URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Submission: On October 30 via api from CH

Summary

This website contacted 67 IPs in 5 countries across 54 domains to perform 362 HTTP transactions. The main IP is 2.18.233.143, located in European Union and belongs to AKAMAI-AS - Akamai Technologies, Inc., US. The main domain is www.zdnet.com.
TLS certificate: Issued by GeoTrust RSA CA 2018 on October 16th 2018. Valid for: 8 months.
This is the only time www.zdnet.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 12 2.18.233.143 16625 (AKAMAI-AS)
57 2.18.233.149 16625 (AKAMAI-AS)
6 104.111.244.243 16625 (AKAMAI-AS)
4 23.211.9.67 16625 (AKAMAI-AS)
3 2.18.234.21 16625 (AKAMAI-AS)
4 23.60.198.210 16625 (AKAMAI-AS)
2 2a00:1450:400... 15169 (GOOGLE)
1 54.230.93.44 16509 (AMAZON-02)
2 52.206.48.193 14618 (AMAZON-AES)
1 52.50.182.20 16509 (AMAZON-02)
6 2a00:1450:400... 15169 (GOOGLE)
6 2a00:1450:400... 15169 (GOOGLE)
16 216.58.210.2 15169 (GOOGLE)
15 68.232.35.180 15133 (EDGECAST)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
5 2400:cb00:204... 13335 (CLOUDFLAR...)
4 2400:cb00:204... 13335 (CLOUDFLAR...)
2 8 34.246.247.78 16509 (AMAZON-02)
4 64.30.224.172 6623 (CBSI-1)
3 23.8.8.176 20940 (AKAMAI-ASN1)
1 2600:9000:200... 16509 (AMAZON-02)
2 2606:4700:20:... 13335 (CLOUDFLAR...)
1 52.208.88.219 16509 (AMAZON-02)
1 34.231.154.145 14618 (AMAZON-AES)
2 2 104.66.101.26 20940 (AKAMAI-ASN1)
2 2 54.88.105.249 ()
2 2 2.18.233.201 ()
2 2 52.18.169.38 ()
2 3 18.184.225.117 16509 (AMAZON-02)
1 6 52.212.113.202 16509 (AMAZON-02)
1 2606:4700:20:... 13335 (CLOUDFLAR...)
2 54.246.133.167 16509 (AMAZON-02)
3 63.140.43.37 15224 (OMNITURE)
3 54.154.175.204 16509 (AMAZON-02)
2 23.8.11.168 20940 (AKAMAI-ASN1)
3 94.31.29.248 33438 (HIGHWINDS2)
2 108.161.188.128 33438 (HIGHWINDS2)
5 185.33.223.221 29990 (ASN-APPNEXUS)
1 4 66.117.28.68 15224 (OMNITURE)
12 2a00:1450:400... 15169 (GOOGLE)
1 2a03:2880:f01... 32934 (FACEBOOK)
1 2620:109:c00c... 14413 (LINKEDIN)
2 6 23.57.19.23 16625 (AKAMAI-AS)
1 23.77.209.221 20940 (AKAMAI-ASN1)
1 2 52.215.27.193 16509 (AMAZON-02)
2 2a03:2880:f02... 32934 (FACEBOOK)
2 2 66.117.28.86 ()
2 2 216.58.214.66 ()
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
2 2a00:1450:400... 15169 (GOOGLE)
1 1 216.58.206.2 ()
1 9 2a00:1450:400... 15169 (GOOGLE)
1 1 2a00:1450:400... ()
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1288:110... 34010 (YAHOO-IRD)
1 54.76.196.204 16509 (AMAZON-02)
3 151.101.120.134 54113 (FASTLY)
2 2a03:2880:f12... 32934 (FACEBOOK)
30 2.18.235.40 16625 (AKAMAI-AS)
24 2a00:1450:400... 15169 (GOOGLE)
8 104.111.230.142 16625 (AKAMAI-AS)
4 213.19.162.61 26667 (RUBICONPR...)
5 54.230.93.121 16509 (AMAZON-02)
4 213.19.162.57 26667 (RUBICONPR...)
1 18.233.16.74 14618 (AMAZON-AES)
7 18.130.88.116 16509 (AMAZON-02)
9 23.38.18.151 16625 (AKAMAI-AS)
1 2a00:1450:400... 15169 (GOOGLE)
1 63.140.43.34 15224 (OMNITURE)
2 151.101.2.2 54113 (FASTLY)
4 151.101.1.181 54113 (FASTLY)
3 2400:cb00:204... 13335 (CLOUDFLAR...)
2 151.101.128.134 54113 (FASTLY)
2 2a00:1450:400... 15169 (GOOGLE)
362 67
Apex Domain
Subdomains
Transfer
61 cbsistatic.com
zdnet1.cbsistatic.com
zdnet3.cbsistatic.com
zdnet2.cbsistatic.com
zdnet4.cbsistatic.com
818 KB
36 googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
1 MB
27 doubleclick.net
securepubads.g.doubleclick.net
cm.g.doubleclick.net
googleads.g.doubleclick.net
191 KB
26 moatads.com
z.moatads.com
geo.moatads.com
px.moatads.com
701 KB
20 moatpixel.com
cbsdfp5832910442.s.moatpixel.com
8 KB
17 rubiconproject.com
ads.rubiconproject.com
optimized-by.rubiconproject.com
beacon-eu-ams3.rubiconproject.com
s.update.rubiconproject.com
eus.rubiconproject.com
37 KB
15 tiqcdn.com
tags.tiqcdn.com
91 KB
9 cbsi.com
dw.cbsi.com
saa.cbsi.com
rev.cbsi.com
som.cbsi.com
15 KB
9 ml314.com
ml314.com
in.ml314.com
15 KB
8 demdex.net
dpm.demdex.net
cbsi.demdex.net
7 KB
8 viglink.com
cdn.viglink.com
api.viglink.com
86 KB
7 imrworldwide.com
secure-us.imrworldwide.com
cdn-gl.imrworldwide.com
59 KB
7 google.com
adservice.google.com
www.google.com
1 KB
7 google.de
adservice.google.de
www.google.de
1 KB
6 scorecardresearch.com
sb.scorecardresearch.com
4 KB
6 everesttech.net
pixel.everesttech.net
cm.everesttech.net
3 KB
6 evidon.com
c.evidon.com
26 KB
6 zdnet.com
www.zdnet.com
67 KB
5 disqus.com
zdnet-1.disqus.com
disqus.com
27 KB
5 adnxs.com
secure.adnxs.com
3 KB
5 cbsinteractive.com
vidtech.cbsinteractive.com
299 KB
4 perfectmarket.com
widget.perfectmarket.com
94 KB
4 pagefair.com
asset.pagefair.com
stats.pagefair.com
6 KB
4 lightboxcdn.com
www.lightboxcdn.com
122 KB
4 go-mpulse.net
c.go-mpulse.net
58 KB
3 disquscdn.com
c.disquscdn.com
197 KB
3 facebook.com
graph.facebook.com
www.facebook.com
1 KB
3 eyeota.net
ps.eyeota.net
853 B
3 tru.am
tru.am
beacon.tru.am
15 KB
3 everestjs.net
www.everestjs.net
6 KB
2 google-analytics.com
www.google-analytics.com
17 KB
2 taboola.com
cdn.taboola.com
151 KB
2 2mdn.net
s0.2mdn.net
92 KB
2 facebook.net
connect.facebook.net
33 KB
2 casalemedia.com
as-sec.casalemedia.com
1 KB
2 pagefair.net
asset.pagefair.net
891 B
2 akstat.io
22ffabbe.akstat.io
708 B
2 crwdcntrl.net
sync.crwdcntrl.net
1 KB
2 mathtag.com
pixel.mathtag.com
1 KB
2 rlcdn.com
idsync.rlcdn.com
598 B
2 bluekai.com
tags.bluekai.com
1 KB
2 agkn.com
js.agkn.com
d.agkn.com
3 KB
2 betrad.com
l.betrad.com
240 B
2 googletagservices.com
www.googletagservices.com
18 KB
1 googleapis.com
imasdk.googleapis.com
1 yieldmanager.com
ad.yieldmanager.com
1 KB
1 googleadservices.com
www.googleadservices.com
318 B
1 urbanairship.com
web-sdk.urbanairship.com
17 KB
1 qualtrics.com
zn_3xebfjduss0srw5-cbs.siteintercept.qualtrics.com
13 KB
1 linkedin.com
www.linkedin.com
1 KB
1 akamaihd.net
iicbsi-a.akamaihd.net
268 B
1 adsrvr.org
match.adsrvr.org
513 B
1 sharethrough.com
native.sharethrough.com
106 KB
1 indexww.com
js-sec.indexww.com
26 KB
362 54
Domain Requested by
24 pagead2.googlesyndication.com securepubads.g.doubleclick.net
optimized-by.rubiconproject.com
pagead2.googlesyndication.com
www.zdnet.com
20 cbsdfp5832910442.s.moatpixel.com
20 zdnet1.cbsistatic.com www.zdnet.com
zdnet2.cbsistatic.com
zdnet3.cbsistatic.com
19 zdnet3.cbsistatic.com www.zdnet.com
zdnet2.cbsistatic.com
zdnet3.cbsistatic.com
16 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
www.zdnet.com
15 tags.tiqcdn.com zdnet2.cbsistatic.com
tags.tiqcdn.com
12 tpc.googlesyndication.com securepubads.g.doubleclick.net
www.zdnet.com
12 zdnet4.cbsistatic.com www.zdnet.com
zdnet2.cbsistatic.com
10 z.moatads.com securepubads.g.doubleclick.net
10 zdnet2.cbsistatic.com www.zdnet.com
zdnet2.cbsistatic.com
9 px.moatads.com
9 googleads.g.doubleclick.net 1 redirects pagead2.googlesyndication.com
8 ml314.com 2 redirects tags.tiqcdn.com
ml314.com
www.zdnet.com
7 geo.moatads.com z.moatads.com
6 sb.scorecardresearch.com 2 redirects tags.tiqcdn.com
cdn.taboola.com
6 dpm.demdex.net 1 redirects www.zdnet.com
tags.tiqcdn.com
vidtech.cbsinteractive.com
6 adservice.google.com www.googletagservices.com
pagead2.googlesyndication.com
6 adservice.google.de www.googletagservices.com
