Sep 2019 16:37:49 GMT
Via
1.1 varnish, 1.1 df26103dc140569d7032449c70c3b141.cloudfront.net (CloudFront)
Age
1694778
Edge-Cache-Tag
390602458176548494884398897259766670181,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
16236
X-Request-Id
df2afd02bed526ce
X-Served-By
cache-hhn4065-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Mon, 23 Sep 2019 11:27:54 GMT
Server
cloudinary
X-Timer
S1569256670.782884,VS0,VE192
ETag
"72002610618f7bf8bf0e52c760e39897"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
yOf_Agcr5s6RHby51DHdpe6Aj1IumhK1iaIjoy1s6a6TnFgwLfMR9Q==
X-Cache-Hits
0
arstechnica_sitrep-dod-resets-ballistic-missile-interceptor-program.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1568662260/
11 KB
11 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1568662260/arstechnica_sitrep-dod-resets-ballistic-missile-interceptor-program.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.158 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-158.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
7fc88c65d46e83b3f3e9f098f05fd639480332fc3718cd714725e2e4633af4e8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 17 Sep 2019 19:55:23 GMT
Via
1.1 varnish, 1.1 27f665df26bde4a7226480b4a2890ff9.cloudfront.net (CloudFront)
Age
2201500
Edge-Cache-Tag
285695674967648002297586464606017083075,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
10793
X-Served-By
cache-fra19156-FRA
Last-Modified
Tue, 17 Sep 2019 19:55:15 GMT
Server
cloudinary
X-Timer
S1568750123.147762,VS0,VE109
ETag
"0e1ff58ccf6d97759de3d774a7ff835a"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
pM2bdmNGDYq_9isHWG9kC6VeoO1a4ceU18AK2PtwU4lLADtwJySgyw==
X-Cache-Hits
0
arstechnica_dead-cells-how-to-avoid-falling-to-your-death-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1563202921/
16 KB
17 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1563202921/arstechnica_dead-cells-how-to-avoid-falling-to-your-death-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.158 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-158.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
5f760e6eaa1fd8e199a7135ae74692369612ff5de37b99eb63bcb8ee7d615568

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 19 Jul 2019 15:13:14 GMT
Via
1.1 varnish, 1.1 4048e3a1e70c8529cbd86f04580a3da4.cloudfront.net (CloudFront)
Age
801051
Edge-Cache-Tag
512786565011436188602690990842551442357,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
16016
X-Request-Id
558da5101eeb1f1f
X-Served-By
cache-fra19150-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 19 Jul 2019 15:13:07 GMT
Server
cloudinary
X-Timer
S1563549194.385414,VS0,VE180
ETag
"4dba8e36b73a44cca8375175ae0e4b39"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
02OvCF4joYeojNv7IwqZPKrTexe1PHotR2IhJ7QRfs2GD9s9kpteQg==
X-Cache-Hits
0
arstechnica_warframe-reviews.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1561556730/
14 KB
15 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1561556730/arstechnica_warframe-reviews.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.158 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-158.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
83a366075eb2387c6d9f848f42b08df0546027333eccf5813edf95ba45709be2

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 27 Jun 2019 19:35:11 GMT
Via
1.1 varnish, 1.1 df26103dc140569d7032449c70c3b141.cloudfront.net (CloudFront)
Age
1645842
Edge-Cache-Tag
409825722100045817936218917770258862228,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
14837
X-Request-Id
b6ad3868f2bf03bf
X-Served-By
cache-hhn4083-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Thu, 27 Jun 2019 19:34:59 GMT
Server
cloudinary
X-Timer
S1561664111.929725,VS0,VE147
ETag
"1d90d6aef7585f963e1270a1a02a4dd4"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
rCJrB_lucWwGi8A2J0zOv31PdX0XuUbNjHHaw-DYRe0cY9DVKU0nnQ==
X-Cache-Hits
0
arstechnica_war-stories-subnautica.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559747425/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559747425/arstechnica_war-stories-subnautica.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.158 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-158.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
20660a9ef7ec454c15b2dc62b3db084e0cc9f74c5bb6de71a96fb1a54aef00f8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 24 Jun 2019 10:48:59 GMT
Via
1.1 varnish, 1.1 4048e3a1e70c8529cbd86f04580a3da4.cloudfront.net (CloudFront)
Age
2272821
Edge-Cache-Tag
384957005148579205807938476483146982592,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15222
X-Request-Id
ce1d27b050d5738b
X-Served-By
cache-hhn1540-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Wed, 05 Jun 2019 17:40:02 GMT
Server
cloudinary
X-Timer
S1561373340.624145,VS0,VE260
ETag
"8c45b6c645caba59f4b14d3fbdc09062"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
KFmegfZK4QIe_aV5Mv3XxsbPaflozDxPVxRyamOo9-o0Dj-mehqhTQ==
X-Cache-Hits
0
arstechnica_this-war-of-mine-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559075831/
16 KB
17 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559075831/arstechnica_this-war-of-mine-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.158 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-158.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
ec84902ae04cc118d965c577e2ece816abd594431ce66bcef1afd4f745e951fd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 16 Jul 2019 19:33:42 GMT
Via
1.1 varnish, 1.1 882f747f39885162595630c95dd0012d.cloudfront.net (CloudFront)
Age
1075376
Edge-Cache-Tag
580474366038461196493179311799260666459,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15985
X-Request-Id
e9c3b3c122e652ae
X-Served-By
cache-fra19160-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Mon, 03 Jun 2019 18:11:08 GMT
Server
cloudinary
X-Timer
S1563305622.451318,VS0,VE215
ETag
"42bc7816573b81a73647b6f7123944c5"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
rlyQdxnh3j7a35sBv8g3W2AC1mqRWsSZDKqUODa-tfPLCdg0L2sCig==
X-Cache-Hits
0
arstechnica_obra-dinn-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1558373184/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1558373184/arstechnica_obra-dinn-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.158 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-158.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
8574074952616e0a56e5b72d9634bff0a683d658d09804c10324293811606d22

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 28 May 2019 17:37:15 GMT
Via
1.1 varnish, 1.1 27f665df26bde4a7226480b4a2890ff9.cloudfront.net (CloudFront)
Age
815846
Edge-Cache-Tag
433557846635605494688582207268998106147,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15609
X-Request-Id
c8a15984885b6e84
X-Served-By
cache-fra19142-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 28 May 2019 17:36:10 GMT
Server
cloudinary
X-Timer
S1559065035.044774,VS0,VE231
ETag
"8becb0d5f4f7ff3e76e89c89871f465d"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
wpoCczvDJjObWZteNlFf72bwyCz9JCWy2NOQ3UKpjQVdt8j6uQKMcg==
X-Cache-Hits
0
arstechnica_army-s-new-pistol-has-had-some-misfires.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556912500/
8 KB
9 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556912500/arstechnica_army-s-new-pistol-has-had-some-misfires.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.158 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-158.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
a91d62b47f02a7e638d1749e3791ac328b2dd89dac630578f76e65b1ed91ed89

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 02 Jun 2019 00:09:44 GMT
Via
1.1 varnish, 1.1 a32f966fc5896281eb3de44fd8f57d40.cloudfront.net (CloudFront)
Age
2094165
Edge-Cache-Tag
575077299308468417590234438077035908298,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
7863
X-Request-Id
19c9873a9e40bdc6
X-Served-By
cache-hhn1537-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Mon, 13 May 2019 19:11:27 GMT
Server
cloudinary
X-Timer
S1559434184.442899,VS0,VE232
ETag
"31902de995c98904a55c605571f06530"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
S8T3YVpMXK4G6gGRjtuTPRsZ5HeXhY0QifWGd8a83Xue4DKEk63RVQ==
X-Cache-Hits
0
arstechnica_war-stories-slay-the-spire-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556741487/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556741487/arstechnica_war-stories-slay-the-spire-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.158 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-158.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
f9d9e96c4439beeca49a1a10f9dffe6f5cd0b604d13aa13af170d0bc62d8ca1b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 May 2019 00:05:34 GMT
Via
1.1 varnish, 1.1 ff2bcb2d3b4a3d9e0615ddd1033c38c4.cloudfront.net (CloudFront)
Age
1279392
Edge-Cache-Tag
515397136805965062020045600075132664421,404749671192515790889513374839386840902,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15634
X-Request-Id
2d0da7ec326501f4
X-Served-By
cache-fra19145-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Thu, 02 May 2019 18:45:52 GMT
Server
cloudinary
X-Timer
S1559088335.611581,VS0,VE1
ETag
"abee90e53f29ba0127fca9442ab50902"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
IZ75cN3h4RYU2EZG7xeiH9Sj3nwp3VGXxmf6SSLtgtJ1kkZWv9Zc0g==
X-Cache-Hits
1
arstechnica_war-stories-amnesia-the-dark-descent-the-horror-facade.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1555359865/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1555359865/arstechnica_war-stories-amnesia-the-dark-descent-the-horror-facade.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.158 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-158.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
1defb6bc54a7ee9c066136908360e8455c23ee9ad0dec9924e7255d7948cd4be

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 21 May 2019 00:08:37 GMT
Via
1.1 varnish, 1.1 882f747f39885162595630c95dd0012d.cloudfront.net (CloudFront)
Age
801051
Edge-Cache-Tag
587193118310891607619753694455047488726,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15251
X-Request-Id
4a753e904b5f7094
X-Served-By
cache-hhn1539-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 16 Apr 2019 18:59:19 GMT
Server
cloudinary
X-Timer
S1558397317.096357,VS0,VE232
ETag
"3e7cdc13e718680bf5e1efa64468b560"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
WPFMkjoP3qcKTR4nGy_lYcq6sWVipjpmxxHqOjNlOB-37NfCXi67PA==
X-Cache-Hits
0
arstechnica_war-stories-c-and-c-tiberian-sun.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1551193450/
19 KB
19 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1551193450/arstechnica_war-stories-c-and-c-tiberian-sun.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.158 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-158.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
27348ba4b98bd80f1038496ec5dea6ad865680540058fb085b8ca199b8aaf4c5

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 28 May 2019 01:29:38 GMT
Via
1.1 varnish, 1.1 4048e3a1e70c8529cbd86f04580a3da4.cloudfront.net (CloudFront)
Age
1666910
Edge-Cache-Tag
313687566273846460968749706722669918033,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
19022
X-Request-Id
2200c349462f9c83
X-Served-By
cache-hhn1528-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Wed, 27 Feb 2019 16:48:24 GMT
Server
cloudinary
X-Timer
S1559006978.808642,VS0,VE226
ETag
"fe52b9acd391d8bee8de15a0f429b377"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
iY97MipNdtGhdk4VZGwFHceUxSfHLCb4KM8whovMx0mUvDnCEut62g==
X-Cache-Hits
0
arstechnica_army-s-next-vertical-lift-en-route.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550680609/
5 KB
6 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550680609/arstechnica_army-s-next-vertical-lift-en-route.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.158 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-158.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
4868ca91bcd0d492c501ec5b8d44ac78d3e1226977ae14ff598f5efe78751951

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 May 2019 00:18:27 GMT
Via
1.1 varnish, 1.1 27f665df26bde4a7226480b4a2890ff9.cloudfront.net (CloudFront)
Age
2077291
Edge-Cache-Tag
312535560964408758261298476626669868625,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
4867
X-Request-Id
e3f346bec24d7ff3
X-Served-By
cache-hhn1532-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Thu, 21 Feb 2019 15:50:43 GMT
Server
cloudinary
X-Timer
S1559089107.834583,VS0,VE286
ETag
"90ad4d692f7209c01596b99729f26e7b"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
WllHLcF6Lg5DTjEiJWvLBP3L-RELa8K1OxzeAc5qkBRd5R5P80cmnw==
X-Cache-Hits
0
arstechnica_war-stories-blade-runner-skinjobs-voxels-and-future-noir.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550244434/
18 KB
19 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550244434/arstechnica_war-stories-blade-runner-skinjobs-voxels-and-future-noir.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.158 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-158.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
8b72952d3fd656ee6594f0d9735d928113ad1d590705b14f77abf75f1d4d5d69

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 May 2019 00:11:29 GMT
Via
1.1 varnish, 1.1 a32f966fc5896281eb3de44fd8f57d40.cloudfront.net (CloudFront)
Age
1664113
Edge-Cache-Tag
292757494989914907279105994976263969890,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
18172
X-Request-Id
c3e7d96bbe014b80
X-Served-By
cache-hhn1535-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 15 Feb 2019 15:34:33 GMT
Server
cloudinary
X-Timer
S1559088690.594713,VS0,VE388
ETag
"32f1b8954559c8d598e9861f5b8360b9"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
aTYVhj8v73YbUCWbcf4oNr813-KiQmbENhkzn7mJ8w62yMm5n_NNKQ==
X-Cache-Hits
0
arstechnica_war-stories-dead-space-the-drag-tentacle.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1546889545/
7 KB
8 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1546889545/arstechnica_war-stories-dead-space-the-drag-tentacle.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.158 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-158.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
9933997608e86beaf1e7f7188a5c657cdad8ccd9d20eb7b1a46adaa83fa850ab

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 02 Jun 2019 00:19:02 GMT
Via
1.1 varnish, 1.1 ff2bcb2d3b4a3d9e0615ddd1033c38c4.cloudfront.net (CloudFront)
Age
1787699
Edge-Cache-Tag
561334743792169660751574031162860899763,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
7393
X-Served-By
cache-hhn1525-HHN
Last-Modified
Tue, 08 Jan 2019 16:38:58 GMT
Server
cloudinary
X-Timer
S1559434743.785754,VS0,VE1
ETag
"17a6e4b5eb75eb12f5d8c89eb3d0ace8"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
HHI2nFjO_ehxwBjWgEFjhUhCo0C3R1jc96NYusEwWyAbrA58m3KrTw==
X-Cache-Hits
1
arstechnica_teach-the-controversy-flat-earthers.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1541592304/
10 KB
11 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1541592304/arstechnica_teach-the-controversy-flat-earthers.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.158 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-158.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
7364fcbb6c5d775f07816712af8a6419db99268f72c337a4977f706dc3423bb3

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 02 Jun 2019 00:45:15 GMT
Via
1.1 varnish, 1.1 df26103dc140569d7032449c70c3b141.cloudfront.net (CloudFront)
Age
1964642
Edge-Cache-Tag
522150850958368321191235208678465217967,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
10595
X-Request-Id
98a54be49b866b53
X-Served-By
cache-hhn1521-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 09 Nov 2018 14:44:53 GMT
Server
cloudinary
X-Timer
S1559436315.461747,VS0,VE1
ETag
"6c0c4f8a9d61ed2b5863a8058c624a37"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
EXRSuyj4vMRdRIqkrK-6eFMV7Cg5hqeiIswfNKKaD9pyTmzo_zzP0A==
X-Cache-Hits
2
arstechnica_delta-v-the-burgeoning-world-of-small-rockets-paul-allen-s-huge-plane-and-spacex-get-s-a-crucial-green-light.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1537406983/
12 KB
13 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1537406983/arstechnica_delta-v-the-burgeoning-world-of-small-rockets-paul-allen-s-huge-plane-and-spacex-get-s-a-crucial-green-light.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.158 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-158.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
16f86804dd013db340fee4020a539d3e9d6e5a03d6841e431e50c428e99c26e8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 02 Jun 2019 00:12:44 GMT
Via
1.1 varnish, 1.1 df26103dc140569d7032449c70c3b141.cloudfront.net (CloudFront)
Age
2005764
Edge-Cache-Tag
389498626973997838808844380914497340413,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
12509
X-Request-Id
ec5f066ff382a9d5
X-Served-By
cache-fra19162-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 21 Sep 2018 16:51:30 GMT
Server
cloudinary
X-Timer
S1559434364.715908,VS0,VE304
ETag
"b9c502ffc902b60d0eb13698b37a945d"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
7hBWZ_9iIgm0Se-vgtcap_eXOkPkRuVCTdLzNlTQN4sNnn1fAiaiiQ==
X-Cache-Hits
0
arstechnica_chris-hadfield-explains-his-space-oddity-video.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1522031130/
7 KB
8 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1522031130/arstechnica_chris-hadfield-explains-his-space-oddity-video.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.158 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-158.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
3ce7e824185893264ab44fbf8370a8f1262831c4c6c367b15f7d4f1e88fadc8c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 20 May 2019 18:19:04 GMT
Via
1.1 varnish, 1.1 4048e3a1e70c8529cbd86f04580a3da4.cloudfront.net (CloudFront)
Age
1787444
Edge-Cache-Tag
294316597633303263276952824544497226127,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
7181
X-Served-By
cache-fra19129-FRA
Last-Modified
Fri, 06 Jul 2018 12:23:22 GMT
Server
cloudinary
X-Timer
S1558376344.111767,VS0,VE1
ETag
"0549828edcecd339d8d10ebe6119de70"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
olTp4V8N96NjKCEepaOXl9fT_-gAu8NOiHw0UdZpeFaVr2wM0_Z3HA==
X-Cache-Hits
1
arstechnica_apollo-mission-episode-1.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1512424612/
14 KB
15 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1512424612/arstechnica_apollo-mission-episode-1.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.158 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-158.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
82cd1a97f81e5b63a621311be2993916eea0907b5eadd53bb6b280f4bb0f8391