pagead2.googlesyndication.com
6 c.evidon.com www.zdnet.com
c.evidon.com
6 www.zdnet.com 1 redirects zdnet3.cbsistatic.com
vidtech.cbsinteractive.com
5 cdn-gl.imrworldwide.com vidtech.cbsinteractive.com
cdn-gl.imrworldwide.com
5 secure.adnxs.com js-sec.indexww.com
5 vidtech.cbsinteractive.com zdnet2.cbsistatic.com
vidtech.cbsinteractive.com
5 cdn.viglink.com tags.tiqcdn.com
www.zdnet.com
4 widget.perfectmarket.com cdn.taboola.com
widget.perfectmarket.com
4 eus.rubiconproject.com www.zdnet.com
4 beacon-eu-ams3.rubiconproject.com www.zdnet.com
4 optimized-by.rubiconproject.com ads.rubiconproject.com
4 ads.rubiconproject.com www.zdnet.com
4 pixel.everesttech.net 1 redirects
4 dw.cbsi.com tags.tiqcdn.com
www.zdnet.com
4 www.lightboxcdn.com www.zdnet.com
www.lightboxcdn.com
4 c.go-mpulse.net www.zdnet.com
c.go-mpulse.net
zdnet1.cbsistatic.com
3 c.disquscdn.com zdnet-1.disqus.com
3 zdnet-1.disqus.com zdnet2.cbsistatic.com
zdnet-1.disqus.com
3 asset.pagefair.com zdnet3.cbsistatic.com
asset.pagefair.com
3 api.viglink.com cdn.viglink.com
3 saa.cbsi.com tags.tiqcdn.com
3 ps.eyeota.net 2 redirects www.zdnet.com
3 www.everestjs.net tags.tiqcdn.com
www.everestjs.net
2 www.google-analytics.com widget.perfectmarket.com
2 disqus.com zdnet-1.disqus.com
2 cdn.taboola.com zdnet2.cbsistatic.com
cdn.taboola.com
2 www.facebook.com connect.facebook.net
2 s0.2mdn.net zdnet2.cbsistatic.com
s0.2mdn.net
2 cm.g.doubleclick.net 2 redirects
2 cm.everesttech.net 2 redirects
2 connect.facebook.net tags.tiqcdn.com
connect.facebook.net
2 secure-us.imrworldwide.com 1 redirects
2 as-sec.casalemedia.com js-sec.indexww.com
2 asset.pagefair.net zdnet3.cbsistatic.com
2 22ffabbe.akstat.io zdnet1.cbsistatic.com
c.go-mpulse.net
2 cbsi.demdex.net tags.tiqcdn.com
2 sync.crwdcntrl.net 2 redirects
2 pixel.mathtag.com 2 redirects
2 idsync.rlcdn.com 2 redirects
2 tags.bluekai.com 2 redirects
2 tru.am tags.tiqcdn.com
tru.am
2 l.betrad.com www.zdnet.com
2 www.googletagservices.com www.zdnet.com
rev.cbsi.com
1 som.cbsi.com vidtech.cbsinteractive.com
1 imasdk.googleapis.com s0.2mdn.net
1 s.update.rubiconproject.com www.zdnet.com
1 rev.cbsi.com www.zdnet.com
1 stats.pagefair.com zdnet3.cbsistatic.com
1 ad.yieldmanager.com
1 www.google.de
1 www.google.com 1 redirects
1 www.googleadservices.com 1 redirects
1 web-sdk.urbanairship.com zdnet3.cbsistatic.com
1 zn_3xebfjduss0srw5-cbs.siteintercept.qualtrics.com tags.tiqcdn.com
1 www.linkedin.com zdnet3.cbsistatic.com
1 graph.facebook.com zdnet3.cbsistatic.com
1 beacon.tru.am tru.am
1 in.ml314.com ml314.com
1 d.agkn.com js.agkn.com
1 js.agkn.com tags.tiqcdn.com
1 iicbsi-a.akamaihd.net tags.tiqcdn.com
1 match.adsrvr.org js-sec.indexww.com
1 native.sharethrough.com www.zdnet.com
1 js-sec.indexww.com www.zdnet.com
362 81
Subject Issuer Validity Valid
www.cbs.com
GeoTrust RSA CA 2018
2018-10-16 -
2019-06-22
8 months crt.sh
cc.cnetcontent.com
DigiCert SHA2 Secure Server CA
2018-10-05 -
2020-01-04
a year crt.sh
*.evidon.com
DigiCert ECC Secure Server CA
2018-02-02 -
2019-04-02
a year crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2018-04-16 -
2019-02-06
10 months crt.sh
akstat.io
DigiCert ECC Secure Server CA
2018-03-12 -
2019-05-11
a year crt.sh
*.g.doubleclick.net
Google Internet Authority G3
2018-10-09 -
2019-01-01
3 months crt.sh
*.sharethrough.com
Go Daddy Secure Certificate Authority - G2
2017-09-18 -
2018-11-17
a year crt.sh
l.betrad.com
Go Daddy Secure Certificate Authority - G2
2017-04-25 -
2019-06-24
2 years crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2017-02-15 -
2019-04-19
2 years crt.sh
*.google.com
Google Internet Authority G3
2018-10-09 -
2019-01-01
3 months crt.sh
*.tiqcdn.com
DigiCert SHA2 Secure Server CA
2017-10-25 -
2020-05-13
3 years crt.sh
a248.e.akamai.net
DigiCert ECC Secure Server CA
2018-01-23 -
2019-01-19
a year crt.sh
ssl418259.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-09-22 -
2019-03-31
6 months crt.sh
ssl516460.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-10-06 -
2019-04-14
6 months crt.sh
*.ml314.com
Amazon
2018-04-14 -
2019-05-14
a year crt.sh
*.cbsi.com
DigiCert SHA2 High Assurance Server CA
2017-11-07 -
2021-02-04
3 years crt.sh
www.everestjs.net
DigiCert SHA2 Secure Server CA
2018-10-15 -
2020-10-15
2 years crt.sh
*.agkn.com
RapidSSL RSA CA 2018
2018-06-21 -
2020-09-16
2 years crt.sh
ssl389962.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-08-08 -
2019-02-14
6 months crt.sh
www.eyeota.com
COMODO RSA Domain Validation Secure Server CA
2018-02-12 -
2021-02-11
3 years crt.sh
*.demdex.net
DigiCert SHA2 High Assurance Server CA
2018-01-09 -
2021-02-12
3 years crt.sh
saa.cbsi.com
DigiCert SHA2 High Assurance Server CA
2018-05-19 -
2019-08-22
a year crt.sh
viglink.com
Amazon
2018-03-09 -
2019-04-09
a year crt.sh
asset.pagefair.com
Let's Encrypt Authority X3
2018-10-29 -
2019-01-27
3 months crt.sh
asset.pagefair.net
Let's Encrypt Authority X3
2018-10-29 -
2019-01-27
3 months crt.sh
*.adnxs.com
DigiCert ECC Secure Server CA
2018-01-25 -
2019-01-25
a year crt.sh
tpc.googlesyndication.com
Google Internet Authority G3
2018-10-16 -
2019-01-08
3 months crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2017-12-15 -
2019-03-22
a year crt.sh
www.linkedin.com
DigiCert SHA2 Secure Server CA
2018-05-30 -
2020-09-01
2 years crt.sh
*.scorecardresearch.com
COMODO RSA Organization Validation Secure Server CA
2017-12-06 -
2018-12-26
a year crt.sh
*.qualtrics.com
DigiCert SHA2 Secure Server CA
2018-10-08 -
2021-01-06
2 years crt.sh
*.imrworldwide.com
DigiCert SHA2 Secure Server CA
2018-02-15 -
2019-07-11
a year crt.sh
*.everesttech.net
DigiCert SHA2 Secure Server CA
2017-04-13 -
2020-04-17
3 years crt.sh
*.urbanairship.com
DigiCert SHA2 Secure Server CA
2018-04-17 -
2019-07-17
a year crt.sh
*.doubleclick.net
Google Internet Authority G3
2018-10-16 -
2019-01-08
3 months crt.sh
www.google.de
Google Internet Authority G3
2018-10-09 -
2019-01-01
3 months crt.sh
*.ads.yahoo.com
DigiCert SHA2 High Assurance Server CA
2018-07-05 -
2019-01-10
6 months crt.sh
*.pagefair.com
Gandi Standard SSL CA 2
2016-11-02 -
2018-11-20
2 years crt.sh
*.disqus.com
DigiCert SHA2 Secure Server CA
2018-03-28 -
2020-04-27
2 years crt.sh
moatads.com
DigiCert ECC Secure Server CA
2018-01-09 -
2019-01-09
a year crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2016-01-12 -
2019-03-01
3 years crt.sh
kazfv.com
COMODO ECC Domain Validation Secure Server CA
2018-07-20 -
2019-07-20
a year crt.sh
*.moatads.com
DigiCert SHA2 Secure Server CA
2018-04-27 -
2019-04-27
a year crt.sh
*.googleapis.com
Google Internet Authority G3
2018-10-16 -
2019-01-08
3 months crt.sh
som.cbsi.com
DigiCert SHA2 High Assurance Server CA
2018-08-06 -
2019-11-13
a year crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2018-10-10 -
2019-09-07
a year crt.sh
p.ssl.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2018-03-02 -
2018-12-28
10 months crt.sh
ssl565697.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-10-07 -
2019-04-15
6 months crt.sh
*.google-analytics.com
Google Internet Authority G3
2018-10-16 -
2019-01-08
3 months crt.sh

This page contains 40 frames:

Primary Page: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Frame ID: 110C84DA39CB02CED027690E53F6316E
Requests: 232 HTTP requests in this frame

Frame: https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Frame ID: E7AF0DFBB91FF7615E3843BC9A56DA58
Requests: 2 HTTP requests in this frame

Frame: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/lightbox.js?cb=1540939930534&lv=1
Frame ID: C1AAB575AAA6F29C715382D3029FE731
Requests: 2 HTTP requests in this frame

Frame: https://d.agkn.com/iframe/8613/?che=587267178&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bpid=cbsinteractive&c=%7B%22bpid%22%3A%22cbsinteractive%22%2C%22loc%22%3A%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F%22%2C%22ref%22%3A%22-1%22%2C%22cid%22%3A%22-1%22%2C%22sid%22%3A%22-1%22%2C%22gen%22%3A%22-1%22%2C%22age%22%3A%22-1%22%2C%22cat%22%3A%22-1%22%2C%22brd%22%3A%22-1%22%7D
Frame ID: 3C8BC5EE1433E3BD362536591F0438DE
Requests: 1 HTTP requests in this frame

Frame: https://cbsi.demdex.net/dest5.html?d_nsid=undefined
Frame ID: 1B052965522BB9C626CED444B1BFCA14
Requests: 1 HTTP requests in this frame

Frame: https://www.everestjs.net/static/pixel_details.html
Frame ID: 3945DF40C51647DCDF4D37D304C12543
Requests: 1 HTTP requests in this frame

Frame: https://www.lightboxcdn.com/lclst/a1583f50-579b-41d0-8c4e-1cd1790d945c/ls.html?purl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&vid=a1583f50-579b-41d0-8c4e-1cd1790d945c&se=1&prev=0&cb=636752339805538198
Frame ID: 59B5086E51BCFB4EEF5EABF253ED41C3
Requests: 1 HTTP requests in this frame

Frame: https://cbsi.demdex.net/dest5.html?d_nsid=0
Frame ID: 9241972C267394D7AC000BDFCA064D88
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Frame ID: F0DFC6F44A398EB3B49C8407927C01D2
Requests: 4 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Frame ID: 3F85FFA7D91D30FF09A5D9E16D769970
Requests: 4 HTTP requests in this frame

Frame: https://ads.rubiconproject.com/ad/9818.js
Frame ID: E297DC3F4FA48BA15B5F30F4618FC465
Requests: 16 HTTP requests in this frame

Frame: https://ads.rubiconproject.com/ad/9818.js
Frame ID: 3DE392B3365EA070CA1E12B8B89D372A
Requests: 15 HTTP requests in this frame

Frame: https://ads.rubiconproject.com/ad/9818.js
Frame ID: E6EFFAE32EC2876FD5A57535EF470BEE
Requests: 14 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Frame ID: 37620D26B3C011049EB26DEB0EF8C086
Requests: 3 HTTP requests in this frame

Frame: https://ads.rubiconproject.com/ad/9818.js
Frame ID: C1AFDF879978EEB244C777A150BDB15E
Requests: 14 HTTP requests in this frame

Frame: https://rev.cbsi.com/common/js/adKit.min.js?2076383587
Frame ID: 523E91F697578F1C4F1D2E5CB0FE8C54
Requests: 13 HTTP requests in this frame

Frame: https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Frame ID: 0BFDA33A91EC7FE6B54F10F7DAA1493C
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Frame ID: E6A55A0C2C67839B543D2F76914E6B0F
Requests: 1 HTTP requests in this frame

Frame: https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Frame ID: C13F66FBC39CB9CF8BA9A215988BA018
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Frame ID: F2DB306A18D98CDB4476948EEA0EF7F8
Requests: 1 HTTP requests in this frame

Frame: https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Frame ID: B32C9555FCEF6F85991F709C51BC9CFE
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Frame ID: 819050FBB3C35BBE1678490568465830
Requests: 1 HTTP requests in this frame