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 May 2019 00:21:15 GMT
Via
1.1 varnish, 1.1 ff2bcb2d3b4a3d9e0615ddd1033c38c4.cloudfront.net (CloudFront)
Age
1663300
Edge-Cache-Tag
424632948265147424317824738369264083785,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
14040
X-Request-Id
37d0301184b1a283
X-Served-By
cache-hhn1547-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 05 Dec 2017 01:52:25 GMT
Server
cloudinary
X-Timer
S1559089275.724502,VS0,VE297
ETag
"ecc047c6eed3dc571a78eab647201220"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
ZVl1KyUuQSMvd0tKBx1xbxnQ_6BTGmj0YSCsJEsXk8ZaTb-qxf6Uaw==
X-Cache-Hits
0
arstechnica_richard-garriot-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1513807048/
14 KB
14 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1513807048/arstechnica_richard-garriot-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.158 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-158.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
4980853759711c8e9e2779239acd62e9e802fba38371763c65ecdd016a83fdbd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 21 May 2019 00:22:17 GMT
Via
1.1 varnish, 1.1 882f747f39885162595630c95dd0012d.cloudfront.net (CloudFront)
Age
1450174
Edge-Cache-Tag
489732375708630852448407029403767769375,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
13885
X-Request-Id
50cb21064027ad75
X-Served-By
cache-hhn1541-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 06 Jul 2018 19:56:42 GMT
Server
cloudinary
X-Timer
S1558398138.789238,VS0,VE1
ETag
"13d45a1733ad4d2f3ae707584d6a8a32"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
sWTR-SeuMd-4i-EFv44fS1Pw7iT-csU2_P4Leo6rL3H_k-kcPHs0mg==
X-Cache-Hits
1
truncated
/
408 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c21029f21dc145723d40362da85504ee5a5bd33f5db6636beae3a01c7aba1fa2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
page
t.skimresources.com/api/v2/
22 B
383 B
XHR
General
Full URL
https://t.skimresources.com/api/v2/page
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
text/plain

Response headers

pragma
no-cache
date
Tue, 12 Nov 2019 07:28:36 GMT
via
1.1 google
x-content-type-options
nosniff
server
Python/3.7 aiohttp/3.5.4
access-control-allow-headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
status
200
access-control-allow-methods
GET, POST, OPTIONS
content-type
text/plain; charset=utf-8, application/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache, must-revalidate
access-control-allow-credentials
true
alt-svc
clear
content-length
22
truncated
/ Frame 2C0D
211 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
fcc72157a72d2780d2d1811d5f618854a2ae16e0acced5cce07ea2066d3a5327

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
Cookie set /
www.medtargetsystem.com/beacon/portal/ Frame B0C5
0
0
Document
General
Full URL
https://www.medtargetsystem.com/beacon/portal/?_url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&_sid=f8a35ce4-088f-42e3-a865-ee7054814168&_vid=388b4fe4-05ef-46d5-b894-43351e369cfe&_ak=119-556-B0E9F642&_flash=false&_th=1573543716|1573543716|1
Requested by
Host: www.medtargetsystem.com
URL: https://www.medtargetsystem.com/javascript/beacon.js?v2.5.12
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.3.171.116 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-3-171-116.compute-1.amazonaws.com
Software
Apache/2.4.7 (Ubuntu) / PHP/7.0.19-1+deb.sury.org~trusty+2
Resource Hash

Request headers

Host
www.medtargetsystem.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/

Response headers

Cache-Control
no-store, no-cache, must-revalidate
Content-Encoding
gzip
Content-Type
text/html; charset=UTF-8
Date
Tue, 12 Nov 2019 07:28:36 GMT
Expires
Thu, 19 Nov 1981 08:52:00 GMT
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Pragma
no-cache
Server
Apache/2.4.7 (Ubuntu)
Set-Cookie
DMDSESSID=ol8sd0prtdv9qu8p42v7d92a14; path=/; HttpOnly
Vary
X-Forwarded-Proto,Accept-Encoding
X-Powered-By
PHP/7.0.19-1+deb.sury.org~trusty+2
Content-Length
7006
Connection
keep-alive
collect.gif
www.medtargetsystem.com/analytics/
0
313 B
Image
General
Full URL
https://www.medtargetsystem.com/analytics/collect.gif?e=1&aid=&vid=388b4fe4-05ef-46d5-b894-43351e369cfe&sid=f8a35ce4-088f-42e3-a865-ee7054814168&vh=1&vt=1573543716&pt=1573543716&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&r=&t=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea%20%7C%20Ars%20Technica&p=2555.15&pm=&ab=&ak=119-556-B0E9F642
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.3.171.116 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-3-171-116.compute-1.amazonaws.com
Software
Apache/2.4.7 (Ubuntu) / PHP/7.0.19-1+deb.sury.org~trusty+2
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:36 GMT
Server
Apache/2.4.7 (Ubuntu)
Connection
keep-alive
X-Powered-By
PHP/7.0.19-1+deb.sury.org~trusty+2
Content-Length
0
Vary
X-Forwarded-Proto
Content-Type
text/html; charset=UTF-8
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-11-12T07%3A28%3A36.862Z&_t=slot_loaded&cBr=Ars%20Technica&cKe=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cCh=information%20technology&cTi=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cCl=603&cId=1593135&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&pRt=referral&pHp=%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4200&pSw=1600&pSh=1200&uID=24123826-30dd-4bbb-9702-435db0daf0b1&sID=1d3d3211-bab1-4220-a1e5-cb3d0a824733&pID=44e31dbe-5811-4fc0-84d6-a00804b159a0&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fars.dart%2Finformation-technology%22%2C%22advertiserId%22%3A1454517775%2C%22campaignId%22%3A2338761482%2C%22creativeId%22%3A138237302059%2C%22elementId%22%3A%22native_xrail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Atrue%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Atrue%2C%22isFirstMoneyRequested%22%3Atrue%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3A4736014287%2C%22name%22%3A%22native_xrail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x140%22%2C%22slug%22%3A%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%7D&dim3=%7B%22footerStart%22%3A1573543716014%2C%22headerStart%22%3A1573543715999%2C%22navigationStart%22%3A1573543714287%2C%22pubAdsReady%22%3A1573543716299%2C%22injected%22%3A1573543716607%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A1573543716862%7D&dim4=%7B%22pos%22%3A%5B%22sponsor%22%5D%2C%22ctx_slot_type%22%3A%5B%22native_xrail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22native_xrail_0%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%220%22%5D%2C%22amznp%22%3A%5B%220%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22unsafe%22%5D%2C%22m_categories%22%3A%5B%22moat_unsafe%22%2C%22gv_crime%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%5D%2C%22cnt_tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%220lw01o%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22zlqtg4%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_GIOPHEv_0c_%22%5D%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 12 Nov 2019 07:28:36 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
tweet.a4ac5782325ad1b5e51c8b06daf47853.light.ltr.css
platform.twitter.com/css/
51 KB
12 KB
Stylesheet
General
Full URL
https://platform.twitter.com/css/tweet.a4ac5782325ad1b5e51c8b06daf47853.light.ltr.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js?_=1573543716165
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FC) /
Resource Hash
458031c1beb286b351738608cbd8513550fb9f1330a80c9b3a31ef43edde2028

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:36 GMT
Content-Encoding
gzip
Last-Modified
Tue, 22 Oct 2019 22:27:14 GMT
Server
ECS (fcn/40FC)
Etag
"280518989f85e11c9f154ac8f0c806ff+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
text/css; charset=utf-8
Content-Length
11430
tweet.a4ac5782325ad1b5e51c8b06daf47853.light.ltr.css
platform.twitter.com/css/
51 KB
51 KB
Image
General
Full URL
https://platform.twitter.com/css/tweet.a4ac5782325ad1b5e51c8b06daf47853.light.ltr.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js?_=1573543716165
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FC) /
Resource Hash

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:36 GMT
Content-Encoding
gzip
Last-Modified
Tue, 22 Oct 2019 22:27:14 GMT
Server
ECS (fcn/40FC)
Etag
"280518989f85e11c9f154ac8f0c806ff+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
text/css; charset=utf-8
Content-Length
11430
embed-api.json
player.cnevids.com/
7 KB
3 KB
Fetch
General
Full URL
https://player.cnevids.com/embed-api.json?videoId=5dc1b51838d069610fb0def7&embedLocation=arstechnica
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5dc1b51838d069610fb0def7.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady45454152
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.78.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-78-104.fra2.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
b4d4eda16ab407882cd944569ee0acb3596eccbca8a4622607561accaa6c548b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:16 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Amz-Cf-Pop
FRA2-C2
X-Cache
Hit from cloudfront
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
2147
X-XSS-Protection
1; mode=block
X-Request-Id
5c98ad59-834e-44b7-9588-4d2b6b95c404
X-Runtime
0.012028
X-Backend-Node
10.110.29.24
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"d9c44deb3a6e5b1d7c8d72559b723758"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Access-Control-Allow-Methods
GET, OPTIONS
Content-Type
application/json; charset=utf-8
Via
1.1 882f747f39885162595630c95dd0012d.cloudfront.net (CloudFront)
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
Access-Control-Allow-Origin
*
X-Amz-Cf-Id
qt9wzrE7D-o8OTNJyke4Dkd7cKO5uSGcjZ3q0Djttyt91CtM7JUNmg==
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame F7D1
272 KB
93 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5dc1b51838d069610fb0def7.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady45454152
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
c58f14308af66b5948015e9283fbe38f7c165f71107041ce658d53c4fe81e095
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
94735
x-xss-protection
0
expires
Tue, 12 Nov 2019 07:28:36 GMT
gpt_proxy.js
imasdk.googleapis.com/js/sdkloader/
74 KB
27 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/gpt_proxy.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5dc1b51838d069610fb0def7.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady45454152
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
71d4fd8415168b5b5fac270c431fad548c3bf62f0a0231463f2bcb2c63093fe0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:16:44 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 11 Nov 2019 20:12:16 GMT
server
sffe
age
712
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27180
x-xss-protection
0
expires
Tue, 12 Nov 2019 07:31:44 GMT
player-style-3b3a013ac40046610e8f2fefe02c3b07.css
d2c8v52ll5s99u.cloudfront.net/player/ Frame F7D1
74 KB
12 KB
Stylesheet
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-3b3a013ac40046610e8f2fefe02c3b07.css
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5dc1b51838d069610fb0def7.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady45454152
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.211 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-211.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
596b76b93c7801ba85fb53f2f6e2281d4dbffc96ddc18bb056e8cb0e94be34fd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 24 Oct 2019 21:41:15 GMT
Content-Encoding
gzip
Age
1590442
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
11365
Last-Modified
Wed, 05 Jun 2019 16:03:54 GMT
Server
AmazonS3
ETag
"cff060eda5015972d532696ec91d375b"
Content-Type
text/css; charset=utf-8
Via
1.1 adb1b226e6965f6206603ba087bd4a0a.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
X-Amz-Cf-Id
Kq-IOmGrrhMri7xsq9jZ6OP9Ixx0tfCffn6CDy03tNE3-cOS8sLUwA==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
main-cab2b85e1b200eef70e6.js
d2c8v52ll5s99u.cloudfront.net/player/ Frame F7D1
915 KB
230 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5dc1b51838d069610fb0def7.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady45454152
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.211 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-211.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
ccdae88a27f5cdd02c7c8e2525a1eeca05eb0a1cf0efd524379091a7ed2a6ede

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 24 Oct 2019 22:18:05 GMT
Content-Encoding
gzip
Age
1588232
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
234888
Last-Modified
Thu, 10 Oct 2019 18:39:09 GMT
Server
AmazonS3
ETag
"ba04c8e2bdec7ec3d534dc59cce1c2f4"
Content-Type
application/javascript
Via
1.1 f046bfa1468bb4385e357c8c9128cf51.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
X-Amz-Cf-Id
4c6DDbpBCOYBH-1CBnGca_ci8-7fo2ZfrOVoWQdGoxaISdUO1qLR5w==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
f2XJwbPb_normal.jpg
pbs.twimg.com/profile_images/1186662491935260672/
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/1186662491935260672/f2XJwbPb_normal.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41AE) /
Resource Hash
06839cb3cd2581780fbb4f63e123e52301ff8ff25449276d26ba11c13b167c9c
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
x-content-type-options
nosniff
x-cache
HIT
status
200
content-length
2111
x-response-time
121
surrogate-key
profile_images profile_images/bucket/6 profile_images/1186662491935260672
last-modified
Tue, 22 Oct 2019 15:13:59 GMT
server
ECS (fcn/41AE)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
0f925bc052fca746b3ab75489de5d13b
accept-ranges
bytes
EH-oECEVUAA-FXE
pbs.twimg.com/media/
19 KB
19 KB
Image
General
Full URL
https://pbs.twimg.com/media/EH-oECEVUAA-FXE?format=jpg&name=small
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/418E) /
Resource Hash
ba584a1f12efcf17f424b1684d23bd833e241e24b720d51e021bdd8d6c8e5661
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
x-content-type-options
nosniff
x-cache
HIT
status
200
content-length
19584
x-response-time
119
surrogate-key
media media/bucket/1 media/1188853613877088256
last-modified
Mon, 28 Oct 2019 16:20:44 GMT
server
ECS (fcn/418E)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
9b388f5d9f8b5922b0ab8d8b6cac65dc
accept-ranges
bytes
truncated
/
825 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4468e35646c229b518e5f398c5a3d6b15ba1351a71ef22692129bb32f5030ac0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
572 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0341a4478ce861ef85c819b913fa0a2501836a6a2ffda8643e95e39f4a2a7de0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
512 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
49c2a3cf0f363bf387c06a35a4a4e6c7255799b3776bed55914862136d783028

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
600 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c50a17e8272b9359e4b62e0f305e201f359cb5bd2245671c115d031f2b7f68d0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
323 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c3531ed2c934e5daee80955db42a0245d666131e6322c6ec6985992922520ab4

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
73e65bd2-e7a6-4f25-aa0d-6a0f88d349b3
https://arstechnica.com/ Frame F7D1
31 B
0
Other
General
Full URL
blob:https://arstechnica.com/73e65bd2-e7a6-4f25-aa0d-6a0f88d349b3
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7725538fe2f71147bffeba7452b434c826aef9009666cb4360c605d0b2a91d1d

Request headers

Sec-Fetch-Mode
same-origin
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
31
Content-Type
application/javascript
user
4d.condenastdigital.com/
67 B
402 B
XHR
General
Full URL
https://4d.condenastdigital.com/user?xid=74be3589-9f80-4fa6-bf90-9f810acd026d
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.231.252.38 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-231-252-38.compute-1.amazonaws.com
Software
/
Resource Hash
db38b083f71ab7c9d42fafa0a9b6a3df74bdaf60e7d29cc5d100edc9dfd52d9f

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

Date
Tue, 12 Nov 2019 07:28:37 GMT
content-encoding
gzip
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
Content-Length
82
get
odb.outbrain.com/utils/
15 KB
10 KB
Script
General
Full URL
https://odb.outbrain.com/utils/get?url=http%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&srcUrl=http%3A%2F%2Ffeeds.arstechnica.com%2Farstechnica%2Findex%2F&settings=true&recs=true&widgetJSId=JS_1&key=NANOWDGT01&idx=0&version=104076&apv=false&sig=nNUlXP3R&format=vjapi&va=true&rand=73600&pdobuid=-1&osLang=en-US&winW=1600&winH=1200&scrW=1600&scrH=1200&adblck=false&secured=true&cmpStat=1&ref=
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573543716164
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
88260c2fbd59c37cd26be6adde22704d7c80e4e029a3db00ed40dbf9a1dc387c
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=0; includeSubDomains;
content-encoding
gzip
traffic-path
NYDC1, JFK, FRA, Europe1
x-cache
MISS, MISS
p3p
policyref="http://www.outbrain.com/w3c/p3p.xml",CP="NOI NID CURa DEVa TAIa PSAa PSDa OUR IND UNI"
status
200
x-cache-hits
0, 0
x-traceid
f519c962219f6b39ba635947811889b8
content-length
9042
x-served-by
cache-jfk8130-JFK, cache-fra19138-FRA
pragma
no-cache
x-timer
S1573543717.038379,VS0,VE156
date
Tue, 12 Nov 2019 07:28:37 GMT
vary
Accept-Encoding, User-Agent
content-type
text/x-json; charset=UTF-8
via
1.1 varnish, 1.1 varnish
cache-control
no-cache
backend-ip
104.156.90.30
accept-ranges
bytes, bytes
expires
Thu, 01 Jan 1970 00:00:00 GMT
sf-ui-display-medium-webfont.woff2
d2c8v52ll5s99u.cloudfront.net/assets/fonts/ Frame F7D1
29 KB
30 KB
Font
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/assets/fonts/sf-ui-display-medium-webfont.woff2
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.211 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-211.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
d281c9d6bae645f3da6d2f0769a2cf0668709fd28e2021ce74821cdd8c7117b3

Request headers

Sec-Fetch-Mode
cors
Referer
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-3b3a013ac40046610e8f2fefe02c3b07.css
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:38 GMT
Content-Encoding
gzip
Vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
X-Amz-Cf-Pop
FRA2-C1
X-Cache
RefreshHit from cloudfront
Connection
keep-alive
Content-Length
29632
Access-Control-Allow-Origin
*
Last-Modified
Mon, 26 Jun 2017 15:24:42 GMT
Server
AmazonS3
ETag
"7d18db04f980971f2a9c5026bbc34bed"
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET
Content-Type
application/font-woff2
Via
1.1 c28c128e9402fb070daca09bab68490a.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
Accept-Ranges
bytes
X-Amz-Cf-Id
iFyqey_Tp3OC-m3Ru0YWeKWarUypjExujcE8NGiolDnZFmkqjpzXtA==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
bridge3.349.0_en.html
imasdk.googleapis.com/js/core/ Frame EDDB
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.349.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.349.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
195303
date
Mon, 11 Nov 2019 22:52:13 GMT
expires
Tue, 10 Nov 2020 22:52:13 GMT
last-modified
Mon, 11 Nov 2019 20:08:18 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
30984
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
client.js
s0.2mdn.net/instream/video/ Frame F7D1
26 KB
11 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10523
x-xss-protection
0
expires
Tue, 12 Nov 2019 07:28:37 GMT
integrator.js
adservice.google.com/adsid/ Frame F7D1
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 12 Nov 2019 07:28:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
fbevents.js
connect.facebook.net/en_US/ Frame F7D1
122 KB
27 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
981be39924f4c8320f4daa8b8cdd7468455e46a30bd0cfef24ba5c74c2a6b12d
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-23=":443"; ma=3600
content-length
27377
x-xss-protection
0
pragma
public
x-fb-debug
H2hHDBq9D1G+z5ImZdQkERsUJN/g0hVfUIEXCPoCPM30xYQ/aw8aY4wIfil9vgH9c+2QKiF9cH7M26CMAlfYCw==
x-fb-trip-id
420120009
x-frame-options
DENY
date
Tue, 12 Nov 2019 07:28:37 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
expires
Sat, 01 Jan 2000 00:00:00 GMT
comscore-min.js
d2c8v52ll5s99u.cloudfront.net/player/ Frame F7D1
38 KB
11 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/comscore-min.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.211 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-211.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
833a86642252016b29f08dd45ffd27f9e00ca237f28d8c5f0147a6e15d009377

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:26:58 GMT
Content-Encoding
gzip
Last-Modified
Wed, 24 May 2017 18:19:15 GMT
Server
AmazonS3
Age
100
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
text/javascript
Via
1.1 f046bfa1468bb4385e357c8c9128cf51.cloudfront.net (CloudFront)
Connection
keep-alive
Transfer-Encoding
chunked
X-Amz-Cf-Pop
FRA2-C1
X-Amz-Cf-Id
mz0nI0R84qCtp-ipfBF1lZr1RbMUUeMDbZom9xIZkgtVJpok5XDMow==
collect
www.google-analytics.com/r/
35 B
128 B
Other
General
Full URL
https://www.google-analytics.com/r/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Tue, 12 Nov 2019 07:28:37 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
image/gif
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
track
capture.condenastdigital.com/ Frame F7D1
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-11-12T07%3A28%3A37.030Z&_c=&_t=Player%20Requested&sID=1d3d3211-bab1-4220-a1e5-cb3d0a824733&pID=44e31dbe-5811-4fc0-84d6-a00804b159a0&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 12 Nov 2019 07:28:37 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
arstechnica_unsolved-mysteries-bioware-answers-unsolved-mysteries-of-the-mass-effect-universe.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1573140819/ Frame F7D1
49 KB
50 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1573140819/arstechnica_unsolved-mysteries-bioware-answers-unsolved-mysteries-of-the-mass-effect-universe.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.158 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-158.fra2.r.cloudfront.net
Software
Cloudinary /
Resource Hash
71d89f0dd3b569f9a6858211e8642c552c2c912b31a557bbc10dc547f1895bc2
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 07 Nov 2019 16:08:35 GMT
Via
1.1 ff2bcb2d3b4a3d9e0615ddd1033c38c4.cloudfront.net (CloudFront)
Age
400062
X-Cache
Hit from cloudfront
Server-Timing
cloudinary;dur=92;start=2019-11-07T16:08:35.772Z,cld-id;desc=b3c7187db2ece50e8dbff52bb40664f6,fastly;dur=1;total=210;start=2019-11-07T16:08:35.730Z;desc=MISS,rtt;dur=0
Connection
keep-alive
Content-Length
50148
X-Request-Id
b3c7187db2ece50e8dbff52bb40664f6
X-Cloud-Name
heru80fdn
Last-Modified
Thu, 07 Nov 2019 16:08:07 GMT
Server
Cloudinary
ETag
"128062506d2fde144ee63960d39f2acc"
Strict-Transport-Security
max-age=604800
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Server-Timing
Cache-Control
public, no-transform, immutable, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
ydvhM6OAB3mfLYmiCVpoujJulXX_I299MzyT2jZWxf14XOc4oCKziQ==
wt
polarcdn-pentos.com/ Frame 2C0D
3 B
196 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=3&n=3&p=UNKNOWN&s=1&u=11ee2d43-f5bc-4447-8d68-364b94f86e8e&v=2%2F85bc8a5&w=1.163.0&y=w&z=v1.6.48&pas=asa-web-polarpmp&pag1=conde_customcontent_market&pag2=brand_arstechnica&paenb=y&paena=a.146247b2-41d1-4ece-bde8-8fd886aa0625.154c05&paensm=n&pai=91775&d=arstechnica.com&l=&pajs=&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&paio=1&pasb=1&cu=fb2d10b26919e25e37e4841e4787291b&t=arx&parcid=ab918&parid=a6342&parin=2&partm=1&par=s&maxts=0.393&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&_=1573543716742
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.192.78 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Tue, 12 Nov 2019 07:28:37 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
age
46069
cf-ray
5346ca485b4096d4-FRA
status
200
content-length
3
x-amz-id-2
fdX907fwNt8pr3tw3gr73uFQXky3viGiZTMtdYbPcadu4V04bAegc8VyKwcCSRJX1hpdYoYX62c=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
x-amz-request-id
E1FE302C79362616
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
content-type
application/octet-stream
285cc2225c44438eb78595c34189e2e8
polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/creative/ Frame 2C0D
15 KB
4 KB
XHR
General
Full URL
https://polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/creative/285cc2225c44438eb78595c34189e2e8?order=4416eecf72b543d28b6f8d24b6338e52
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
47f34e035ebf85db17405bbfeb0b865817ebbb45197d66683ae3df57e67fb0e5

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

timing-allow-origin
*
date
Tue, 12 Nov 2019 07:28:37 GMT
content-encoding
gzip
server
cloudflare
status
200
etag
W/"7c090597a8da8578746fa7d95487c565"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-Country, CF-Ray
cache-control
max-age=900
x-country
DE
cf-ray
5346ca485a3359f4-VIE
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-11-12T07%3A28%3A37.182Z&_t=pageview&cBr=Ars%20Technica&cKe=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cCh=information%20technology&cTi=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208&cEnt=malware%2C%20pukhraj%20singh%2C%20india%2C%20page%20layout%2C%20indian%2C%20kudankulam%20nuclear%20power%20plant%2C%20north%20korea%2C%20nuclear%20reactor%2C%20cyber%20attack%2C%20nuke%2C%20kudankulam%2C%20kknpp%2C%20dtrack%2C%20virustotal%2C%20sean%20gallagher%2C%20tweet%2C%20utc%2C%20russia%2C%20n.%20korea%2C%20hard-code&cEnw=1%2C%200.8255536731720152%2C%200.8201141909758349%2C%200.75492212464432%2C%200.7341758074191788%2C%200.6714534723000154%2C%200.6687820840003413%2C%200.6650238496076891%2C%200.6530561133369807%2C%200.650136661350706%2C%200.6354726487306158%2C%200.5843496852891271%2C%200.554155780228185%2C%200.48718460536731334%2C%200.46683186332244486%2C%200.4631320408912447%2C%200.4310110895429227%2C%200.42888257765169263%2C%200.4165649852936842%2C%200.41446991250354753&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cCl=603&cId=1593135&cPd=2019-10-29T15%3A47%3A47.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&pRt=referral&pHp=%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4900&pSw=1600&pSh=1200&uID=24123826-30dd-4bbb-9702-435db0daf0b1&sID=1d3d3211-bab1-4220-a1e5-cb3d0a824733&pID=44e31dbe-5811-4fc0-84d6-a00804b159a0&uDt=desktop&_o=ars-technica&_c=general&xID=74be3589-9f80-4fa6-bf90-9f810acd026d&cKh=malware%2Cpukhraj%20singh%2Cindia%2Cpage%20layout%2Cindian%2Ckudankulam%20nuclear%20power%20plant%2Cnorth%20korea%2Cnuclear%20reactor%2Ccyber%20attack%2Cnuke%2Ckudankulam%2Ccontrol%2Chttps%3A%2F%2Ft.co%2Frfateoszrw%20pic.twitter.com%2Fomvvmwizsi%2C%E2%80%94
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 12 Nov 2019 07:28:37 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
e7c3fdc9-9831-4d1e-a1cb-2368aa6f9f56thumbs.mp4
dp8hsntg6do36.cloudfront.net/5dc1b51838d069610fb0def7/ Frame F7D1
64 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5dc1b51838d069610fb0def7/e7c3fdc9-9831-4d1e-a1cb-2368aa6f9f56thumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.49 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-49.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-

Response headers

Date
Tue, 12 Nov 2019 04:37:04 GMT
Via
1.1 3aed5a4f89d72775aaf2cc5a5f642386.cloudfront.net (CloudFront)
Last-Modified
Wed, 06 Nov 2019 23:20:17 GMT
Server
AmazonS3
Age
10294
ETag
"e55a3f50fc301b262d93bc76355d4109"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 0-2716045/2716046
Connection
keep-alive
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
Content-Length
2716046
X-Amz-Cf-Id
UcMjOCEbn6lwB6_LNwt-nUDaL_GUnMmh_5on6xcKBubrh6n55EsFOQ==
e7c3fdc9-9831-4d1e-a1cb-2368aa6f9f56thumbs.mp4
dp8hsntg6do36.cloudfront.net/5dc1b51838d069610fb0def7/ Frame F7D1
64 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5dc1b51838d069610fb0def7/e7c3fdc9-9831-4d1e-a1cb-2368aa6f9f56thumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.49 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-49.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-

Response headers

Date
Tue, 12 Nov 2019 04:37:04 GMT
Via
1.1 9568a708c8ab21597698ebe7dce6c42e.cloudfront.net (CloudFront)
Last-Modified
Wed, 06 Nov 2019 23:20:17 GMT
Server
AmazonS3
Age
10294
ETag
"e55a3f50fc301b262d93bc76355d4109"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 0-2716045/2716046
Connection
keep-alive
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
Content-Length
2716046
X-Amz-Cf-Id
6NuxLl-NXrJzpKINiucDXvpq8K7Pqb8q3Q5SZfCoUkeQy2hfVUpAQQ==
/
www.facebook.com/tr/
0
105 B
Other
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
multipart/form-data; boundary=----WebKitFormBoundaryktcw7Gl7ql3AXA9v

Response headers

strict-transport-security
max-age=31536000; includeSubDomains
server
proxygen-bolt
date
Tue, 12 Nov 2019 07:28:37 GMT
status
200
content-type
text/plain
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
alt-svc
h3-23=":443"; ma=3600
content-length
0
track
capture.condenastdigital.com/ Frame F7D1
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-11-12T07%3A28%3A37.217Z&_c=Player%20Event&_t=Player%20Loaded&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=https%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Funsolved-mysteries-bioware-answers-unsolved-mysteries-of-the-mass-effect-universe%2F&cId=5dc1b51838d069610fb0def7&cKe=bioware%2Cmass%20effect%2Cmass%20effect%202%2Cvideo%20game%2Cvideo%20games%2Cvideogame&cPd=2019-11-07T16%3A00%3A00%2B00%3A00&cTi=Bioware%20Answers%20Unsolved%20Mysteries%20of%20the%20Mass%20Effect%20Universe&mDu=857&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pID=44e31dbe-5811-4fc0-84d6-a00804b159a0&pWw=540&pWh=303.75&sID=1d3d3211-bab1-4220-a1e5-cb3d0a824733&uId=24123826-30dd-4bbb-9702-435db0daf0b1&xid=74be3589-9f80-4fa6-bf90-9f810acd026d&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22gitBranch%22%3A%22master%22%2C%22gitSha%22%3A%22e42798c%22%2C%22guid%22%3A%221ea4b3d6-e3b3-957b-4661-ed4a221fdb10%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A3625.046875%2C%22playerType%22%3A%22video-continuous%22%2C%22playsOnPage%22%3A0%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22isRightRail%22%3Afalse%2C%22tabStatus%22%3A%22active%22%2C%22versoPageType%22%3A%22article%7Creport%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3Anull%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%2C%22podIndex%22%3A%22%22%7D&adId=&pageType=article%7Creport
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 12 Nov 2019 07:28:37 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
1015b07a-009f-4158-a315-0fff532d07fd
https://arstechnica.com/ Frame F7D1
5 KB
0
Other
General
Full URL
blob:https://arstechnica.com/1015b07a-009f-4158-a315-0fff532d07fd
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d5f3418a3fa657175d5341b5e032be036cb4d5818de5d1497f2175be5a7e3701

Request headers

Sec-Fetch-Mode
same-origin
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
5463
Content-Type
application/javascript
e7c3fdc9-9831-4d1e-a1cb-2368aa6f9f56manifest-ios.m3u8
dp8hsntg6do36.cloudfront.net/5dc1b51838d069610fb0def7/ Frame F7D1
918 B
1 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5dc1b51838d069610fb0def7/e7c3fdc9-9831-4d1e-a1cb-2368aa6f9f56manifest-ios.m3u8?videoIndex=0&requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.49 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-49.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
9741644f013c8e233a6f7321317d3ae4471eea1d1da7f132017ce5b7b9303487

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 11 Nov 2019 16:20:09 GMT
Via
1.1 f7bf326347bdd7f275a38a22b5b83724.cloudfront.net (CloudFront)
Vary
Origin
Age
54509
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
918
Last-Modified
Wed, 06 Nov 2019 23:18:10 GMT
Server
AmazonS3
ETag
"0ccb06452fda3053393797833a795a70"
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
X-Amz-Cf-Id
fLD2stKmvd-C6HuM2_srfpCx-6SK8I8VshiB5WRoOJzXhkL4nbo2Ew==
wt
polarcdn-pentos.com/ Frame 2C0D
3 B
67 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=4&n=3&p=NA-ARSTECH-11238837&s=1&u=11ee2d43-f5bc-4447-8d68-364b94f86e8e&v=2%2F85bc8a5&w=1.163.0&y=w&z=v1.6.48&pas=asa-web-polarpmp&pag1=conde_customcontent_market&pag2=brand_arstechnica&paenb=y&paena=a.146247b2-41d1-4ece-bde8-8fd886aa0625.154c05&paenli=19cd92073d5649d39973010253748202&paenlip=d57b9684eb874247863be631fb7330bc&paeno=4416eecf72b543d28b6f8d24b6338e52&paenop=0e57501a9cdf4b33afca49250c7f2cb7&paes=fd9a1a7c3cf24f9fb674bbc3a4ebe163&paensm=n&pai=91775&d=arstechnica.com&l=Key-native_xrail+%5BXrail%5D&pajs=body&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&paio=1&pasb=1&pecy=DE&c=6762b7856fcd42378e5b20fd4366b18d&pacexp=4bc9fa3cc3374618b6865834454d7649&t=i&pasp=6fe1dded4b5f4d1a8a01dfa8492cbdab&papss=a&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&_=1573543716743
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.192.78 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Tue, 12 Nov 2019 07:28:37 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
age
46069
cf-ray
5346ca48dbc096d4-FRA
status
200
content-length
3
x-amz-id-2
fdX907fwNt8pr3tw3gr73uFQXky3viGiZTMtdYbPcadu4V04bAegc8VyKwcCSRJX1hpdYoYX62c=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
x-amz-request-id
E1FE302C79362616
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
content-type
application/octet-stream
5d8d49f8524942ba3c926f8a
polarcdn-terrax.com/image/v1.0.0/bin/
12 KB
12 KB
Image
General
Full URL
https://polarcdn-terrax.com/image/v1.0.0/bin/5d8d49f8524942ba3c926f8a?v=b358a&w=300
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
10cf364a79836a5c60cd9961144a421685179cebf58fc43d108c40a3a1503a9c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:37 GMT
via
1.1 varnish
vary
Accept-Encoding
cf-cache-status
HIT
age
81495
status
200
content-type
image/jpeg
content-length
12085
timing-allow-origin
*
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
432000
access-control-allow-methods
GET
x-varnish
1713424332 1713195372
access-control-allow-origin
*
cache-control
public, max-age=432000
accept-ranges
bytes
cf-ray
5346ca48d8408c98-VIE
1663130473914833
connect.facebook.net/signals/config/ Frame F7D1
306 KB
75 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/1663130473914833?v=2.9.11&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
20fcb54780ee2bff8d22a98ea582b72dcbf41fa5338dc5c2bbfb31cdfb89b740
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-23=":443"; ma=3600
content-length
75873
x-xss-protection
0
pragma
public
x-fb-debug
4cX8S84NG1WIYUTMXYkw7THXKfdvNbjGMxfqdFAidt3FhXVgbAX7n1WI+UGE625nU4ZM1m3eBDfjQmb6+zD9UQ==
x-fb-trip-id
420120009
x-frame-options
DENY
date
Tue, 12 Nov 2019 07:28:37 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
store
match.deepintent.com/usersync/114/
0
365 B
Image
General
Full URL
https://match.deepintent.com/usersync/114/store?id=UNK&ext1=f8a35ce4-088f-42e3-a865-ee7054814168
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
3.234.94.61 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-3-234-94-61.compute-1.amazonaws.com
Software
envoy /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:37 GMT
x-envoy-upstream-service-time
1
server
envoy
content-type
image/gif
content-length
0
p3p
policyref='http://cdn.deepintent.com/p3p.xml', CP='NON CUR DEV TAI'
arstechnica_unsolved-mysteries-bioware-answers-unsolved-mysteries-of-the-mass-effect-universe.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1573140819/ Frame F7D1
49 KB
50 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1573140819/arstechnica_unsolved-mysteries-bioware-answers-unsolved-mysteries-of-the-mass-effect-universe.jpg
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.158 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-158.fra2.r.cloudfront.net
Software
Cloudinary /
Resource Hash
71d89f0dd3b569f9a6858211e8642c552c2c912b31a557bbc10dc547f1895bc2
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 07 Nov 2019 16:08:35 GMT
Via
1.1 71dbd5706c5b0c7b733248e1171f2d4f.cloudfront.net (CloudFront)
Age
400062
X-Cache
Hit from cloudfront
Server-Timing
cloudinary;dur=92;start=2019-11-07T16:08:35.772Z,cld-id;desc=b3c7187db2ece50e8dbff52bb40664f6,fastly;dur=1;total=210;start=2019-11-07T16:08:35.730Z;desc=MISS,rtt;dur=0
Connection
keep-alive
Content-Length
50148
X-Request-Id
b3c7187db2ece50e8dbff52bb40664f6
X-Cloud-Name
heru80fdn
Last-Modified
Thu, 07 Nov 2019 16:08:07 GMT
Server
Cloudinary
ETag
"128062506d2fde144ee63960d39f2acc"
Strict-Transport-Security
max-age=604800
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Server-Timing
Cache-Control
public, no-transform, immutable, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
m8pxJdtr47_M62iDroVeIw6Tw1xxD179EYmZPQpf4drVIQBfWv3Hjg==
arstechnica_unsolved-mysteries-bioware-answers-unsolved-mysteries-of-the-mass-effect-universe.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1573140819/ Frame F7D1
49 KB
50 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1573140819/arstechnica_unsolved-mysteries-bioware-answers-unsolved-mysteries-of-the-mass-effect-universe.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.84.158 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-84-158.fra2.r.cloudfront.net
Software
Cloudinary /
Resource Hash
71d89f0dd3b569f9a6858211e8642c552c2c912b31a557bbc10dc547f1895bc2
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 07 Nov 2019 16:08:35 GMT
Via
1.1 ff2bcb2d3b4a3d9e0615ddd1033c38c4.cloudfront.net (CloudFront)
Age
400062
X-Cache
Hit from cloudfront
Server-Timing
cloudinary;dur=92;start=2019-11-07T16:08:35.772Z,cld-id;desc=b3c7187db2ece50e8dbff52bb40664f6,fastly;dur=1;total=210;start=2019-11-07T16:08:35.730Z;desc=MISS,rtt;dur=0
Connection
keep-alive
Content-Length
50148
X-Request-Id
b3c7187db2ece50e8dbff52bb40664f6
X-Cloud-Name
heru80fdn
Last-Modified
Thu, 07 Nov 2019 16:08:07 GMT
Server
Cloudinary
ETag
"128062506d2fde144ee63960d39f2acc"
Strict-Transport-Security
max-age=604800
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Server-Timing
Cache-Control
public, no-transform, immutable, max-age=2592000
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
1eVInV0mWzaTStvY5fOrN1ewpvBBZ4yulb-ZAljX_eWDj9z-TAeQNA==
en.json
cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910/
2 MB
56 KB
XHR
General
Full URL
https://cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910/en.json
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8FC0) /
Resource Hash
78cd04fb6105663f1a4c8e2f5f84dcdb587538099ec39649650413be9192189f