Frame: https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Frame ID: A2319F62AAF1BC26496BE371B931585A
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Frame ID: 3522706A18CD10E2DDEB942C6B004CD4
Requests: 1 HTTP requests in this frame

Frame: https://www.facebook.com/tr/
Frame ID: 1E8C4535B9AFC9BCB7F2680BBC997999
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20181024/r20180604/zrt_lookup.html
Frame ID: 35DF2F78847AB93F65795FE7408DAD4D
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=90&slotname=3084619100&adk=3828543735&adf=4077151326&w=728&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1540939933586&bpp=98&bdt=879&fdt=2172&idt=2161&shv=r20181024&cbv=r20180604&saldr=sa&correlator=741797030273&frm=23&ife=5&pv=2&ga_vid=907141319.1540939936&ga_sid=1540939936&ga_hid=907981603&ga_fc=0&iag=3&icsg=693856&nhd=1&dssz=21&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=429&ady=393&biw=1585&bih=1200&isw=728&ish=90&ifk=2834320770&scr_x=0&scr_y=0&eid=21060853%2C21070025&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C728%2C90&vis=1&rsz=%7C%7CoeE%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=4066913089&ifi=1&fsb=1&dtd=2211
Frame ID: E3F54B11B3C82A443A8BE25B4C7CEC5E
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20181024/r20180604/zrt_lookup.html
Frame ID: DDD68F1ED260A132E6657AB2A2A186CF
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=250&slotname=8385808081&adk=1919950094&adf=4077151327&w=300&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1540939933707&bpp=65&bdt=999&fdt=2225&idt=2214&shv=r20181024&cbv=r20180604&saldr=sa&correlator=741797030273&frm=23&ife=5&pv=1&ga_vid=1148122416.1540939936&ga_sid=1540939936&ga_hid=330462937&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1043&ady=513&biw=1585&bih=1200&isw=300&ish=250&ifk=2180882631&scr_x=0&scr_y=0&eid=21060853%2C21070025&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CoeE%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=3832671437&ifi=1&fsb=1&dtd=2286
Frame ID: 948E52D8A31C1D509BCEC4A3EA78867C
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20181024/r20180604/zrt_lookup.html
Frame ID: E21659634A5E646B824A5B79577E49DE
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=250&slotname=8385808081&adk=1919950094&adf=4077151324&w=300&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1540939933805&bpp=26&bdt=1096&fdt=2248&idt=2233&shv=r20181024&cbv=r20180604&saldr=sa&correlator=741797030273&frm=23&ife=5&pv=1&ga_vid=1601660820.1540939936&ga_sid=1540939936&ga_hid=1493547831&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1043&ady=1501&biw=1585&bih=1200&isw=300&ish=250&ifk=1789179933&scr_x=0&scr_y=0&eid=21060853%2C21070025&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=3832671437&ifi=1&fsb=1&dtd=2318
Frame ID: A80807EFD9A0C3C78CF4A7AA5C0ADC4B
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20181024/r20180604/zrt_lookup.html
Frame ID: 84D49CCF987407FF4E0292F75B5DACB7
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=90&slotname=3084619100&adk=3828543735&adf=4077151314&w=728&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1540939933842&bpp=33&bdt=1131&fdt=2299&idt=2295&shv=r20181024&cbv=r20180604&saldr=sa&correlator=741797030273&frm=23&ife=5&pv=1&ga_vid=1542925972.1540939936&ga_sid=1540939936&ga_hid=2016365171&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=429&ady=5494&biw=1585&bih=1200&isw=728&ish=90&ifk=1649710351&scr_x=0&scr_y=0&eid=10573696%2C20195144%2C21060853%2C21070025&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C728%2C90&vis=1&rsz=%7C%7CopeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=4066913089&ifi=1&fsb=1&dtd=2357
Frame ID: 4316666370C69CC217D2FF60A40FEA57
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Frame ID: DF90886F6CE8800CD0B9F695230FB4D0
Requests: 3 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Frame ID: 6A2A6868C1E5B2DACD214AAF05CE3F8F
Requests: 3 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.250.3_en.html
Frame ID: D24474F47487CC4B914C440CD8F6D2C7
Requests: 1 HTTP requests in this frame

Frame: https://cdn-gl.imrworldwide.com/novms/html/ls.html
Frame ID: 4D6A30B4E0FA86000D259FB1B0A035DE
Requests: 1 HTTP requests in this frame

Frame: https://disqus.com/embed/comments/?base=default&f=zdnet-1&t_i=7a12161d-2a5f-4793-b0a4-9fac038733de&t_u=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&t_e=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks&t_d=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks&t_t=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks&s_o=default
Frame ID: 1E7BA8FD948D40A4D53AB4A606B568C0
Requests: 1 HTTP requests in this frame

Frame: https://widget.perfectmarket.com/opt/tboptevent.html?v=2&a=u&d=%7B%22stp%22%3A%7B%22a%22%3A1%7D%7D
Frame ID: F712C5A4356DB9D6DA7BB4910A1D1B2A
Requests: 1 HTTP requests in this frame

Frame: https://widget.perfectmarket.com/opt/tboptevent.html?v=2&a=u&d=%7B%22stp%22%3A%7B%22v%22%3A1%7D%7D
Frame ID: D493F7AEBC61BE390320A97A3168F107
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazi... HTTP 301
    https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazi... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • env /^requirejs$/i

Overall confidence: 100%
Detected patterns
  • env /pbjs/i

Overall confidence: 100%
Detected patterns
  • env /^DISQUS/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^\/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • script /googlesyndication\.com\//i
  • env /^__google_ad_/i
  • env /^Goog_AdSense_/i

Overall confidence: 100%
Detected patterns
  • env /^gaGlobal$/i

Overall confidence: 100%
Detected patterns
  • env /^googletag$/i

Overall confidence: 100%
Detected patterns
  • env /^Modernizr$/i

Overall confidence: 100%
Detected patterns
  • env /^optimizely$/i

Overall confidence: 100%
Detected patterns
  • env /^SWFObject$/i

Overall confidence: 100%
Detected patterns
  • env /^s_(?:account|objectID|code|INST)$/i