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Tue, 12 Nov 2019 07:28:37 GMT
content-encoding
gzip
content-md5
UdlEsANpKQXq7xgcAcUyLg==
x-cache
HIT
status
200
content-length
56953
x-ms-lease-status
unlocked
last-modified
Mon, 11 Nov 2019 17:56:43 GMT
server
ECAcc (frc/8FC0)
etag
0x8D766D08355F3C9
vary
Accept-Encoding
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
b348a61e-801e-0107-5027-996836000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Tue, 12 Nov 2019 11:28:37 GMT
countrycode
geolocation.onetrust.com/cookieconsentpub/v1/geo/
27 B
320 B
Script
General
Full URL
https://geolocation.onetrust.com/cookieconsentpub/v1/geo/countrycode
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:b944 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
5c2b6fa954e718b3b0a28d55a5923ac82b3da98d65878fe86b550514b3bcd7a5

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:37 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json
status
200
cf-ray
5346ca49597f8c92-VIE
content-length
27
e7c3fdc9-9831-4d1e-a1cb-2368aa6f9f56file-1422k-128-48000-768.m3u8
dp8hsntg6do36.cloudfront.net/5dc1b51838d069610fb0def7/ Frame F7D1
11 KB
1 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5dc1b51838d069610fb0def7/e7c3fdc9-9831-4d1e-a1cb-2368aa6f9f56file-1422k-128-48000-768.m3u8?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.49 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-49.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
fe29e64016b3c5070c5e55b4fc2c0ba38036e61fa0f6a305e8d7aa3b22d57c83

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 11 Nov 2019 16:20:09 GMT
Content-Encoding
gzip
Vary
Origin
Age
54509
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Access-Control-Allow-Origin
*
Last-Modified
Wed, 06 Nov 2019 23:22:33 GMT
Server
AmazonS3
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Via
1.1 f7bf326347bdd7f275a38a22b5b83724.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
X-Amz-Cf-Id
u67SDwyZkif94jYBRDN07TC-nskA_k7u97M-MHunIhhlrwo38DokVA==
57
p.ad.gt/api/v1/p/
23 KB
8 KB
Script
General
Full URL
https://p.ad.gt/api/v1/p/57
Requested by
Host: a.ad.gt
URL: https://a.ad.gt/api/v1/u/matches/57
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.210.147.177 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-210-147-177.us-west-2.compute.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
650cee63dd80d2427513d23cb912429fd5b828bcd7a7d21f4e162b5357caa310

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:37 GMT
content-encoding
gzip
last-modified
Fri, 08 Nov 2019 02:56:28 GMT
server
nginx/1.14.1
etag
W/"1573181788.0-24002-2545748540"
status
200
access-control-allow-methods
GET, POST, OPTIONS
content-type
application/javascript
access-control-allow-origin
*
access-control-expose-headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Range,Range
cache-control
public, max-age=43200
access-control-allow-headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Range,Range
expires
Tue, 12 Nov 2019 19:28:37 GMT
match
ids.ad.gt/api/v1/
Redirect Chain
  • https://secure.adnxs.com/getuid?https://ids.ad.gt/api/v1/match?id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3&adnxs_id=$UID
  • https://secure.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fmatch%3Fid%3D72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3%26adnxs_id%3D%24UID
  • https://ids.ad.gt/api/v1/match?id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3&adnxs_id=3324277335898742735
43 B
593 B
Image
General
Full URL
https://ids.ad.gt/api/v1/match?id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3&adnxs_id=3324277335898742735
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.209.112.70 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-209-112-70.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:38 GMT
Cache-Control
public, max-age=43200
Expires
Tue, 12 Nov 2019 19:28:38 GMT
Server
nginx/1.8.1
Connection
keep-alive
Content-Length
43
Content-Type
image/gif

Redirect headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:39 GMT
X-Proxy-Origin
144.76.109.30; 144.76.109.30; 318.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.223.85:80
AN-X-Request-Uuid
981051b3-00c2-4efc-8725-65cf05a53d4e
Server
nginx/1.13.4
Access-Control-Allow-Origin
*
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Location
https://ids.ad.gt/api/v1/match?id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3&adnxs_id=3324277335898742735
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
t_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=8gkxb6n&ttd_tpi=1&gpdr=0&ttd_puid=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3
  • https://ids.ad.gt/api/v1/t_match?tdid=9b012699-d85e-4715-92c3-9b5bef93f1de&id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3
43 B
603 B
Image
General
Full URL
https://ids.ad.gt/api/v1/t_match?tdid=9b012699-d85e-4715-92c3-9b5bef93f1de&id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.209.112.70 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-209-112-70.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:38 GMT
Cache-Control
public, max-age=43200
Expires
Tue, 12 Nov 2019 19:28:38 GMT
Server
nginx/1.8.1
Connection
keep-alive
Content-Length
43
Content-Type
image/gif

Redirect headers

pragma
no-cache
date
Tue, 12 Nov 2019 07:28:37 GMT
x-aspnet-version
4.0.30319
status
302
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
location
https://ids.ad.gt/api/v1/t_match?tdid=9b012699-d85e-4715-92c3-9b5bef93f1de&id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3
cache-control
private,no-cache, must-revalidate
content-type
text/html
content-length
259
pbm_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3D72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?ird=1&rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3D72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3
  • https://ids.ad.gt/api/v1/pbm_match?pbm=8AAFAA19-4C1D-477B-8296-A063ACEDD4C8&id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3
43 B
622 B
Image
General
Full URL
https://ids.ad.gt/api/v1/pbm_match?pbm=8AAFAA19-4C1D-477B-8296-A063ACEDD4C8&id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.209.112.70 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-209-112-70.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:38 GMT
Cache-Control
public, max-age=43200
Expires
Tue, 12 Nov 2019 19:28:38 GMT
Server
nginx/1.8.1
Connection
keep-alive
transfer-encoding
chunked
Content-Type
image/gif

Redirect headers

Location
https://ids.ad.gt/api/v1/pbm_match?pbm=8AAFAA19-4C1D-477B-8296-A063ACEDD4C8&id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3
Date
Tue, 12 Nov 2019 07:28:37 GMT
X-Cnection
close
Server
Apache/2.2.24 (Unix) mod_ssl/2.2.24 OpenSSL/1.0.0-fips mod_fastcgi/2.4.6
P3P
CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Content-Length
438
Content-Type
text/html; charset=iso-8859-1
g_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://cm.g.doubleclick.net/pixel?google_nid=audigent_w_appnexus_3985&google_cm&google_sc&google_ula=450542624&id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3
  • https://ids.ad.gt/api/v1/g_match?id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3&google_gid=CAESEH7fYlrmz-ww6ddg09eEsZs&google_cver=1&google_ula=450542624,0
43 B
601 B
Image
General
Full URL
https://ids.ad.gt/api/v1/g_match?id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3&google_gid=CAESEH7fYlrmz-ww6ddg09eEsZs&google_cver=1&google_ula=450542624,0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.209.112.70 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-209-112-70.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:38 GMT
Cache-Control
public, max-age=43200
Expires
Tue, 12 Nov 2019 19:28:38 GMT
Server
nginx/1.8.1
Connection
keep-alive
Content-Length
43
Content-Type
image/gif

Redirect headers

pragma
no-cache
date
Tue, 12 Nov 2019 07:28:37 GMT
server
HTTP server (unknown)
status
302
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
location
https://ids.ad.gt/api/v1/g_match?id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3&google_gid=CAESEH7fYlrmz-ww6ddg09eEsZs&google_cver=1&google_ula=450542624,0
cache-control
no-cache, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
357
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
son_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://sync.go.sonobi.com/us?https://ids.ad.gt/api/v1/son_match?id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3&uid=[UID]
  • https://ids.ad.gt/api/v1/son_match?id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3&uid=b9379ee7-c2c5-452e-9333-8ea930efc68e
43 B
603 B
Image
General
Full URL
https://ids.ad.gt/api/v1/son_match?id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3&uid=b9379ee7-c2c5-452e-9333-8ea930efc68e
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.209.112.70 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-209-112-70.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:38 GMT
Cache-Control
public, max-age=43200
Expires
Tue, 12 Nov 2019 19:28:38 GMT
Server
nginx/1.8.1
Connection
keep-alive
Content-Length
43
Content-Type
image/gif

Redirect headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:37 GMT
Server
sonobi-go
Vary
negotiate,Accept-Encoding
X-Go-Server
xcp-ams-1-7-9
P3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Location
https://ids.ad.gt/api/v1/son_match?id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3&uid=b9379ee7-c2c5-452e-9333-8ea930efc68e
Cache-Control
no-cache, no-store, private
Tcn
Choice
Content-Type
text/plain; charset=utf8
Content-Length
0
X-Xss-Protection
0
Expires
Sat, 26 Jul 1997 05:00:00 GMT
emx_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://cs.emxdgt.com/um?redirect=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Femx_match%3Femxid%3D%24UID%26id%3D72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3
  • https://ib.adnxs.com/getuid?https://cs.emxdgt.com/umcheck?apnxid=$UID&redirect=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Femx_match%3Femxid%3D%24EMXUID%26id%3D72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3
  • https://ib.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Fcs.emxdgt.com%2Fumcheck%3Fapnxid%3D%24UID%26redirect%3Dhttps%253A%252F%252Fids.ad.gt%252Fapi%252Fv1%252Femx_match%253Femxid%253D%2524EMXUID%252...
  • https://cs.emxdgt.com/umcheck?apnxid=3324277335898742735&redirect=https://ids.ad.gt/api/v1/emx_match?emxid=$EMXUID&id=72e8a9c8-2c51-43d5-9cd5-eafd2e4e30d3
  • https://ids.ad.gt/api/v1/emx_match?emxid=3324277335898742735brt43291573543717385790f1
43 B
596 B
Image
General
Full URL
https://ids.ad.gt/api/v1/emx_match?emxid=3324277335898742735brt43291573543717385790f1
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.209.112.70 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-209-112-70.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:38 GMT
Cache-Control
public, max-age=43200
Expires
Tue, 12 Nov 2019 19:28:38 GMT
Server
nginx/1.8.1
Connection
keep-alive
transfer-encoding
chunked
Content-Type
image/gif

Redirect headers

status
302
date
Tue, 12 Nov 2019 07:28:36 GMT
content-length
0
location
https://ids.ad.gt/api/v1/emx_match?emxid=3324277335898742735brt43291573543717385790f1
content-type
text/html
ptrack-v1.4.0-engagedtime-slots.js
d1z2jf7jlzjs58.cloudfront.net/code/
39 KB
16 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/code/ptrack-v1.4.0-engagedtime-slots.js
Requested by
Host: d1z2jf7jlzjs58.cloudfront.net
URL: https://d1z2jf7jlzjs58.cloudfront.net/p.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.85 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-85.fra50.r.cloudfront.net
Software
nginx /
Resource Hash
5c66cbe33a007920cdea231069727d9420e5e4a751378d2adb7777a03fe716bd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 19 Sep 2019 21:15:08 GMT
Content-Encoding
gzip
Age
4616009
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Pragma
public
Last-Modified
Thu, 19 Sep 2019 16:47:30 GMT
Server
nginx
ETag
W/"5d83b122-9c0d"
Content-Type
application/x-javascript
Via
1.1 5317564e96c9dceb46123f6c5f149a03.cloudfront.net (CloudFront)
Cache-Control
max-age=315360000, public
X-Amz-Cf-Pop
FRA50-C1
X-Amz-Cf-Id
Mmi7lwefNCci6E10rls_rlbZEoqN-0NV3Ugt539YhybIrMIUWV5pSw==
Expires
Thu, 31 Dec 2037 23:55:55 GMT
obUserSync.html
widgets.outbrain.com/widgetOBUserSync/ Frame 327E
0
0
Document
General
Full URL
https://widgets.outbrain.com/widgetOBUserSync/obUserSync.html
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573543716164
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.190 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-190.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Host
widgets.outbrain.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Accept-Encoding
gzip, deflate, br
Cookie
akacd_widgets_routing=3750996515~rv=20~id=4d44b0453a99698664d2deeafd09d7c4; recs_f32488c2161acbb8408589ca1fca1694=0B2474727137A1970793910A2082609640A2477476964A2180963377A2502566215ACD1; obuid=b10caf82-291c-4e4a-951b-c9379f4d45fa
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/

Response headers

Server
Apache
ETag
"6765eacd63e000240b7680fc446f2b34:1573137639"
Last-Modified
Thu, 07 Nov 2019 14:38:26 GMT
Accept-Ranges
bytes
Content-Type
text/html
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
3469
Cache-Control
max-age=604800
Date
Tue, 12 Nov 2019 07:28:37 GMT
Connection
keep-alive
Timing-Allow-Origin
*
Access-Control-Allow-Credentials
false
Access-Control-Allow-Methods
GET,POST
Access-Control-Allow-Origin
*
l
mcdp-nydc1.outbrain.com/
4 B
377 B
XHR
General
Full URL
https://mcdp-nydc1.outbrain.com/l?token=7bbb496278a6030400f74574b8924d8e_6817_1573543717148&tm=976&eT=0&wRV=104076&pVis=0&lsd=b10caf82-291c-4e4a-951b-c9379f4d45fa&eIdx=&cheq=0&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573543716164
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.63 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
c48b5b1a9776c84602de2306d7903a7241158a5077e7a8519af75c33441b8334
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:37 GMT
content-encoding
gzip
Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
content-range
Connection
close
X-TraceId
8dbc729cd4afc49e38405e2ae747ce41
Content-Length
30
eyJpdSI6IjRhOTc1NDQwNDJmNDZiNjM1ZmZmNTBkYzRmOGVjNDAzODM3NzlhZjIzNTQxNzc0YTQwZDUxZTFmOWNmNmRhMTMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
5 KB
5 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjRhOTc1NDQwNDJmNDZiNjM1ZmZmNTBkYzRmOGVjNDAzODM3NzlhZjIzNTQxNzc0YTQwZDUxZTFmOWNmNmRhMTMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
569a66e73eb1a0e799f9a7d2ff3a986a6a64a37303d89903a9a0d47f5593c1fe
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Fri, 25 Oct 2019 22:50:59 GMT
Date
Tue, 12 Nov 2019 07:28:37 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2166841
Connection
keep-alive
X-TraceId
57da9ec9731628de4badea4a9d39bbc0
Timing-Allow-Origin
*
Content-Length
5030
eyJpdSI6IjY2NTlhNzA2YjQ4MzcwNjkyNTUyNTBjMTZiZTNiMWJiYzJhNTcxYTU3ODczYzY2NTI0NTQyZWQxZmVmN2VlMDIiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
6 KB
7 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjY2NTlhNzA2YjQ4MzcwNjkyNTUyNTBjMTZiZTNiMWJiYzJhNTcxYTU3ODczYzY2NTI0NTQyZWQxZmVmN2VlMDIiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4b6686b7b6bed12411f018f4e30f06cdb750edd5861242f773a287226ced794f
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Sat, 19 Oct 2019 05:24:50 GMT
Date
Tue, 12 Nov 2019 07:28:37 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2215324
Connection
keep-alive
X-TraceId
7e3b7b465adfce0e9814c230dc833838
Timing-Allow-Origin
*
Content-Length
6448
eyJpdSI6IjQ4MGIzZWNhNmZhZDQwOWM0OGU3NWExMDg2MzcwMjE3ZTJhMDhjNjAzMDIwMGFmNmQ2YzFkOTE3YTdjYzkxOWEiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
9 KB
10 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjQ4MGIzZWNhNmZhZDQwOWM0OGU3NWExMDg2MzcwMjE3ZTJhMDhjNjAzMDIwMGFmNmQ2YzFkOTE3YTdjYzkxOWEiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e5329687dee51136427e0c882bd7d05a7538e271725d953758e05369a1bd8b2e
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Tue, 29 Oct 2019 10:53:52 GMT
Date
Tue, 12 Nov 2019 07:28:37 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2462052
Connection
keep-alive
X-TraceId
3f4f3fe0d5c68ba1872264291a9c4115
Timing-Allow-Origin
*
Content-Length
9650
eyJpdSI6IjdmY2YxN2NmYjhkMjg3ODRlNjFiZTVjZDUzNTUwYTg4ZmYyOTk2ZmQwZTE3NmE0OGMzZmU2YWVjYTU2MDc2NDYiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
9 KB
10 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjdmY2YxN2NmYjhkMjg3ODRlNjFiZTVjZDUzNTUwYTg4ZmYyOTk2ZmQwZTE3NmE0OGMzZmU2YWVjYTU2MDc2NDYiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
f74f6549ea4accee85404b920a2f6a0d988fcf2d99f23124de138dbf64452c32
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Sat, 02 Nov 2019 15:54:55 GMT
Date
Tue, 12 Nov 2019 07:28:37 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2462400
Connection
keep-alive
X-TraceId
44ab915f9ad1adadc59bbc6a83c45a4
Timing-Allow-Origin
*
Content-Length
9544
eyJpdSI6IjFmY2I3Y2U3MDU0YWFhYWMyNTQwMzgxYmY5OWZiMjNmMTZjMzA1MTU5NjU4YTY2NzcxMjI0MTc4OTk2MDUyNTIiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
9 KB
10 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjFmY2I3Y2U3MDU0YWFhYWMyNTQwMzgxYmY5OWZiMjNmMTZjMzA1MTU5NjU4YTY2NzcxMjI0MTc4OTk2MDUyNTIiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6c1fd6cc45bb97f7c361e9434a991fa12da1c4536df074306a2554a5e15bb723
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Mon, 11 Nov 2019 09:24:39 GMT
Date
Tue, 12 Nov 2019 07:28:37 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2462400
Connection
keep-alive
X-TraceId
4a34088325ae6d5f33c9b819b5929214
Timing-Allow-Origin
*
Content-Length
9360
eyJpdSI6IjMwZmU5MWFmNzQ1ZTRlOTkwYTc0OWE1ZDIwMDYwY2U4ZDE4MjI2NmVlMWVlNzY1MzQ3ZDIxMjAzNGNhZDAwYmYiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
7 KB
7 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjMwZmU5MWFmNzQ1ZTRlOTkwYTc0OWE1ZDIwMDYwY2U4ZDE4MjI2NmVlMWVlNzY1MzQ3ZDIxMjAzNGNhZDAwYmYiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
34652bd279b548b5cefbbbf9e2d37eb19259f47ab45f72575dfd1ab37ddc814a
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Mon, 11 Nov 2019 06:09:54 GMT
Date
Tue, 12 Nov 2019 07:28:37 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2460127
Connection
keep-alive
X-TraceId
32f229046744146790622ae83ac6d85e
Timing-Allow-Origin
*
Content-Length
6806
c4442975-3879-41de-aa49-e6f6c0fccc3f
https://arstechnica.com/ Frame F7D1
64 KB
0
Other
General
Full URL
blob:https://arstechnica.com/c4442975-3879-41de-aa49-e6f6c0fccc3f
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4b188a568fa90fa61d4bbe76dd6cf523abe65787e0ac3dc6b5c44db5e823685b

Request headers

Sec-Fetch-Mode
same-origin
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
65790
Content-Type
application/javascript
e7c3fdc9-9831-4d1e-a1cb-2368aa6f9f56file-1422k-128-48000-768-00001.ts
dp8hsntg6do36.cloudfront.net/5dc1b51838d069610fb0def7/ Frame F7D1
683 KB
670 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5dc1b51838d069610fb0def7/e7c3fdc9-9831-4d1e-a1cb-2368aa6f9f56file-1422k-128-48000-768-00001.ts?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.49 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-49.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
c9aa9d4f20b7ea4dc71914e5f3f9a6d6936b41e57443a0bc9dd11f44d552644b

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 11 Nov 2019 16:20:12 GMT
Content-Encoding
gzip
Vary
Origin
Age
54506
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Access-Control-Allow-Origin
*
Last-Modified
Wed, 06 Nov 2019 23:22:21 GMT
Server
AmazonS3
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Via
1.1 f7bf326347bdd7f275a38a22b5b83724.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
X-Amz-Cf-Id
KgHIAXZAVlF3qeV2CPxkom4NzKhA6JiSvG7BT-UsYjBsOs5BFbQS-w==
cdb
bidder.criteo.com/
249 B
376 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=76&profileId=154&cb=51707883704
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
178.250.2.152 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
Finatra /
Resource Hash
a5407edabf51d667f8149a023fca1b87c5664e9b257acf152a5a67c4c4e4e02a

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

date
Tue, 12 Nov 2019 07:28:36 GMT
content-encoding
gzip
server
Finatra
status
200
vary
Origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
timing-allow-origin
*
content-length
169
cdb
bidder.criteo.com/
0
145 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=76&profileId=154&cb=53698179292
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
178.250.2.152 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

status
204
date
Tue, 12 Nov 2019 07:28:36 GMT
access-control-allow-credentials
true
server
Finatra
access-control-allow-origin
https://arstechnica.com
timing-allow-origin
*
vary
Origin
truncated
/
817 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
db311174b0e3c340727b63c055cfb5b317808e909503e1bda11cc58af444f12b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml
ads
securepubads.g.doubleclick.net/gampad/
9 KB
5 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=1024221985645597&correlator=1659050529412960&output=ldjh&impl=fifs&adsid=NT&eid=21063145%2C21064500&vrg=2019110401&guci=1.2.0.0.2.2.0.0&plat=1%3A536903688%2C2%3A536903688%2C8%3A134250504&sc=1&sfv=1-0-36&ecs=20191112&iu_parts=3379%2Cconde.ars%2Crail%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=300x250%7C300x600&prev_scp=pos%3Drail%26ctx_slot_type%3Dsiderail%26ctx_slot_rn%3D0%26m_mv%3DslotNoHistData%26m_gv%3DslotNoHistData%26amznbid%3D2%26amznp%3D2%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dsiderail_0&eri=1&cust_params=m_data%3D1%26m_safety%3Dunsafe%26m_categories%3Dmoat_unsafe%252Cgv_crime%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.30.9%26ctx_page_slug%3Dindian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%26cnt_tags%3Ddtrack%252Cindia%252Cnorth-korea%252Cnuclear-energy%252Cnuclear-reactor-control-systems%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26vnd_prx_segments%3D300003%252C112200%252C121100%252C131100%252C112216%252C210000%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252Cqx7745%252C0lw01o%252Cwmhp4i%252Cdcxr0c%252C2hkgm5%252Czlqtg4%252Cap05we%252Cfdf1wd%252C65f9pd%252Cuas8ja%252C_GIOPHEv_0c_&cookie=ID%3D9d425020985d7bd7%3AT%3D1573543716%3AS%3DALNI_MYjQUVyfuJ0ElCPq6vv_8AwCZ0Ccg&cookie_enabled=1&bc=31&abxe=1&lmt=1573543717&dt=1573543717511&dlt=1573543715931&idt=362&frm=20&biw=1585&bih=1200&oid=3&adxs=1063&adys=370&adks=1483574547&ucis=3&ifi=3&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&dssz=75&icsg=46248207843328&mso=262144&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=300x250&msz=300x250&ga_vid=97489540.1573543716&ga_sid=1573543716&ga_hid=719823506&fws=516&ohw=300
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019110401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
cafe /
Resource Hash
7ff85aaba9d85ee5432f80aa52acfab4b03bbfc4c951470023f5511c81e96822
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:37 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
145160
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
4948
x-xss-protection
0
google-lineitem-id
-1
pragma
no-cache
server
cafe
google-mediationtag-id
208184
google-creative-id
-1
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
9 KB
5 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=1024221985645597&correlator=1659050529412960&output=ldjh&impl=fifs&adsid=NT&eid=21063145%2C21064500&vrg=2019110401&guci=1.2.0.0.2.2.0.0&plat=1%3A536903688%2C2%3A536903688%2C8%3A134250504&sc=1&sfv=1-0-36&ecs=20191112&iu_parts=3379%2Cconde.ars%2Chero%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=728x90%7C970x250%7C9x1%7C10x1&prev_scp=pos%3Dhero%26ctx_slot_type%3Dpost_nav%26ctx_slot_rn%3D0%26m_mv%3DslotNoHistData%26m_gv%3DslotNoHistData%26amznbid%3D2%26amznp%3D2%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dpost_nav_0&eri=1&cust_params=m_data%3D1%26m_safety%3Dunsafe%26m_categories%3Dmoat_unsafe%252Cgv_crime%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.30.9%26ctx_page_slug%3Dindian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%26cnt_tags%3Ddtrack%252Cindia%252Cnorth-korea%252Cnuclear-energy%252Cnuclear-reactor-control-systems%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26vnd_prx_segments%3D300003%252C112200%252C121100%252C131100%252C112216%252C210000%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252Cqx7745%252C0lw01o%252Cwmhp4i%252Cdcxr0c%252C2hkgm5%252Czlqtg4%252Cap05we%252Cfdf1wd%252C65f9pd%252Cuas8ja%252C_GIOPHEv_0c_&cookie=ID%3D9d425020985d7bd7%3AT%3D1573543716%3AS%3DALNI_MYjQUVyfuJ0ElCPq6vv_8AwCZ0Ccg&cookie_enabled=1&bc=31&abxe=1&lmt=1573543717&dt=1573543717517&dlt=1573543715931&idt=362&frm=20&biw=1585&bih=1200&oid=3&adxs=0&adys=80&adks=2385402828&ucis=4&ifi=4&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&dssz=75&icsg=46248207843328&mso=262144&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1585x90&msz=1585x90&ga_vid=97489540.1573543716&ga_sid=1573543716&ga_hid=719823506&fws=4&ohw=1585
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019110401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
cafe /
Resource Hash
de4342b3335dc66dc2034dae5f95a9212b98057588fd5302f85f705d5571f7ad
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:37 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
4638
x-xss-protection
0
google-lineitem-id
-1
pragma
no-cache
server
cafe
google-creative-id
-1
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=321388&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:37 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Tue, 12 Nov 2019 07:28:37 GMT
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=321388&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:37 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Tue, 12 Nov 2019 07:28:37 GMT
jot.html
platform.twitter.com/ Frame 2DC8
Redirect Chain
  • https://syndication.twitter.com/i/jot
  • https://platform.twitter.com/jot.html
0
0
Document
General
Full URL
https://platform.twitter.com/jot.html
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js?_=1573543716165
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40F7) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
Origin
https://arstechnica.com
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate

Response headers

Accept-Ranges
bytes
Access-Control-Allow-Methods
GET
Access-control-allow-origin
*
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Tue, 12 Nov 2019 07:28:37 GMT
Etag
"d9592a6c704736fa4da218d4357976dd"
Last-Modified
Tue, 22 Oct 2019 23:03:20 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/40F7)
X-Cache
HIT
Content-Length
80