Overall confidence: 100%
Detected patterns
  • env /^jQuery$/i

Page Statistics

362
Requests

94 %
HTTPS

32 %
IPv6

54
Domains

81
Subdomains

67
IPs

5
Countries

4489 kB
Transfer

14397 kB
Size

5
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks HTTP 301
    https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 90
  • https://tags.bluekai.com/site/20486?limit=0&id=5978151442431788410&redir=https://ml314.com/csync.ashx%3Ffp=$_BK_UUID%26person_id=5978151442431788410%26eid=50056 HTTP 302
  • https://tags.bluekai.com/site/20486?dt=0&r=1789343746&sig=2967659996&bkca=KJpn0zpBnnWND1+1LEVNBnzyBeD61EW01ER6+f9y1EHxv6oB0u00puQovuit6+4wpEWtBBanpLdPE0brpWFVu0pm3a9N5ALgLaVJ5dvmeylN5aWN1i+/nugmpTFcqiJxwCDARtOQSQR9IzyM+9== HTTP 302
  • https://ml314.com/csync.ashx?fp=csEsu99999YzLBCq&person_id=5978151442431788410&eid=50056
Request Chain 91
  • https://idsync.rlcdn.com/395886.gif?partner_uid=5978151442431788410 HTTP 307
  • https://idsync.rlcdn.com/1000.gif?memo=CO6UGBIeChoIARCuXxoTNTk3ODE1MTQ0MjQzMTc4ODQxMBAAGg0ImsHj3gUSBQjoBxAAQgBKAA HTTP 307
  • https://ml314.com/csync.ashx?fp=&person_id=5978151442431788410&eid=50082
Request Chain 92
  • https://pixel.mathtag.com/sync/img?redir=https://ml314.com/csync.ashx%3Ffp=[MM_UUID]%26person_id=5978151442431788410%26eid=50220 HTTP 302
  • https://pixel.mathtag.com/sync/img?redir=https://ml314.com/csync.ashx%3Ffp=[MM_UUID]%26person_id=5978151442431788410%26eid=50220&mm_bnc&mm_bct HTTP 302
  • https://ml314.com/csync.ashx?fp=07745bd8-d6af-4d00-9dc7-479b9143afeb&person_id=5978151442431788410&eid=50220
Request Chain 93
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D5978151442431788410 HTTP 302
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D5978151442431788410 HTTP 302
  • https://ml314.com/csync.ashx?fp=a68020edbc4215336f382d0d1c19c15f&eid=50146&person_id=5978151442431788410
Request Chain 94
  • https://ps.eyeota.net/pixel?pid=r8hrb20&t=gif HTTP 302
  • https://ps.eyeota.net/pixel/bounce/?pid=r8hrb20&t=gif HTTP 302
  • https://ml314.com/utsync.ashx?eid=50052&et=0&fp=2alV8VRg1h7-qUmr9RC89ugPpd8I9Ra9TORBGAb2IJ-4&return=https%3A%2F%2Fps.eyeota.net%2Fmatch%3Fbid%3Dr8hrb20%26uid%3Dnil HTTP 302
  • https://ml314.com/csync.ashx?fp=2alV8VRg1h7-qUmr9RC89ugPpd8I9Ra9TORBGAb2IJ-4&person_id=5978151442431788410&eid=50052&return=https%3a%2f%2fps.eyeota.net%2fmatch%3fbid%3dr8hrb20%26uid%3dnil HTTP 302
  • https://ps.eyeota.net/match?bid=r8hrb20&uid=nil
Request Chain 95
  • https://dpm.demdex.net/ibs:dpid=22052&dpuuid=5978151442431788410&redir= HTTP 302
  • https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=5978151442431788410&redir=
Request Chain 129
  • https://pixel.everesttech.net/4083/gr?ev_gb=0&url=https%3A%2F%2Fwww.everestjs.net%2Fstatic%2Fpixel_details.html%23google%3D__EFGCK__%26gsurfer%3D__EFGSURFER__%26optout%3D__EFOPTOUT__%26throttleCookie%3D__EFSYNC__%26time%3D__EFTIME__ HTTP 302
  • https://www.everestjs.net/static/pixel_details.html
Request Chain 150
  • https://sb.scorecardresearch.com/b?c1=2&c2=3005086&ns__t=1540939932682&ns_c=UTF-8&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=3005086&ns__t=1540939932682&ns_c=UTF-8&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c9=
Request Chain 152
  • https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-304254h&cg=0&cc=1&si=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp=&ts=compact&rnd=1540939932685 HTTP 302
  • https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-304254h&cg=0&cc=1&si=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp=&ts=compact&rnd=1540939932685&ja=1
Request Chain 160
  • https://cm.everesttech.net/cm HTTP 302
  • https://cm.g.doubleclick.net/pixel?google_nid=everest&google_cm&google_sc&ev_rs=1&url=/1x1&google_hm=VzlqZ213QUFBTWFZQXAxNw HTTP 302
  • https://cm.g.doubleclick.net/pixel?google_nid=everest&google_cm=&google_sc=&ev_rs=1&url=/1x1&google_hm=VzlqZ213QUFBTWFZQXAxNw&google_tc= HTTP 302
  • https://cm.everesttech.net/cm/ax?cookieid=&ev_rs=1&url=/1x1&google_gid=CAESEI5F_fSt8RgseDriF2oFWbM&google_cver=1 HTTP 302
  • https://pixel.everesttech.net/1x1
Request Chain 168
  • https://www.googleadservices.com/pagead/conversion/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&guid=ON&script=0 HTTP 302
  • https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&guid=ON&script=0&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&ocp_id=nODYW7uqNYbE7gPjxaPYDA&random=353963634&sscte=1&crd=CKrPGwiC0BsIidIb&gtd= HTTP 302
  • https://www.google.com/pagead/1p-user-list/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&random=353963634&crd=CKrPGwiJ0hsIhNAb&cdct=2&is_vtc=1&random=2879898736 HTTP 302
  • https://www.google.de/pagead/1p-user-list/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&random=353963634&crd=CKrPGwiJ0hsIhNAb&cdct=2&is_vtc=1&random=2879898736&ipr=y
Request Chain 333
  • https://sb.scorecardresearch.com/b?c1=7&c2=13739933&c3=20121515121&ns__t=1540939937894&ns_c=UTF-8&cv=3.1e&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1540939937894&ns_c=UTF-8&cv=3.1e&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c9=

362 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Redirect Chain
  • https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks
  • https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
228 KB
58 KB
Document
General
Full URL
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
9bc919db282a05a6925ee14310e2cca9085053ae8d9dd7e2e0cbfe1b93fae0ac
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.zdnet.com
:scheme
https
:path
/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
accept-encoding
gzip, deflate
cookie
fly_device=desktop; fly_geo={"countryCode": "de"}; fly_preferred_edition=eu; fly_default_edition=eu
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
server
nginx
content-type
text/html; charset=UTF-8
set-cookie
ak_bmsc=06BF6E16AF8FD69035DDB7F294B728030210BAB79817000099E0D85BA7F7B126~plS1kWSi4jsYlTjLSY7JUJTuL8VLA1NGxkx6aut9OMk+DAT0mpvVuph2z9yQcNOXE3VWRB59xtLW02eiubBX77onjYpOJ04kiIvVDLTvQNy85sRkOcbpGeRLc6QNQ0Ax8rynKmLo8D5ltzPlDcQTaSi7XmAY60YOlrkwrhVFG0APVGLKhwOvjtbnwynlttwR431KXRS4EUF4IeW6Fkpe5aW7dih8RJC63OtC4UEozLL8Q=; expires=Wed, 31 Oct 2018 00:52:09 GMT; max-age=7200; path=/; domain=.zdnet.com; HttpOnly nemo_highlander-video_focus=video_focus%3a1%3aexclude; expires=Tue, 06 Nov 2018 07:59:59 GMT; path=/; domain=.zdnet.com; secure; bm_mi=073F01AFC94B8C54534A976BFDA58936~hcv6ufrVNTKyevT2cRA/pKHmUCXZcW8JE9cbvMF3e4KWA+j4Nl/e32MANm2C4j6ONBT0MITMKGi86ydqwqTnGg9biEboF1608WmTSpiLKOMS6nqcFz6kfgADJut4C/j1c5G7CVZD45NbHkAvAVRwBbYktw3GfvtNo2dWQRpGmAMqrinDBIv21nzIAE3ieXT2tZT39fi3uY1ULZ4cwz2g95kMLJ4A4U+3Zfpsr/I+I0r79ZDsFqL7ngfC3ae4N1Sz7zEyV5QsPtp4XF4byDJZfSgn908RwFgF5Scbn6EgX44bzVfqNWWemIHufv3O9TXMDb5TbqMvxEXUaln7OubDrA==; Domain=.zdnet.com; Path=/; Max-Age=0; HttpOnly bm_mi=073F01AFC94B8C54534A976BFDA58936~hcv6ufrVNTKyevT2cRA/pKHmUCXZcW8JE9cbvMF3e4KWA+j4Nl/e32MANm2C4j6ONBT0MITMKGi86ydqwqTnGg9biEboF1608WmTSpiLKONZqC2rC4BxjvUX0CgJG0HD6edad1hXb0Cxs54hqrdPmT5n5RjwWJhiJCMhWco+TIxQi0HFvYknDAHS6YYD6akPXzeTvH2dgYYb92TCtiKebUQTial58aNwjzw5FpXXhv20OdnHPdwIj7RdwXN2RFRwubTBUbtF2wKYS/+Gmyz8QsBsC9dAZmnDaYzHwnLll6HeFCqEcCtKaYITE81YByFkHE8uAk/hCi50gUnj2eFf4w==; Domain=.zdnet.com; Path=/; Max-Age=0; HttpOnly
x-enable-esi
true
strict-transport-security
max-age=63072000; includeSubDomains; preload
vary
Accept-Encoding, User-Agent
x-akamai-transformed
9 2872 0 pmb=mTOE,4
access-control-allow-origin
https://www.zdnet.com
x-frame-options
SAMEORIGIN
content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
expires
Wed, 31 Oct 2018 00:22:09 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
referrer-policy
no-referrer-when-downgrade
x-content-type-options
nosniff
x-xss-protection
1; mode=block
x-tx-id
fe652f50-4a4f-49cd-8646-8394f1a1c8ee
content-encoding
gzip
date
Tue, 30 Oct 2018 22:52:09 GMT