Redirect headers

status
302 302 Found
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
content-length
0
content-type
text/html;charset=utf-8
date
Tue, 12 Nov 2019 07:28:37 GMT
expires
Tue, 31 Mar 1981 05:00:00 GMT
last-modified
Tue, 12 Nov 2019 07:28:37 GMT
location
https://platform.twitter.com/jot.html
pragma
no-cache
server
tsa_o
strict-transport-security
max-age=631138519
x-connection-hash
06b813f787b6d3abefd8e24327b994e2
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-response-time
110
x-transaction
00473c1900adc4e5
x-tsa-request-body-time
1
x-twitter-response-tags
BouncerCompliant
x-xss-protection
0
container.html
tpc.googlesyndication.com/safeframe/1-0-36/html/ Frame 42D4
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-36/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019110401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-36/html/container.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
3516
date
Tue, 12 Nov 2019 07:19:04 GMT
expires
Wed, 11 Nov 2020 07:19:04 GMT
last-modified
Wed, 16 Oct 2019 15:42:04 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
573
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CONDENAST_PREBID_HEADER1&hp=1&wf=1&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=11&f=0&j=&t=1573543716221&de=639972138674&rx=464677531414&m=0&ar=29bb202-clean&iw=81ef8f7&q=4&cb=0&cu=1573543716221&ll=2&lm=0&ln=0&em=0&en=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&id=1&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&fd=1&ac=1&it=500&fs=173485&na=803946282&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:37 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 12 Nov 2019 07:28:37 GMT
p-Jjy-Cyr1NZGRz.gif
pixel.quantserve.com/pixel/
35 B
292 B
Image
General
Full URL
https://pixel.quantserve.com/pixel/p-Jjy-Cyr1NZGRz.gif?labels=_campaign.media.Advertiser%20ID.4660981638.Campaign%20ID.2443012271.Line%20Item%20ID.programmatic
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.248 , United Kingdom, ASN27281 (QUANTCAST - Quantcast Corporation, US),
Reverse DNS
Software
QS /
Resource Hash
a0d3a0aff7dc3bf32d2176fc3dcda6e7aba2867c4f4d1f7af6355d2cfc6c44f8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:37 GMT
Server
QS
Content-Type
image/gif
Cache-Control
private, no-cache, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
35
Expires
Fri, 04 Aug 1978 12:00:00 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-11-12T07%3A28%3A37.791Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cCh=information%20technology&cTi=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208&cEnt=malware%2C%20pukhraj%20singh%2C%20india%2C%20page%20layout%2C%20indian%2C%20kudankulam%20nuclear%20power%20plant%2C%20north%20korea%2C%20nuclear%20reactor%2C%20cyber%20attack%2C%20nuke%2C%20kudankulam%2C%20kknpp%2C%20dtrack%2C%20virustotal%2C%20sean%20gallagher%2C%20tweet%2C%20utc%2C%20russia%2C%20n.%20korea%2C%20hard-code&cEnw=1%2C%200.8255536731720152%2C%200.8201141909758349%2C%200.75492212464432%2C%200.7341758074191788%2C%200.6714534723000154%2C%200.6687820840003413%2C%200.6650238496076891%2C%200.6530561133369807%2C%200.650136661350706%2C%200.6354726487306158%2C%200.5843496852891271%2C%200.554155780228185%2C%200.48718460536731334%2C%200.46683186332244486%2C%200.4631320408912447%2C%200.4310110895429227%2C%200.42888257765169263%2C%200.4165649852936842%2C%200.41446991250354753&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cCl=603&cId=1593135&cPd=2019-10-29T15%3A47%3A47.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&pRt=referral&pHp=%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4800&pSw=1600&pSh=1200&uID=24123826-30dd-4bbb-9702-435db0daf0b1&sID=1d3d3211-bab1-4220-a1e5-cb3d0a824733&pID=44e31dbe-5811-4fc0-84d6-a00804b159a0&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&xID=74be3589-9f80-4fa6-bf90-9f810acd026d&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22siderail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22siderail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x600%22%2C%22slug%22%3A%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%7D&dim3=%7B%22footerStart%22%3A1573543716014%2C%22headerStart%22%3A1573543715999%2C%22navigationStart%22%3A1573543714287%2C%22pubAdsReady%22%3A1573543716299%2C%22injected%22%3A1573543717791%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22rail%22%5D%2C%22ctx_slot_type%22%3A%5B%22siderail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22siderail_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22unsafe%22%5D%2C%22m_categories%22%3A%5B%22moat_unsafe%22%2C%22gv_crime%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%5D%2C%22cnt_tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%220lw01o%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22zlqtg4%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_GIOPHEv_0c_%22%5D%7D&cKh=malware%2Cpukhraj%20singh%2Cindia%2Cpage%20layout%2Cindian%2Ckudankulam%20nuclear%20power%20plant%2Cnorth%20korea%2Cnuclear%20reactor%2Ccyber%20attack%2Cnuke%2Ckudankulam%2Ccontrol%2Chttps%3A%2F%2Ft.co%2Frfateoszrw%20pic.twitter.com%2Fomvvmwizsi%2C%E2%80%94
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 12 Nov 2019 07:28:37 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1573543716221&de=629900827160&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=siderail_0&zMoatRendered=3&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=3&zMoatPageDataTargetingSet=3&zMoatSafetyTargetingSet=3&zMoatEmptySlot=1&zMoatNadoDataLoadTime=241&zMoatAllDataLoadTime=241&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&ac=1&bq=11&f=0&zn=0&if=241&na=127346056&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:37 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 12 Nov 2019 07:28:37 GMT
getpixels
pixels.ad.gt/api/v1/
0
343 B
Script
General
Full URL
https://pixels.ad.gt/api/v1/getpixels?tagger_id=502550e3cf3e9249384c2980d94c55e8&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&code=%27none%27
Requested by
Host: p.ad.gt
URL: https://p.ad.gt/api/v1/p/57
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.69.119.154 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-69-119-154.us-west-2.compute.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
204
date
Tue, 12 Nov 2019 07:28:38 GMT
server
nginx/1.14.1
access-control-allow-origin
*
access-control-allow-headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Range,Range
access-control-allow-methods
GET, POST, OPTIONS
access-control-expose-headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Range,Range
ecommerce.js
www.google-analytics.com/plugins/ua/
1 KB
839 B
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/ecommerce.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8e1b84265e633c043720dd0921476c16bc9f75e393e855c9116ca7c3a847b5c7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:01:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 22 Oct 2019 18:15:00 GMT
server
sffe
age
1628
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
738
x-xss-protection
0
expires
Tue, 12 Nov 2019 08:01:29 GMT
ec.js
www.google-analytics.com/plugins/ua/
3 KB
1 KB
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/ec.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
058ed961bfe422af7bfc65865f4c08531ec8ace995f8a1ec560a46581cb7712c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 06:29:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 22 Oct 2019 18:15:00 GMT
server
sffe
age
3561
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
1306
x-xss-protection
0
expires
Tue, 12 Nov 2019 07:29:16 GMT
conde_nast_xid
ids.ad.gt/api/v1/put/
43 B
644 B
Image
General
Full URL
https://ids.ad.gt/api/v1/put/conde_nast_xid?conde_nast_xid=74be3589-9f80-4fa6-bf90-9f810acd026d
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.209.112.70 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-209-112-70.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:38 GMT
Cache-Control
public, max-age=43200
Expires
Tue, 12 Nov 2019 19:28:38 GMT
Server
nginx/1.8.1
Connection
keep-alive
transfer-encoding
chunked
Content-Type
image/gif
/
srv-2019-11-12-07.pixel.parsely.com/plogger/
43 B
229 B
Image
General
Full URL
https://srv-2019-11-12-07.pixel.parsely.com/plogger/?rand=1573543717935&plid=77434128&idsite=arstechnica.com&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&urlref=&screen=1600x1200%7C1600x1200%7C24&data=%7B%22parsely_uuid%22%3A%223e8b21fd-f9b6-47d6-b91e-d391504a1869%22%2C%22parsely_site_uuid%22%3A%222fd0c609-9ab3-42fc-9029-59c43610f329%22%7D&sid=1&surl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&sref=&sts=1573543717933&slts=0&title=Indian+nuke+plant%E2%80%99s+network+reportedly+hit+by+malware+tied+to+N.+Korea+%7C+Ars+Technica&date=Tue+Nov+12+2019+08%3A28%3A37+GMT%2B0100+(Central+European+Standard+Time)&action=pageview&pvid=99438663&u=2fd0c609-9ab3-42fc-9029-59c43610f329
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.206.156.87 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-206-156-87.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:38 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&aip=1&a=719823506&t=pageview&_s=1&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-87198801-1&cid=97489540.1573543716&jid=1670697070&_gid=707091628.1573543717&gjid=1384005428&_v=j79&z=1034609762
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=97489540.1573543716&jid=1670697070&_v=j79&z=1034609762
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=97489540.1573543716&jid=1670697070&_v=j79&z=1034609762&slf_rd=1&random=1532502673
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=97489540.1573543716&jid=1670697070&_v=j79&z=1034609762&slf_rd=1&random=1532502673
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 12 Nov 2019 07:28:38 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 12 Nov 2019 07:28:38 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=97489540.1573543716&jid=1670697070&_v=j79&z=1034609762&slf_rd=1&random=1532502673
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-36/html/ Frame 63CC
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-36/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019110401.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-36/html/container.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
3516
date
Tue, 12 Nov 2019 07:19:04 GMT
expires
Wed, 11 Nov 2020 07:19:04 GMT
last-modified
Wed, 16 Oct 2019 15:42:04 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
573
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
p-Jjy-Cyr1NZGRz.gif
pixel.quantserve.com/pixel/
35 B
292 B
Image
General
Full URL
https://pixel.quantserve.com/pixel/p-Jjy-Cyr1NZGRz.gif?labels=_campaign.media.Advertiser%20ID.4660981638.Campaign%20ID.2443012271.Line%20Item%20ID.programmatic
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.248 , United Kingdom, ASN27281 (QUANTCAST - Quantcast Corporation, US),
Reverse DNS
Software
QS /
Resource Hash
a0d3a0aff7dc3bf32d2176fc3dcda6e7aba2867c4f4d1f7af6355d2cfc6c44f8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:37 GMT
Server
QS
Content-Type
image/gif
Cache-Control
private, no-cache, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
35
Expires
Fri, 04 Aug 1978 12:00:00 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CONDENAST_PREBID_HEADER1&hp=1&wf=1&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=11&f=0&j=&t=1573543716221&de=873594608377&rx=464677531414&m=0&ar=29bb202-clean&iw=81ef8f7&q=5&cb=0&cu=1573543716221&ll=2&lm=0&ln=0&em=0&en=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&id=1&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&fd=1&ac=1&it=500&fs=173485&na=1187396857&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:37 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 12 Nov 2019 07:28:37 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-11-12T07%3A28%3A37.967Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cCh=information%20technology&cTi=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208&cEnt=malware%2C%20pukhraj%20singh%2C%20india%2C%20page%20layout%2C%20indian%2C%20kudankulam%20nuclear%20power%20plant%2C%20north%20korea%2C%20nuclear%20reactor%2C%20cyber%20attack%2C%20nuke%2C%20kudankulam%2C%20kknpp%2C%20dtrack%2C%20virustotal%2C%20sean%20gallagher%2C%20tweet%2C%20utc%2C%20russia%2C%20n.%20korea%2C%20hard-code&cEnw=1%2C%200.8255536731720152%2C%200.8201141909758349%2C%200.75492212464432%2C%200.7341758074191788%2C%200.6714534723000154%2C%200.6687820840003413%2C%200.6650238496076891%2C%200.6530561133369807%2C%200.650136661350706%2C%200.6354726487306158%2C%200.5843496852891271%2C%200.554155780228185%2C%200.48718460536731334%2C%200.46683186332244486%2C%200.4631320408912447%2C%200.4310110895429227%2C%200.42888257765169263%2C%200.4165649852936842%2C%200.41446991250354753&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cCl=603&cId=1593135&cPd=2019-10-29T15%3A47%3A47.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&pRt=referral&pHp=%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4800&pSw=1600&pSh=1200&uID=24123826-30dd-4bbb-9702-435db0daf0b1&sID=1d3d3211-bab1-4220-a1e5-cb3d0a824733&pID=44e31dbe-5811-4fc0-84d6-a00804b159a0&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&xID=74be3589-9f80-4fa6-bf90-9f810acd026d&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22post_nav_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22post_nav_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22728x90%22%2C%22slug%22%3A%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%7D&dim3=%7B%22footerStart%22%3A1573543716014%2C%22headerStart%22%3A1573543715999%2C%22navigationStart%22%3A1573543714287%2C%22pubAdsReady%22%3A1573543716299%2C%22injected%22%3A1573543717966%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22hero%22%5D%2C%22ctx_slot_type%22%3A%5B%22post_nav%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22post_nav_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22unsafe%22%5D%2C%22m_categories%22%3A%5B%22moat_unsafe%22%2C%22gv_crime%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%5D%2C%22cnt_tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%220lw01o%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22zlqtg4%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_GIOPHEv_0c_%22%5D%7D&cKh=malware%2Cpukhraj%20singh%2Cindia%2Cpage%20layout%2Cindian%2Ckudankulam%20nuclear%20power%20plant%2Cnorth%20korea%2Cnuclear%20reactor%2Ccyber%20attack%2Cnuke%2Ckudankulam%2Ccontrol%2Chttps%3A%2F%2Ft.co%2Frfateoszrw%20pic.twitter.com%2Fomvvmwizsi%2C%E2%80%94
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 12 Nov 2019 07:28:38 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1573543716221&de=629900827160&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=post_nav_0&zMoatRendered=4&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=4&zMoatPageDataTargetingSet=4&zMoatSafetyTargetingSet=4&zMoatEmptySlot=1&zMoatNadoDataLoadTime=241&zMoatAllDataLoadTime=241&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&ac=1&bq=11&f=0&zn=0&if=241&na=1927366911&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:37 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 12 Nov 2019 07:28:37 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-11-12T07%3A28%3A38.298Z&_t=slot_loaded&cBr=Ars%20Technica&cKe=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cCh=information%20technology&cTi=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208&cEnt=malware%2C%20pukhraj%20singh%2C%20india%2C%20page%20layout%2C%20indian%2C%20kudankulam%20nuclear%20power%20plant%2C%20north%20korea%2C%20nuclear%20reactor%2C%20cyber%20attack%2C%20nuke%2C%20kudankulam%2C%20kknpp%2C%20dtrack%2C%20virustotal%2C%20sean%20gallagher%2C%20tweet%2C%20utc%2C%20russia%2C%20n.%20korea%2C%20hard-code&cEnw=1%2C%200.8255536731720152%2C%200.8201141909758349%2C%200.75492212464432%2C%200.7341758074191788%2C%200.6714534723000154%2C%200.6687820840003413%2C%200.6650238496076891%2C%200.6530561133369807%2C%200.650136661350706%2C%200.6354726487306158%2C%200.5843496852891271%2C%200.554155780228185%2C%200.48718460536731334%2C%200.46683186332244486%2C%200.4631320408912447%2C%200.4310110895429227%2C%200.42888257765169263%2C%200.4165649852936842%2C%200.41446991250354753&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cCl=603&cId=1593135&cPd=2019-10-29T15%3A47%3A47.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&pRt=referral&pHp=%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4800&pSw=1600&pSh=1200&uID=24123826-30dd-4bbb-9702-435db0daf0b1&sID=1d3d3211-bab1-4220-a1e5-cb3d0a824733&pID=44e31dbe-5811-4fc0-84d6-a00804b159a0&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&xID=74be3589-9f80-4fa6-bf90-9f810acd026d&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22siderail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22siderail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x600%22%2C%22slug%22%3A%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%7D&dim3=%7B%22footerStart%22%3A1573543716014%2C%22headerStart%22%3A1573543715999%2C%22navigationStart%22%3A1573543714287%2C%22pubAdsReady%22%3A1573543716299%2C%22injected%22%3A1573543717791%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A1573543717824%2C%22impression%22%3A1573543718298%7D&dim4=%7B%22pos%22%3A%5B%22rail%22%5D%2C%22ctx_slot_type%22%3A%5B%22siderail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22siderail_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22unsafe%22%5D%2C%22m_categories%22%3A%5B%22moat_unsafe%22%2C%22gv_crime%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%5D%2C%22cnt_tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%220lw01o%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22zlqtg4%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_GIOPHEv_0c_%22%5D%7D&cKh=malware%2Cpukhraj%20singh%2Cindia%2Cpage%20layout%2Cindian%2Ckudankulam%20nuclear%20power%20plant%2Cnorth%20korea%2Cnuclear%20reactor%2Ccyber%20attack%2Cnuke%2Ckudankulam%2Ccontrol%2Chttps%3A%2F%2Ft.co%2Frfateoszrw%20pic.twitter.com%2Fomvvmwizsi%2C%E2%80%94
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 12 Nov 2019 07:28:38 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsafeframe%2F1-0-36%2Fhtml%2Fcontainer.html&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&id=1&f=0&j=&t=1573543716221&de=639972138674&rx=464677531414&cu=1573543716221&m=2089&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4802&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=0&ag=45&an=0&gf=45&gg=0&ix=45&ic=45&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=45&bx=0&dj=1&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=90&cd=0&ah=90&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1223762048&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:38 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 12 Nov 2019 07:28:38 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-11-12T07%3A28%3A38.333Z&_t=slot_loaded&cBr=Ars%20Technica&cKe=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cCh=information%20technology&cTi=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208&cEnt=malware%2C%20pukhraj%20singh%2C%20india%2C%20page%20layout%2C%20indian%2C%20kudankulam%20nuclear%20power%20plant%2C%20north%20korea%2C%20nuclear%20reactor%2C%20cyber%20attack%2C%20nuke%2C%20kudankulam%2C%20kknpp%2C%20dtrack%2C%20virustotal%2C%20sean%20gallagher%2C%20tweet%2C%20utc%2C%20russia%2C%20n.%20korea%2C%20hard-code&cEnw=1%2C%200.8255536731720152%2C%200.8201141909758349%2C%200.75492212464432%2C%200.7341758074191788%2C%200.6714534723000154%2C%200.6687820840003413%2C%200.6650238496076891%2C%200.6530561133369807%2C%200.650136661350706%2C%200.6354726487306158%2C%200.5843496852891271%2C%200.554155780228185%2C%200.48718460536731334%2C%200.46683186332244486%2C%200.4631320408912447%2C%200.4310110895429227%2C%200.42888257765169263%2C%200.4165649852936842%2C%200.41446991250354753&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cCl=603&cId=1593135&cPd=2019-10-29T15%3A47%3A47.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&pRt=referral&pHp=%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4800&pSw=1600&pSh=1200&uID=24123826-30dd-4bbb-9702-435db0daf0b1&sID=1d3d3211-bab1-4220-a1e5-cb3d0a824733&pID=44e31dbe-5811-4fc0-84d6-a00804b159a0&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&xID=74be3589-9f80-4fa6-bf90-9f810acd026d&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22post_nav_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22post_nav_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22728x90%22%2C%22slug%22%3A%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%7D&dim3=%7B%22footerStart%22%3A1573543716014%2C%22headerStart%22%3A1573543715999%2C%22navigationStart%22%3A1573543714287%2C%22pubAdsReady%22%3A1573543716299%2C%22injected%22%3A1573543717966%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A1573543718039%2C%22impression%22%3A1573543718333%7D&dim4=%7B%22pos%22%3A%5B%22hero%22%5D%2C%22ctx_slot_type%22%3A%5B%22post_nav%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22post_nav_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22unsafe%22%5D%2C%22m_categories%22%3A%5B%22moat_unsafe%22%2C%22gv_crime%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%5D%2C%22cnt_tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%220lw01o%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22zlqtg4%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_GIOPHEv_0c_%22%5D%7D&cKh=malware%2Cpukhraj%20singh%2Cindia%2Cpage%20layout%2Cindian%2Ckudankulam%20nuclear%20power%20plant%2Cnorth%20korea%2Cnuclear%20reactor%2Ccyber%20attack%2Cnuke%2Ckudankulam%2Ccontrol%2Chttps%3A%2F%2Ft.co%2Frfateoszrw%20pic.twitter.com%2Fomvvmwizsi%2C%E2%80%94
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 12 Nov 2019 07:28:38 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
cs.js
sb.scorecardresearch.com/c2/6035094/
0
400 B
Script
General
Full URL
https://sb.scorecardresearch.com/c2/6035094/cs.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.19.43.224 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-43-224.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:38 GMT
Content-Encoding
gzip
Last-Modified
Fri, 08 Apr 2011 23:11:26 GMT
ETag
"d41d8cd98f00b204e9800998ecf8427e:1349196464"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=259200
Connection
keep-alive
Content-Length
20
Expires
Fri, 15 Nov 2019 07:28:38 GMT
adsct
analytics.twitter.com/i/
31 B
222 B
Script
General
Full URL
https://analytics.twitter.com/i/adsct?p_id=Twitter&p_user_id=0&txn_id=o1o49&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0&tpx_cb=twttr.conversion.loadPixels&tw_document_href=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F
Requested by
Host: static.ads-twitter.com
URL: https://static.ads-twitter.com/uwt.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.131 , United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_o /
Resource Hash
df3e003cc30e9bdd0313100e8ee5d468070b4b34d11ad355f276a356d4b9c7bf
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=631138519
content-length
57
x-xss-protection
0
x-response-time
119
pragma
no-cache
last-modified
Tue, 12 Nov 2019 07:28:38 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
content-type
application/javascript;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
8bac7a8d7ebf81640c30365eb7f799ec
x-transaction
002b00be00012ed6
expires
Tue, 31 Mar 1981 05:00:00 GMT
/
cx.atdmt.com/
Redirect Chain
  • https://www.facebook.com/tr/?id=228464857488266&ev=Spire-Studio-Segment&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-...
  • https://cx.atdmt.com/?c=8694479607899798658&f=AYxE-zV8D35MUPL9xjeQyDV5E1IvgMTW0XzbzsAuITEHBQnMSHP6nuhRZWsHhTB6mvp3uCiU5yw4Y4YVMc3JM6ZT&id=228464857488266&l=3&v=0
42 B
407 B
Image
General
Full URL
https://cx.atdmt.com/?c=8694479607899798658&f=AYxE-zV8D35MUPL9xjeQyDV5E1IvgMTW0XzbzsAuITEHBQnMSHP6nuhRZWsHhTB6mvp3uCiU5yw4Y4YVMc3JM6ZT&id=228464857488266&l=3&v=0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8004:face:b00c:0:8c , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
6d8ba81d1b60a18707722a1f2b62dad48a6acced95a1933f49a68b5016620b93

Request headers

Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Tue, 12 Nov 2019 07:28:38 GMT
content-type
image/gif
content-length
42
p3p
CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC"

Redirect headers

pragma
no-cache
date
Tue, 12 Nov 2019 07:28:38 GMT
server
proxygen-bolt
status
302
content-type
text/plain
location
https://cx.atdmt.com/?c=8694479607899798658&f=AYxE-zV8D35MUPL9xjeQyDV5E1IvgMTW0XzbzsAuITEHBQnMSHP6nuhRZWsHhTB6mvp3uCiU5yw4Y4YVMc3JM6ZT&id=228464857488266&l=3&v=0
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-23=":443"; ma=3600
content-length
0
expires
0
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsafeframe%2F1-0-36%2Fhtml%2Fcontainer.html&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&rm=1&fy=428.5&gp=80&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&id=1&f=0&j=&t=1573543716221&de=873594608377&rx=464677531414&cu=1573543716221&m=2256&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=80&lb=4802&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=0&ag=30&an=0&gf=30&gg=0&ix=30&ic=30&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=30&bx=0&dj=1&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=59&cd=0&ah=59&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=941207410&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:38 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 12 Nov 2019 07:28:38 GMT
event
condenast.demdex.net/
6 KB
6 KB
XHR
General
Full URL
https://condenast.demdex.net/event?_ts=1573543718529
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.241.149.220 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-241-149-220.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
6ca5e56219a8275489cbcd326c3796c09020a8707308dc2f4bc4277d1050f92b
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v052-050ebbefd.edge-irl1.demdex.com 5.62.4.20191107154045 6ms (+1ms)
Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-TID
lGSXgBvQSYM=
Vary
Origin
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
5779
Expires
Thu, 01 Jan 1970 00:00:00 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-11-12T07%3A28%3A38.851Z&_t=slot_impression_viewable&cBr=Ars%20Technica&cKe=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cCh=information%20technology&cTi=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208&cEnt=malware%2C%20pukhraj%20singh%2C%20india%2C%20page%20layout%2C%20indian%2C%20kudankulam%20nuclear%20power%20plant%2C%20north%20korea%2C%20nuclear%20reactor%2C%20cyber%20attack%2C%20nuke%2C%20kudankulam%2C%20kknpp%2C%20dtrack%2C%20virustotal%2C%20sean%20gallagher%2C%20tweet%2C%20utc%2C%20russia%2C%20n.%20korea%2C%20hard-code&cEnw=1%2C%200.8255536731720152%2C%200.8201141909758349%2C%200.75492212464432%2C%200.7341758074191788%2C%200.6714534723000154%2C%200.6687820840003413%2C%200.6650238496076891%2C%200.6530561133369807%2C%200.650136661350706%2C%200.6354726487306158%2C%200.5843496852891271%2C%200.554155780228185%2C%200.48718460536731334%2C%200.46683186332244486%2C%200.4631320408912447%2C%200.4310110895429227%2C%200.42888257765169263%2C%200.4165649852936842%2C%200.41446991250354753&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cCl=603&cId=1593135&cPd=2019-10-29T15%3A47%3A47.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&pRt=referral&pHp=%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4800&pSw=1600&pSh=1200&uID=27692158-8c5a-4ad5-b3ec-1e5571e6a17b&uNw=1&uUq=1&pID=036e4d10-735e-4745-8cd2-675902e86e23&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&xID=74be3589-9f80-4fa6-bf90-9f810acd026d&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22siderail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Afalse%2C%22isFirstImpressionViewable%22%3Atrue%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Afalse%2C%22isFirstMoneyImpressionViewable%22%3Atrue%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22siderail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x600%22%2C%22slug%22%3A%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%7D&dim3=%7B%22footerStart%22%3A1573543716014%2C%22headerStart%22%3A1573543715999%2C%22navigationStart%22%3A1573543714287%2C%22pubAdsReady%22%3A1573543716299%2C%22injected%22%3A1573543717791%2C%22viewable%22%3A1573543718851%2C%22viewport%22%3A1573543717824%2C%22impression%22%3A1573543718298%7D&dim4=%7B%22pos%22%3A%5B%22rail%22%5D%2C%22ctx_slot_type%22%3A%5B%22siderail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22siderail_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22unsafe%22%5D%2C%22m_categories%22%3A%5B%22moat_unsafe%22%2C%22gv_crime%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%5D%2C%22cnt_tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%220lw01o%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22zlqtg4%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_GIOPHEv_0c_%22%5D%7D&cKh=malware%2Cpukhraj%20singh%2Cindia%2Cpage%20layout%2Cindian%2Ckudankulam%20nuclear%20power%20plant%2Cnorth%20korea%2Cnuclear%20reactor%2Ccyber%20attack%2Cnuke%2Ckudankulam%2Ccontrol%2Chttps%3A%2F%2Ft.co%2Frfateoszrw%20pic.twitter.com%2Fomvvmwizsi%2C%E2%80%94
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 12 Nov 2019 07:28:38 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-11-12T07%3A28%3A39.054Z&_t=slot_impression_viewable&cBr=Ars%20Technica&cKe=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cCh=information%20technology&cTi=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208&cEnt=malware%2C%20pukhraj%20singh%2C%20india%2C%20page%20layout%2C%20indian%2C%20kudankulam%20nuclear%20power%20plant%2C%20north%20korea%2C%20nuclear%20reactor%2C%20cyber%20attack%2C%20nuke%2C%20kudankulam%2C%20kknpp%2C%20dtrack%2C%20virustotal%2C%20sean%20gallagher%2C%20tweet%2C%20utc%2C%20russia%2C%20n.%20korea%2C%20hard-code&cEnw=1%2C%200.8255536731720152%2C%200.8201141909758349%2C%200.75492212464432%2C%200.7341758074191788%2C%200.6714534723000154%2C%200.6687820840003413%2C%200.6650238496076891%2C%200.6530561133369807%2C%200.650136661350706%2C%200.6354726487306158%2C%200.5843496852891271%2C%200.554155780228185%2C%200.48718460536731334%2C%200.46683186332244486%2C%200.4631320408912447%2C%200.4310110895429227%2C%200.42888257765169263%2C%200.4165649852936842%2C%200.41446991250354753&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cCl=603&cId=1593135&cPd=2019-10-29T15%3A47%3A47.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&pRt=referral&pHp=%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4800&pSw=1600&pSh=1200&uID=27692158-8c5a-4ad5-b3ec-1e5571e6a17b&sID=e5766ea8-4790-4f29-96b7-3a1c6b3c3b73&pID=036e4d10-735e-4745-8cd2-675902e86e23&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.30.9%22%7D&_o=ars-technica&_c=cns_ads&xID=74be3589-9f80-4fa6-bf90-9f810acd026d&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22post_nav_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Afalse%2C%22isFirstImpressionViewable%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Afalse%2C%22isFirstMoneyImpressionViewable%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22post_nav_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22728x90%22%2C%22slug%22%3A%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%7D&dim3=%7B%22footerStart%22%3A1573543716014%2C%22headerStart%22%3A1573543715999%2C%22navigationStart%22%3A1573543714287%2C%22pubAdsReady%22%3A1573543716299%2C%22injected%22%3A1573543717966%2C%22viewable%22%3A1573543719054%2C%22viewport%22%3A1573543718039%2C%22impression%22%3A1573543718333%7D&dim4=%7B%22pos%22%3A%5B%22hero%22%5D%2C%22ctx_slot_type%22%3A%5B%22post_nav%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22post_nav_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22unsafe%22%5D%2C%22m_categories%22%3A%5B%22moat_unsafe%22%2C%22gv_crime%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.30.9%22%5D%2C%22ctx_page_slug%22%3A%5B%22indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%22%5D%2C%22cnt_tags%22%3A%5B%22dtrack%22%2C%22india%22%2C%22north-korea%22%2C%22nuclear-energy%22%2C%22nuclear-reactor-control-systems%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%220lw01o%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22zlqtg4%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_GIOPHEv_0c_%22%5D%7D&cKh=malware%2Cpukhraj%20singh%2Cindia%2Cpage%20layout%2Cindian%2Ckudankulam%20nuclear%20power%20plant%2Cnorth%20korea%2Cnuclear%20reactor%2Ccyber%20attack%2Cnuke%2Ckudankulam%2Ccontrol%2Chttps%3A%2F%2Ft.co%2Frfateoszrw%20pic.twitter.com%2Fomvvmwizsi%2C%E2%80%94
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 12 Nov 2019 07:28:39 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
events
wren.condenastdigital.com/1.0/conde/
0
732 B
Other
General
Full URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.22.222.12 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-22-222-12.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Date
Tue, 12 Nov 2019 07:28:39 GMT
x-content-type-options
nosniff
Server
nginx/1.15.8
x-frame-options
DENY
x-download-options
noopen
vary
origin
Connection
keep-alive
Content-Type
image/gif
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
strict-transport-security
max-age=15768000; preload
x-xss-protection
1; mode=block
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&id=1&f=0&j=&t=1573543716221&de=639972138674&rx=464677531414&cu=1573543716221&m=3202&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4802&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1160&an=45&gi=1&gf=1160&gg=45&ix=1160&ic=1160&ez=1&ck=1160&kw=1004&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1160&bx=45&ci=1160&jz=1004&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1004&cd=90&ah=1004&am=90&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1284176907&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:39 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 12 Nov 2019 07:28:39 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&id=1&f=0&j=&t=1573543716221&de=639972138674&rx=464677531414&cu=1573543716221&m=3206&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4802&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1160&an=1160&gi=1&gf=1160&gg=1160&ix=1160&ic=1160&ez=1&ck=1160&kw=1004&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1160&bx=1160&ci=1160&jz=1004&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1004&cd=1004&ah=1004&am=1004&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=893979816&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:39 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 12 Nov 2019 07:28:39 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&id=1&f=0&j=&t=1573543716221&de=639972138674&rx=464677531414&cu=1573543716221&m=3209&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4802&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1160&an=1160&gi=1&gf=1160&gg=1160&ix=1160&ic=1160&ez=1&ck=1160&kw=1004&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1160&bx=1160&ci=1160&jz=1004&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1004&cd=1004&ah=1004&am=1004&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=827637674&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:39 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 12 Nov 2019 07:28:39 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&rm=1&fy=428.5&gp=80&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&id=1&f=0&j=&t=1573543716221&de=873594608377&rx=464677531414&cu=1573543716221&m=3413&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=80&lb=5164&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1188&an=30&gi=1&gf=1188&gg=30&ix=1188&ic=1188&ez=1&ck=1188&kw=1005&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1188&bx=30&ci=1188&jz=1005&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1005&cd=59&ah=1005&am=59&rf=0&re=0&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=402829392&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:39 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 12 Nov 2019 07:28:39 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&rm=1&fy=428.5&gp=80&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&id=1&f=0&j=&t=1573543716221&de=873594608377&rx=464677531414&cu=1573543716221&m=3414&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=80&lb=5164&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1188&an=1188&gi=1&gf=1188&gg=1188&ix=1188&ic=1188&ez=1&ck=1188&kw=1005&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1188&bx=1188&ci=1188&jz=1005&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1005&cd=1005&ah=1005&am=1005&rf=0&re=0&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=324008076&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:39 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 12 Nov 2019 07:28:39 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&rm=1&fy=428.5&gp=80&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&id=1&f=0&j=&t=1573543716221&de=873594608377&rx=464677531414&cu=1573543716221&m=3414&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=80&lb=5164&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1188&an=1188&gi=1&gf=1188&gg=1188&ix=1188&ic=1188&ez=1&ck=1188&kw=1005&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1188&bx=1188&ci=1188&jz=1005&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1005&cd=1005&ah=1005&am=1005&rf=0&re=0&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=414324075&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:39 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 12 Nov 2019 07:28:39 GMT
ads
pubads.g.doubleclick.net/gampad/ Frame F7D1
6 KB
2 KB
XHR
General
Full URL
https://pubads.g.doubleclick.net/gampad/ads?sz=640x480|480x70&iu=/3379/conde.ars/player/information-technology/article&ciu_szs=300x60&gdfp_req=1&env=vp&output=vmap&unviewed_position_start=1&cust_params=m_data%3D1%26m_safety%3Dunsafe%26m_categories%3Dmoat_unsafe%252Cgv_crime%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.30.9%26ctx_page_slug%3Dindian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%26cnt_tags%3Ddtrack%252Cindia%252Cnorth-korea%252Cnuclear-energy%252Cnuclear-reactor-control-systems%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26vnd_prx_segments%3D300003%252C112200%252C121100%252C131100%252C112216%252C210000%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252Cqx7745%252C0lw01o%252Cwmhp4i%252Cdcxr0c%252C2hkgm5%252Czlqtg4%252Cap05we%252Cfdf1wd%252C65f9pd%252Cuas8ja%252C_GIOPHEv_0c_%26ctx_line_items%3D%26height%3D304%26muted%3D0%26right_rail%3D0%26sensitive%3D0%26series%3D5c82bcebbcdfff6f132fc5e6%26width%3D540&correlator=1659050529412960&description_url=https%3A%2F%2Fthescene.com%2Fwatch%2Farstechnica%2Funsolved-mysteries-bioware-answers-unsolved-mysteries-of-the-mass-effect-universe&vid=5dc1b51838d069610fb0def7&cmsid=1495&ppid=74be35899f804fa6bf909f810acd026d
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.98 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s45-in-f2.1e100.net
Software
cafe /
Resource Hash
c4389b75761b75bbe3702b8ea84137de23b92c73ce12315500cc762da69e4923
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 12 Nov 2019 07:28:40 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
1204
x-xss-protection
0
google-lineitem-id
0
pragma
no-cache
server
cafe
google-creative-id
0
content-type
text/xml; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
track
capture.condenastdigital.com/ Frame F7D1
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-11-12T07%3A28%3A40.093Z&_c=timedOut&_t=gptData&sID=1d3d3211-bab1-4220-a1e5-cb3d0a824733&pID=44e31dbe-5811-4fc0-84d6-a00804b159a0&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&dim1=%7B%22adBlocked%22%3Afalse%2C%22adUnits%22%3A%5B%223379%2Fconde.ars%2Finterstitial%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F2%22%2C%223379%2Fars.dart%2Finformation-technology%22%5D%2C%22embedLocation%22%3A%22arstechnica%22%2C%22error%22%3A%22%22%2C%22lineItems%22%3A%5B%5D%2C%22publicaEnabled%22%3Afalse%2C%22videoId%22%3A%225dc1b51838d069610fb0def7%22%7D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 12 Nov 2019 07:28:40 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
collect
www.google-analytics.com/r/
35 B
111 B
Other
General
Full URL
https://www.google-analytics.com/r/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Tue, 12 Nov 2019 07:28:40 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
image/gif
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
moatvideo.js
z.moatads.com/condenastjsvideocontent160527792519/ Frame F7D1
282 KB
94 KB
Script
General
Full URL
https://z.moatads.com/condenastjsvideocontent160527792519/moatvideo.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-cab2b85e1b200eef70e6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
986a0497ee1868674495c262db7f3718c7afbf8f062df9fdc721a1951894f11c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:40 GMT
Content-Encoding
gzip
Last-Modified
Sat, 19 Oct 2019 00:50:50 GMT
Server
AmazonS3
x-amz-request-id
64BFDC8426F08910
ETag
"740eae5d5ac4f0c2001ed2f19f6ea91b"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=37047
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
95903
x-amz-id-2
PNTCI3eCKIbmLosm6Tg5uUNPsShenoZYMTu+4Xx8830/VPNaBTFnnJcui2gK55HHz5r77jiPlnM=
track
capture.condenastdigital.com/ Frame F7D1
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-11-12T07%3A28%3A40.173Z&_c=Video%20Ad&_t=Ad%20Call%20Made&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=https%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Funsolved-mysteries-bioware-answers-unsolved-mysteries-of-the-mass-effect-universe%2F&cId=5dc1b51838d069610fb0def7&cKe=bioware%2Cmass%20effect%2Cmass%20effect%202%2Cvideo%20game%2Cvideo%20games%2Cvideogame&cPd=2019-11-07T16%3A00%3A00%2B00%3A00&cTi=Bioware%20Answers%20Unsolved%20Mysteries%20of%20the%20Mass%20Effect%20Universe&cTy=%2F3379%2Fconde.ars%2Fplayer%2Finformation-technology%2Farticle&mDu=857&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pID=44e31dbe-5811-4fc0-84d6-a00804b159a0&pWw=540&pWh=303.75&sID=1d3d3211-bab1-4220-a1e5-cb3d0a824733&uId=24123826-30dd-4bbb-9702-435db0daf0b1&xid=74be3589-9f80-4fa6-bf90-9f810acd026d&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22gitBranch%22%3A%22master%22%2C%22gitSha%22%3A%22e42798c%22%2C%22guid%22%3A%221ea4b3d6-e3b3-957b-4661-ed4a221fdb10%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A3625.046875%2C%22playerType%22%3A%22video-continuous%22%2C%22playsOnPage%22%3A0%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22isRightRail%22%3Afalse%2C%22tabStatus%22%3A%22active%22%2C%22versoPageType%22%3A%22article%7Creport%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3A%22OUT_OF_VIEWPORT%22%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%2C%22podIndex%22%3A%22%22%7D&videoViews=1&adId=&pageType=article%7Creport
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 12 Nov 2019 07:28:40 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CONDEVIDEOCONTENT1&hp=1&wf=1&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=8&f=0&j=&t=1573543720198&de=765782965620&m=0&ar=6907c9d928-clean&iw=7740da1&q=8&cb=0&ym=0&cu=1573543720198&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=Bioware%20Answers%20Unsolved%20Mysteries%20of%20the%20Mass%20Effect%20Universe%3A%2F3379%2Fconde.ars%2Fplayer%2Finformation-technology%2Farticle%3Aundefined%3Aundefined&zMoatVideoId=5dc1b51838d069610fb0def7&zMoatAP=-&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&id=1&zMoatDomain=arstechnica.com&zMoatSubdomain=arstechnica.com&gw=condenastjsvideocontent160527792519&fd=1&ac=1&it=500&ti=0&ih=1&fs=173050&na=1368995348&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:40 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 12 Nov 2019 07:28:40 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-11-12T07%3A28%3A42.688Z&_t=timespent&cBr=Ars%20Technica&cKe=dtrack%7Cindia%7CNorth%20Korea%7Cnuclear%20energy%7Cnuclear%20reactor%20control%20systems&cCh=information%20technology&cTi=Indian%20nuke%20plant%E2%80%99s%20network%20reportedly%20hit%20by%20malware%20tied%20to%20N.%20Korea&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.35760188005257576%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208%2C%200.22532829275808208&cEnt=malware%2C%20pukhraj%20singh%2C%20india%2C%20page%20layout%2C%20indian%2C%20kudankulam%20nuclear%20power%20plant%2C%20north%20korea%2C%20nuclear%20reactor%2C%20cyber%20attack%2C%20nuke%2C%20kudankulam%2C%20kknpp%2C%20dtrack%2C%20virustotal%2C%20sean%20gallagher%2C%20tweet%2C%20utc%2C%20russia%2C%20n.%20korea%2C%20hard-code&cEnw=1%2C%200.8255536731720152%2C%200.8201141909758349%2C%200.75492212464432%2C%200.7341758074191788%2C%200.6714534723000154%2C%200.6687820840003413%2C%200.6650238496076891%2C%200.6530561133369807%2C%200.650136661350706%2C%200.6354726487306158%2C%200.5843496852891271%2C%200.554155780228185%2C%200.48718460536731334%2C%200.46683186332244486%2C%200.4631320408912447%2C%200.4310110895429227%2C%200.42888257765169263%2C%200.4165649852936842%2C%200.41446991250354753&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&cCl=603&cId=1593135&cPd=2019-10-29T15%3A47%3A47.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea&pRt=referral&pHp=%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&pWw=1600&pWh=1200&pPw=1600&pPh=5200&pSw=1600&pSh=1200&uID=27692158-8c5a-4ad5-b3ec-1e5571e6a17b&sID=e5766ea8-4790-4f29-96b7-3a1c6b3c3b73&pID=036e4d10-735e-4745-8cd2-675902e86e23&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=general&xID=74be3589-9f80-4fa6-bf90-9f810acd026d&_v=5000&cKh=malware%2Cpukhraj%20singh%2Cindia%2Cpage%20layout%2Cindian%2Ckudankulam%20nuclear%20power%20plant%2Cnorth%20korea%2Cnuclear%20reactor%2Ccyber%20attack%2Cnuke%2Ckudankulam%2Ccontrol%2Chttps%3A%2F%2Ft.co%2Frfateoszrw%20pic.twitter.com%2Fomvvmwizsi%2C%E2%80%94
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.37.73 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-5-37-73.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 12 Nov 2019 07:28:42 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&id=1&f=0&j=&t=1573543716221&de=639972138674&rx=464677531414&cu=1573543716221&m=7230&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=5164&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=5189&an=1160&gi=1&gf=5189&gg=1160&ix=5189&ic=5189&ez=1&ck=1160&kw=1004&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5189&bx=1160&ci=1160&jz=1004&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5034&cd=1004&ah=5034&am=1004&rf=0&re=1&ft=3313&fv=0&fw=3313&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1855321284&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:43 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 12 Nov 2019 07:28:43 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&rm=1&fy=428.5&gp=80&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&id=1&f=0&j=&t=1573543716221&de=873594608377&rx=464677531414&cu=1573543716221&m=7230&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=80&lb=5164&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=5005&an=1188&gi=1&gf=5005&gg=1188&ix=5005&ic=5005&ez=1&ck=1188&kw=1005&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5005&bx=1188&ci=1188&jz=1005&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4834&cd=1005&ah=4834&am=1005&rf=0&re=1&ft=3313&fv=0&fw=3313&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1939948435&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:43 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 12 Nov 2019 07:28:43 GMT
events
wren.condenastdigital.com/1.0/conde/
0
732 B
Other
General
Full URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.22.222.12 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-22-222-12.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Date
Tue, 12 Nov 2019 07:28:43 GMT
x-content-type-options
nosniff
Server
nginx/1.15.8
x-frame-options
DENY
x-download-options
noopen
vary
origin
Connection
keep-alive
Content-Type
image/gif
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
strict-transport-security
max-age=15768000; preload
x-xss-protection
1; mode=block
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&id=1&f=0&j=&t=1573543716221&de=639972138674&rx=464677531414&cu=1573543716221&m=7432&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=5164&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=5391&an=5189&gi=1&gf=5391&gg=5189&ix=5391&ic=5391&ez=1&ck=1160&kw=1004&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5391&bx=5189&ci=1160&jz=1004&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5234&cd=5034&ah=5234&am=5034&rf=0&re=1&ft=3515&fv=3313&fw=3313&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1428251822&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:43 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 12 Nov 2019 07:28:43 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=25&q=2&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsafeframe%2F1-0-36%2Fhtml%2Fcontainer.html&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=6&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&id=1&f=0&j=&t=1573543716221&de=639972138674&rx=464677531414&cu=1573543716221&m=12062&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=5164&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=10022&an=5391&gi=1&gf=10022&gg=5391&ix=10022&ic=10022&ez=1&ck=1160&kw=1004&aj=1&pg=100&pf=100&ib=0&cc=1&bw=10022&bx=5391&ci=1160&jz=1004&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=9867&cd=5234&ah=9867&am=5234&rf=0&re=1&ft=5028&fv=3515&fw=3313&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1538296128&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:48 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 12 Nov 2019 07:28:48 GMT
/
srv-2019-11-12-07.pixel.parsely.com/plogger/
43 B
229 B
Image
General
Full URL
https://srv-2019-11-12-07.pixel.parsely.com/plogger/?rand=1573543728436&plid=77434128&idsite=arstechnica.com&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&urlref=&screen=1600x1200%7C1600x1200%7C24&data=%7B%22parsely_uuid%22%3A%223e8b21fd-f9b6-47d6-b91e-d391504a1869%22%2C%22parsely_site_uuid%22%3A%222fd0c609-9ab3-42fc-9029-59c43610f329%22%7D&sid=1&surl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&sref=&sts=1573543728436&slts=0&date=Tue+Nov+12+2019+08%3A28%3A48+GMT%2B0100+(Central+European+Standard+Time)&action=heartbeat&inc=5&tt=4900&pvid=99438663&u=2fd0c609-9ab3-42fc-9029-59c43610f329
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.206.156.87 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-206-156-87.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 12 Nov 2019 07:28:48 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRGt%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGH%3Ch%2Cqkc!p!ny%7BiY81%22ASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN%7CDoD%3DhA&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&rm=1&fy=428.5&gp=80&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F10%2Findian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea%2F&id=1&f=0&j=&t=1573543716221&de=873594608377&rx=464677531414&cu=1573543716221&m=12264&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=80&lb=5164&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=10039&an=5005&gi=1&gf=10039&gg=5005&ix=10039&ic=10039&ez=1&ck=1188&kw=1005&aj=1&pg=100&pf=100&ib=0&cc=1&bw=10039&bx=5005&ci=1188&jz=1005&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=9867&cd=4834&ah=9867&am=4834&rf=0&re=1&ft=5028&fv=3313&fw=3313&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=769716074&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://arstechnica.com/information-technology/2019/10/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 12 Nov 2019 07:28:48 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 12 Nov 2019 07:28:48 GMT