Redirect headers

status
301
server
nginx
content-type
text/html
content-length
178
location
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
access-control-allow-origin
https://www.zdnet.com
date
Tue, 30 Oct 2018 22:52:08 GMT
set-cookie
fly_device=desktop; expires=Tue, 06-Nov-2018 22:52:08 GMT; path=/; domain=.zdnet.com; secure fly_geo={"countryCode": "de"}; expires=Tue, 06-Nov-2018 22:52:08 GMT; path=/; domain=.zdnet.com; secure fly_preferred_edition=eu; path=/; domain=.zdnet.com; secure fly_default_edition=eu; path=/; domain=.zdnet.com; secure
vary
Accept-Encoding, User-Agent
strict-transport-security
max-age=63072000; includeSubDomains; preload
main-6743c8f11b-rev.css
zdnet1.cbsistatic.com/fly/1531-fly/css/core/
340 KB
62 KB
Stylesheet
General
Full URL
https://zdnet1.cbsistatic.com/fly/1531-fly/css/core/main-6743c8f11b-rev.css
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
1850ed533f7bef263c3b15379882c2ff9a33ac1d097864dd0c600633665f334d

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:41:02 GMT
server
nginx
etag
W/"5bd7462e-5507b"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
63430
expires
Tue, 06 Nov 2018 22:52:10 GMT
controls-ebaf8ad91a-rev.css
zdnet3.cbsistatic.com/fly/css/video/htmlPlayerControls/
42 KB
7 KB
Stylesheet
General
Full URL
https://zdnet3.cbsistatic.com/fly/css/video/htmlPlayerControls/controls-ebaf8ad91a-rev.css
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
b47241eabf30c18bf1761e363bdc9e5b755ea4b60d71ca9d1a0b3c4f7ffefdb7

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:41:16 GMT
server
nginx
etag
W/"5bd7463c-a910"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
6704
expires
Tue, 06 Nov 2018 22:52:10 GMT
catalin-cimpanu.jpg
zdnet3.cbsistatic.com/hub/i/r/2018/08/21/a59867e9-8d75-40af-a87c-690638f8afa4/thumbnail/40x40/e9e4d21a35e101b1402c656cf979114c/
910 B
1 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/08/21/a59867e9-8d75-40af-a87c-690638f8afa4/thumbnail/40x40/e9e4d21a35e101b1402c656cf979114c/catalin-cimpanu.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
ba2fa15976662b87f31dccdd53d415b927f2118760fdafc4ac21dd2c1b234ff3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
server
nginx
status
200
etag
"c3829e4116c9d009ce51c32b304b9e46"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
public, max-age=26538047, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
868
5b72aa0160b2e1568893d64a-1280x7201aug152018113829poster.jpg
zdnet1.cbsistatic.com/hub/i/r/2018/08/15/691aecd3-728b-47a4-abe2-3742b658b4b1/thumbnail/570x322/444fcf3d71222b689b04787946295715/
7 KB
7 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2018/08/15/691aecd3-728b-47a4-abe2-3742b658b4b1/thumbnail/570x322/444fcf3d71222b689b04787946295715/5b72aa0160b2e1568893d64a-1280x7201aug152018113829poster.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
0d6baa46c3cd463a5d3f967d89f7cf48d5909c34b22f6d671cc9f0c4f929611c

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Wed, 15 Aug 2018 11:52:32 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=27166736
timing-allow-origin
*
content-length
6765
expires
Tue, 10 Sep 2019 09:11:06 GMT
advertisement.js
zdnet2.cbsistatic.com/fly/bundles/zdnetjs/js/utils/
53 B
280 B
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/bundles/zdnetjs/js/utils/advertisement.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
07b69027231d985f5bdcd4d5a539f120d26003feef6e9dc0a6b77a4b43a9b21f

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Wed, 20 Jun 2018 16:56:03 GMT
server
nginx
etag
"5b2a8723-35"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
71
expires
Tue, 06 Nov 2018 22:52:10 GMT
brazil-botnet-log.png
zdnet4.cbsistatic.com/hub/i/r/2018/09/30/7555210c-aeb1-48bb-946b-3f8e992d040c/resize/370xauto/40b9a8e2f51fd67c056d19136e0bf20e/
150 KB
150 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/hub/i/r/2018/09/30/7555210c-aeb1-48bb-946b-3f8e992d040c/resize/370xauto/40b9a8e2f51fd67c056d19136e0bf20e/brazil-botnet-log.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
61fdf37d30bf412dd87c52565f2b227ce9c3b57030950437fd0bd650d11bc035

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
server
nginx
status
200
etag
"c25007eca40e6838db7ef8e80145c70f"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
public, max-age=31481770, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
153106
a-1-dhs.jpg
zdnet4.cbsistatic.com/hub/i/r/2018/07/24/7aa8a1bb-780a-4d41-9464-2427956f7a6d/thumbnail/170x128/67b517226b29a2c342262671913d5966/
8 KB
9 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/hub/i/r/2018/07/24/7aa8a1bb-780a-4d41-9464-2427956f7a6d/thumbnail/170x128/67b517226b29a2c342262671913d5966/a-1-dhs.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
4ab6a27e7fab0d1aa86e5fb3cef44c53865862b2c8d6c076ee44409a12e6b644

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Tue, 24 Jul 2018 13:43:38 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=23036156
timing-allow-origin
*
content-length
8605
expires
Wed, 24 Jul 2019 13:48:06 GMT
a-2-fedex.jpg
zdnet3.cbsistatic.com/hub/i/r/2018/07/24/dd303a4a-5b12-4709-bef7-a35b361d8799/thumbnail/170x128/340415a9086f0e182e4b49fa34c6e277/
6 KB
6 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/07/24/dd303a4a-5b12-4709-bef7-a35b361d8799/thumbnail/170x128/340415a9086f0e182e4b49fa34c6e277/a-2-fedex.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
d05a0088d1a2c67e0707be3f7ff1823683ba849a3d3d4004d971cb58eb40d08a

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:16 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=23552210
timing-allow-origin
*
content-length
6301
expires
Tue, 30 Jul 2019 13:09:00 GMT
a-3-orbitz.jpg
zdnet1.cbsistatic.com/hub/i/r/2018/07/24/a80ee1f5-4daa-4d79-9f51-e490df5e4e78/thumbnail/170x128/5b7f27009156f63c204e0bb342bf80e2/
5 KB
5 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2018/07/24/a80ee1f5-4daa-4d79-9f51-e490df5e4e78/thumbnail/170x128/5b7f27009156f63c204e0bb342bf80e2/a-3-orbitz.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
6777cc97d90b6e3773b62f12dfc047362dd55f7610369239eafd46c109cd5380

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:16 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=23552211
timing-allow-origin
*
content-length
5115
expires
Tue, 30 Jul 2019 13:09:01 GMT
a-4-aadhaar.jpg
zdnet3.cbsistatic.com/hub/i/r/2018/07/24/3c85daea-5f11-4c91-a118-4fb0e51a1436/thumbnail/170x128/3f448909d2b440331eb0428dccbd624b/
6 KB
6 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/07/24/3c85daea-5f11-4c91-a118-4fb0e51a1436/thumbnail/170x128/3f448909d2b440331eb0428dccbd624b/a-4-aadhaar.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
2651576977d18928324a68a053a929a1acddffbbc6a04c8face239c5b489b34a