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
api.rlcdn.com
URL
https://api.rlcdn.com/api/identity?pid=2&rt=envelope
Domain
mid.rkdms.com
URL
https://mid.rkdms.com/idsv2?ptk=17c1789b-e660-493b-aa74-3c8fb990dc5f&pubid=CONDENAST

Verdicts & Comments Add Verdict or Comment

195 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| ars object| dataLayer object| googletag object| cns object| sparrowQueue boolean| apstagLOADED object| apstag object| cnBus function| moatYieldReady object| _perfRefForUserTimingPolyfill object| __core-js_shared__ object| core object| fastdom object| BOOMR_mq object| regeneratorRuntime object| headertag object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken object| Twig object| Arrive function| FPCountdown function| $ function| jQuery function| moment function| UAParser function| purl function| twig function| EvEmitter function| imagesLoaded function| easydropdown function| m function| transitionEnd string| $queryString function| arsVideoModulePlayerReady45454152 object| CN object| Criteo function| headertag_render object| rubicontag object| google_tag_manager undefined| ct undefined| et undefined| hourElapsed undefined| msg undefined| pixelDomain undefined| isDomless undefined| documentReferrer undefined| isBeta undefined| viewHash undefined| pxSrc undefined| px object| Moat#G26 object| MoatSuperV26 object| MoatNadoAllJsonpRequest_36017700 object| Moat#PML#26#1.2 boolean| Moat#EVA object| moatPrebidApi object| ActionButton object| __SKIM_JS_GLOBAL__ object| skimlinksAPI object| _cne function| __cmp number| google_srt undefined| google_measure_js_timing boolean| google_noFetch number| __google_ad_urls_id function| gotSegmentData function| e object| visitor function| Visitor object| s_c_il number| s_c_in function| DIL object| dilInstance string| referrer object| urlParams string| queryString string| fullUrl object| myParam string| GoogleAnalyticsObject function| ga object| _qevents object| __adIq_Config string| b object| h object| _aam_dataLayer undefined| userId boolean| _aam_spa function| fbq function| _fbq function| twq function| getVisitNumCustom number| d string| _linkedin_partner_id object| _linkedin_data_partner_ids object| AIM function| snaptr object| r function| addPixel object| PolarConde object| NATIVEADS object| NATIVEADS_QUEUE number| google_unique_id object| google_reactive_ads_global_state object| gaGlobal string| hash object| OBR string| OB_releaseVer function| OBR$ object| outbrain object| outbrain_rater object| criteo_pubtag object| __twttrll object| twttr object| __twttr object| PARSELY object| SparrowConfigV2 object| google_tag_data object| gaplugins function| lintrk boolean| _already_called_lintrk function| quantserve function| __qc object| ezt object| _qoptions object| bouncex function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter object| __google_ad_urls object| SparrowCache function| Sparrow boolean| sparrowInitialize object| _4d object| sparrow object| Sailthru object| ampInaboxIframes object| ampInaboxPendingMessages boolean| google_osd_loaded boolean| google_onload_fired boolean| ab_isEventListenerAddedForWidgetVisible_action-button-react-iframe object| NATIVEADS_STORE object| gaData function| reload_campaigns function| setBounceCookie function| getBounceCookie function| setBounceVisitCookie function| getBounceVisitCookie function| clearBounceCookie function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| _0x2ca0 function| _0x3ac3 function| mb object| _google_rum_ns_ object| google_persistent_state_async number| google_global_correlator object| closure_lm_547120 object| google string| key function| docReady function| aa function| na object| oa function| E function| pa function| wa function| xa function| Q function| ya function| Ka undefined| La undefined| Ma undefined| Na function| Oa function| X function| jsonFeed function| OptanonWrapper object| closure_lm_554930 object| auvars string| OnetrustActiveGroups string| OptanonActiveGroups object| Optanon object| OneTrust undefined| ad object| au function| arrive function| unbindArrive function| leave function| unbindLeave

0 Cookies

1 Console Messages

Source Level URL
Text
console-api warning URL: https://connect.facebook.net/en_US/fbevents.js(Line 23)
Message:
[Facebook Pixel] - Duplicate Pixel ID: 228464857488266.

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

4d.condenastdigital.com
a.ad.gt
adserver-us.adtech.advertising.com
adservice.google.com
adservice.google.de
ak.sail-horizon.com
ampcid.google.com
ampcid.google.de
an.facebook.com
analytics.twitter.com
api.cnevids.com
api.rlcdn.com
api.skimlinks.mgr.consensu.org
arstechnica.com
as-sec.casalemedia.com
assets.bounceexchange.com
bidder.criteo.com
bw-prod.plrsrvcs.com
c.amazon-adsystem.com
capture.condenastdigital.com
cdn.arstechnica.net
cdn.cookielaw.org
cdn.mediavoice.com
cdn.syndication.twimg.com
cm.everesttech.net
cm.g.doubleclick.net
condenast.demdex.net
connect.facebook.net
cs.emxdgt.com
cx.atdmt.com
d.turn.com
d1z2jf7jlzjs58.cloudfront.net
d2c8v52ll5s99u.cloudfront.net
dp8hsntg6do36.cloudfront.net
dpm.demdex.net
dwgyu36up6iuz.cloudfront.net
embed.actionbutton.co
fastlane.rubiconproject.com
geolocation.onetrust.com
ib.adnxs.com
ids.ad.gt
image2.pubmatic.com
images.outbrainimg.com
imasdk.googleapis.com
infinityid.condenastdigital.com
js-sec.indexww.com
log.outbrainimg.com
match.adsrvr.org
match.deepintent.com
mb.moatads.com
mcdp-nydc1.outbrain.com
mid.rkdms.com
odb.outbrain.com
p.ad.gt
p.skimresources.com
pbs.twimg.com
pixel.condenastdigital.com
pixel.quantserve.com
pixel.tapad.com
pixels.ad.gt
platform.twitter.com
player.cnevids.com
plugin.mediavoice.com
polarcdn-pentos.com
polarcdn-terrax.com
prod-native.actionbutton.co
pubads.g.doubleclick.net
px.ads.linkedin.com
px.moatads.com
r.skimresources.com
rules.quantcount.com
s.skimresources.com
s0.2mdn.net
sb.scorecardresearch.com
sc-static.net
secure.adnxs.com
secure.quantserve.com
securepubads.g.doubleclick.net
segment-data.zqtk.net
snap.licdn.com
srv-2019-11-12-07.config.parsely.com
srv-2019-11-12-07.pixel.parsely.com
sstats.arstechnica.com
static.ads-twitter.com
static.criteo.net
static.polarcdn.com
stats.g.doubleclick.net
sync.go.sonobi.com
syndication.twitter.com
t.co
t.skimresources.com
tag.bounceexchange.com
tcheck.outbrainimg.com
tpc.googlesyndication.com
tr.snapchat.com
widgets.outbrain.com
wren.condenastdigital.com
www.facebook.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
www.linkedin.com
www.medtargetsystem.com
z.moatads.com
api.rlcdn.com
mid.rkdms.com
104.17.192.78
104.244.42.131
104.244.42.133
104.244.42.136
13.224.196.49
13.224.197.211
13.225.78.104
13.225.78.33
13.225.78.46
13.225.84.158
13.225.86.250
143.204.101.44
143.204.98.85
151.101.112.239
151.101.12.157
151.101.14.2
151.139.128.10
152.195.132.202
152.199.21.89
172.217.16.130
172.217.23.98
178.162.133.149
178.250.2.130
178.250.2.152
18.195.155.181
185.33.223.202
185.64.190.80
2.18.232.28
2.18.234.190
2.18.234.21
2.18.235.40
2.19.43.224
205.234.175.175
216.58.210.2
2600:9000:2043:2800:11:8cf6:b500:93a1
2600:9000:2156:6200:6:44e3:f8c0:93a1
2606:2800:134:fa2:1627:1fe:edb:1665
2606:2800:234:59:254c:406:2366:268c
2606:4700:10::6814:b944
2606:4700::6811:4132
2606:4700::6811:dc0f
2606:4700::6813:d983
2606:4700::6813:f87e
2a00:1450:4001:806::2008
2a00:1450:4001:806::200e
2a00:1450:4001:808::2002
2a00:1450:4001:809::2006
2a00:1450:4001:80b::2003
2a00:1450:4001:819::2001
2a00:1450:4001:81b::200e
2a00:1450:4001:81d::200a
2a00:1450:4001:820::2002
2a00:1450:4001:820::200e
2a00:1450:4001:825::2002
2a00:1450:4001:825::2004
2a00:1450:400c:c00::9b
2a02:26f0:6c00:296::25ea
2a03:2880:f01c:8004:face:b00c:0:8c
2a03:2880:f01c:800e:face:b00c:0:2
2a03:2880:f01c:8012:face:b00c:0:3
2a03:2880:f11c:8183:face:b00c:0:25de
2a05:f500:11:101::b93f:9001
2a05:f500:11:101::b93f:9005
3.10.64.227
3.225.242.81
3.234.94.61
34.193.78.244
34.206.156.87
34.209.112.70
34.210.147.177
34.231.252.38
34.241.149.220
34.98.72.95
35.186.226.184
35.190.40.172
35.190.59.101
35.190.92.63
35.201.67.47
35.227.248.159
46.228.164.13
50.31.169.131
52.16.200.95
52.20.65.175
52.22.222.12
52.24.200.26
52.3.171.116
52.5.37.73
54.69.119.154
54.76.0.5
63.140.41.50
63.32.23.112
66.117.28.86
69.173.144.143
70.42.32.63
91.228.74.248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