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:16 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=23552082
timing-allow-origin
*
content-length
5937
expires
Tue, 30 Jul 2019 13:06:52 GMT
a-5-lexpress.jpg
zdnet2.cbsistatic.com/hub/i/r/2018/07/24/474ea969-3cc4-4e1c-bc66-a98fe8264033/thumbnail/170x128/5aee2ed8558e0adb2c8e84b318597a04/
6 KB
6 KB
Image
General
Full URL
https://zdnet2.cbsistatic.com/hub/i/r/2018/07/24/474ea969-3cc4-4e1c-bc66-a98fe8264033/thumbnail/170x128/5aee2ed8558e0adb2c8e84b318597a04/a-5-lexpress.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
ee58d451d4c826e171525a0fb417343a42ae338fd8afb6b77613235476f89dfe

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:16 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=23552222
timing-allow-origin
*
content-length
5631
expires
Tue, 30 Jul 2019 13:09:12 GMT
china-spy-paranoia.jpg
zdnet3.cbsistatic.com/hub/i/r/2018/01/17/20e148a3-1c92-4b24-bc99-bfefef3977aa/thumbnail/170x128/a3f83da3baf69d49a269ca32f0ed3b71/
6 KB
7 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/01/17/20e148a3-1c92-4b24-bc99-bfefef3977aa/thumbnail/170x128/a3f83da3baf69d49a269ca32f0ed3b71/china-spy-paranoia.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
729d743174ed040cea87f86a9a5454920c77d53cb2b2442e941637fdeaab469d

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Thu, 25 Jan 2018 13:26:17 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=31532958
timing-allow-origin
*
content-length
6619
expires
Wed, 30 Oct 2019 22:01:28 GMT
macbook-air-t2.jpg
zdnet4.cbsistatic.com/hub/i/r/2018/10/30/aba65549-4597-4fd7-a5a3-ff385edbd558/thumbnail/170x128/61a71b75f5802dde67ad5086aa52f346/
2 KB
2 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/hub/i/r/2018/10/30/aba65549-4597-4fd7-a5a3-ff385edbd558/thumbnail/170x128/61a71b75f5802dde67ad5086aa52f346/macbook-air-t2.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
33a177bffe6c9cfbc0d891362161de8bf268c106edc77b87de697888e2d6d5ac

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
server
nginx
status
200
etag
"0233f3bb964cf325a30f8b1c2ed2da93"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
public, max-age=31525762, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
2245
decrypted-lock.png
zdnet4.cbsistatic.com/hub/i/r/2018/10/30/c0aa7f70-8c24-47f6-9aad-7b31ad1fba7a/thumbnail/170x128/f6f385351fd9e1f7e90fafeea2c6b906/
19 KB
19 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/hub/i/r/2018/10/30/c0aa7f70-8c24-47f6-9aad-7b31ad1fba7a/thumbnail/170x128/f6f385351fd9e1f7e90fafeea2c6b906/decrypted-lock.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
09ee3d95bf4c05be8568f5214f9b48ff244e6d27e7f95da4d8fb252246bf726e

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
server
nginx
status
200
etag
"ba01f7779044c1ca322b725274f04d35"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
public, max-age=31513554, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
19001
istock-ransomware-on-laptop.jpg
zdnet1.cbsistatic.com/hub/i/r/2018/01/25/7c8e0e80-0861-41b1-8ec3-fe8f1ca26ae9/thumbnail/170x128/5e4b61e2444c96d583eb0ea0c609adb5/
11 KB
10 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2018/01/25/7c8e0e80-0861-41b1-8ec3-fe8f1ca26ae9/thumbnail/170x128/5e4b61e2444c96d583eb0ea0c609adb5/istock-ransomware-on-laptop.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
f064de9e559cb4483bff51b21a1d7a36ba057126778f6ecd8dca5329c190a9ee

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Fri, 26 Jan 2018 10:57:50 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=31504118
timing-allow-origin
*
content-length
10209
expires
Wed, 30 Oct 2019 14:00:48 GMT
screen-shot-2018-10-30-at-09-03-28.png
zdnet1.cbsistatic.com/hub/i/r/2018/10/30/9e1fa2a5-fbeb-42c2-bf95-3de40d26d436/thumbnail/170x128/c2d5a3d2ed96418786c9c0347cab075b/
57 KB
57 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2018/10/30/9e1fa2a5-fbeb-42c2-bf95-3de40d26d436/thumbnail/170x128/c2d5a3d2ed96418786c9c0347cab075b/screen-shot-2018-10-30-at-09-03-28.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
9b8a19af975870b49a3d4d941b65613ef40b35ffff646e4667701d9e23e481da

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
server
nginx
status
200
etag
"2870b16a188ad117f3a892b931401ea5"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
public, max-age=31499106, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
58009
screen-shot-2018-10-26-at-13-37-12.png
zdnet3.cbsistatic.com/hub/i/r/2018/10/26/a5e9cd3f-bb54-4fba-b1ec-23a5af6bf357/thumbnail/170x128/8cc963bbf767eb84937a440fdb69cad4/
35 KB
35 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/10/26/a5e9cd3f-bb54-4fba-b1ec-23a5af6bf357/thumbnail/170x128/8cc963bbf767eb84937a440fdb69cad4/screen-shot-2018-10-26-at-13-37-12.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
ba34757c29dec9b09a7783e13122d0832ea84985249bcd283048eb714a08a426

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
server
nginx
status
200
etag
"107aca10b9fd0bb976953ad54c934f05"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
public, max-age=31497052, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
35383
screen-shot-2018-10-30-at-11-06-08.png
zdnet3.cbsistatic.com/hub/i/r/2018/10/30/577f802a-8e0c-41c4-a669-8c26b09114a3/thumbnail/170x128/80d56509d4fb6ee696e60d28b6c59434/
59 KB
59 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/10/30/577f802a-8e0c-41c4-a669-8c26b09114a3/thumbnail/170x128/80d56509d4fb6ee696e60d28b6c59434/screen-shot-2018-10-30-at-11-06-08.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
b35a95a86cc71364688d5c031e3ea4da928c773c564fdbb76ece333ca8f1b3c7

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
server
nginx
status
200
etag
"51050c73c53b9b04bc45602359b3d0fd"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
public, max-age=31493751, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
60089
burgess-macgibbon.png
zdnet3.cbsistatic.com/hub/i/r/2018/05/30/bfbf0b33-c0c8-41cd-a5f5-f56f66e2972b/thumbnail/170x128/cfe30ce517576a41e1aa67d7124b036a/
38 KB
39 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/05/30/bfbf0b33-c0c8-41cd-a5f5-f56f66e2972b/thumbnail/170x128/cfe30ce517576a41e1aa67d7124b036a/burgess-macgibbon.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
2bb8e607aa914110121eb1e2d4a65514285c78342811558156449443f644cf7b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Wed, 30 May 2018 02:19:54 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=31455949
timing-allow-origin
*
content-length
39249
expires
Wed, 30 Oct 2019 00:37:59 GMT
recaptchav3.png
zdnet1.cbsistatic.com/hub/i/r/2018/10/30/c23ac0b1-25b8-447a-8425-75e04bce7b0f/thumbnail/170x128/f6737f13d21313c4decedacde0a58f60/
6 KB
6 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2018/10/30/c23ac0b1-25b8-447a-8425-75e04bce7b0f/thumbnail/170x128/f6737f13d21313c4decedacde0a58f60/recaptchav3.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
3988f709c09d423be46f08ad2547895597522365a2ef41a233f6d270d284e5a6

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
server
nginx
status
200
etag
"17b65afe58c49edc1bdd812c554ee3bb"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
public, max-age=31454570, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
5954
require-2.1.2.js
zdnet2.cbsistatic.com/fly/1531-fly/js/libs/
16 KB
6 KB
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
f96f203f5605c9f56e7f6f97caf6ea84f122872ec3c5ac1f9037a1b508c706ee

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:40:51 GMT
server
nginx
etag
W/"5bd74623-3f09"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
6305
expires
Tue, 06 Nov 2018 22:52:10 GMT
evidon-sitenotice-tag.js
c.evidon.com/sitenotice/
35 KB
10 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.111.244.243 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-244-243.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
89b08981d2dcbbc50524744f8d3beee8e325096b9030f5bbb0244f5e93bc57dc

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:10 GMT
Content-Encoding
gzip
Last-Modified
Thu, 25 Oct 2018 19:32:09 GMT
Server
Apache
ETag
"34aa447057e60d0ba6fc437edc504c4a:1540495929"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=86400, private;max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
9531
Expires
Wed, 31 Oct 2018 22:52:10 GMT
country.js
c.evidon.com/geo/
260 B
490 B
Script
General
Full URL
https://c.evidon.com/geo/country.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.111.244.243 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-244-243.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
f9784f57729f84391b084eed9e944e048f771129d65e9b58f34095fdfba86473

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:10 GMT
Content-Encoding
gzip
Last-Modified
Wed, 30 May 2018 22:23:16 GMT
Server
Apache
ETag
"c1e367d098d326049811561575dbda4a:1527718996"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
165
snthemes.js
c.evidon.com/sitenotice/425/
65 KB
4 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/425/snthemes.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.111.244.243 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-244-243.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
b50a701e3677d3b9810ddf2d0a775c976210f5c433926d515b24e0d62b6e3af4

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:10 GMT
Content-Encoding
gzip
Last-Modified
Mon, 15 Oct 2018 17:28:06 GMT
Server
Apache
ETag
"86a61dd217ea8f7fd69b9bda762e95e6:1539624486"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=86400, private;max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
3602
Expires
Wed, 31 Oct 2018 22:52:10 GMT
settings.js
c.evidon.com/sitenotice/425/zdnet/
15 KB
2 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/425/zdnet/settings.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.111.244.243 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-244-243.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
1b91058b5969c2319ee3f3efb2b91ccf388c64fe22f806e59b0edb43694150d4

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:10 GMT
Content-Encoding
gzip
Last-Modified
Tue, 28 Aug 2018 21:08:55 GMT
Server
Apache
ETag
"09891370db88cdd3a58c49f5cd396b85:1535490535"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=86400, private;max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1239
Expires
Wed, 31 Oct 2018 22:52:10 GMT
truncated
/
917 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d2fe67ecc4354b214728e0a7d75b67536a78f6b575080b589d54a1937fc46b41

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/jpeg
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1724d7fd70903754d6f29172f2ac879dc6dab79df6c4c78ed06f45c0f117e15c

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/jpeg
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ceffb891c3e1891757ead2e7e41497adc13abca0d14d7f58d20e3aa8d5aee108

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/jpeg
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1c0ccb11374e2374cb7a52c792ffe07d9203d28d4ad97623bcf27bc58d2513f9

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/jpeg
mag-white01.png
zdnet2.cbsistatic.com/fly/1540834645-fly/bundles/zdnetcss/images/core/
1 KB
1 KB
Image
General
Full URL
https://zdnet2.cbsistatic.com/fly/1540834645-fly/bundles/zdnetcss/images/core/mag-white01.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
69721aa2f1085046c84d1943a1daa0515be8e2f060c21063024ea117789e425c

Request headers

Referer
https://zdnet1.cbsistatic.com/fly/1531-fly/css/core/main-6743c8f11b-rev.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:37:25 GMT
server
nginx
etag
W/"5bd74555-4f1"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
936
expires
Tue, 06 Nov 2018 22:52:10 GMT
Raleway-Bold.woff2
zdnet1.cbsistatic.com/bundles/zdnetcss/fonts/raleway/
25 KB
25 KB
Font
General
Full URL
https://zdnet1.cbsistatic.com/bundles/zdnetcss/fonts/raleway/Raleway-Bold.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.211.9.67 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-211-9-67.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
bf413671ac4278a51bc9621af98e7f5a6cdbb228ecda66602f7e02ea27b28d13

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://zdnet1.cbsistatic.com/fly/1531-fly/css/core/main-6743c8f11b-rev.css
Origin
https://www.zdnet.com

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
last-modified
Wed, 20 Jun 2018 16:56:01 GMT
server
nginx
etag
"5b2a8721-6348"
status
200
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=23806884
accept-ranges
bytes
timing-allow-origin
*
content-length
25416
expires
Fri, 02 Aug 2019 11:53:34 GMT
Raleway-Regular.woff2
zdnet1.cbsistatic.com/bundles/zdnetcss/fonts/raleway/
25 KB
25 KB
Font
General
Full URL
https://zdnet1.cbsistatic.com/bundles/zdnetcss/fonts/raleway/Raleway-Regular.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.211.9.67 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-211-9-67.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
6987f5dab3ced7612887b80ca2de81041654a6434970e1cbbb03c293dd47ce0b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://zdnet1.cbsistatic.com/fly/1531-fly/css/core/main-6743c8f11b-rev.css
Origin
https://www.zdnet.com

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
last-modified
Wed, 20 Jun 2018 16:56:01 GMT
server
nginx
etag
"5b2a8721-6398"
status
200
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=23806994
accept-ranges
bytes
timing-allow-origin
*
content-length
25496
expires
Fri, 02 Aug 2019 11:55:24 GMT
Raleway-Light.woff2
zdnet1.cbsistatic.com/bundles/zdnetcss/fonts/raleway/
25 KB
25 KB
Font
General
Full URL
https://zdnet1.cbsistatic.com/bundles/zdnetcss/fonts/raleway/Raleway-Light.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.211.9.67 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-211-9-67.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
7017fe26514320eea8b02069a2ec814953fc7f78d3513ab52c4c80108d112b56

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://zdnet1.cbsistatic.com/fly/1531-fly/css/core/main-6743c8f11b-rev.css
Origin
https://www.zdnet.com

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
last-modified
Wed, 20 Jun 2018 16:56:01 GMT
server
nginx
etag
"5b2a8721-63ac"
status
200
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=23806852
accept-ranges
bytes
timing-allow-origin
*
content-length
25516
expires
Fri, 02 Aug 2019 11:53:02 GMT
en.js
c.evidon.com/sitenotice/425/translations/
205 KB
7 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/425/translations/en.js
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.111.244.243 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-244-243.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
2b4b44954ecddf65e5391cb2df9f86cffc2979ebe88399bac1d61e5e918b8ed6

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:10 GMT
Content-Encoding
gzip
Last-Modified
Tue, 18 Sep 2018 15:06:56 GMT
Server
Apache
ETag
"c0ff937f678b15708f165faee2bf7d8f:1537283216"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=86400, private;max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
6758
Expires
Wed, 31 Oct 2018 22:52:10 GMT
ring-animated.svg
zdnet3.cbsistatic.com/fly/1540834645-fly/bundles/zdnetcss/images/video/
704 B
576 B
Image
General
Full URL
https://zdnet3.cbsistatic.com/fly/1540834645-fly/bundles/zdnetcss/images/video/ring-animated.svg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
0025565f0cddfceb7ebdbc4b21d2552c894998e443153f97a6e8b353dfd9bebd

Request headers

Referer
https://zdnet3.cbsistatic.com/fly/css/video/htmlPlayerControls/controls-ebaf8ad91a-rev.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:37:25 GMT
server
nginx
status
200
etag
"5bd74555-2c0"
vary
Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
max-age=31438475
accept-ranges
bytes
timing-allow-origin
*
content-length
364
expires
Tue, 29 Oct 2019 19:46:45 GMT
play.svg
zdnet1.cbsistatic.com/fly/1540834645-fly/bundles/zdnetcss/images/video/
299 B
424 B
Image
General
Full URL
https://zdnet1.cbsistatic.com/fly/1540834645-fly/bundles/zdnetcss/images/video/play.svg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
d5e9dfd6066c2872be4f85c25aa0186402b124ea3f80152e2e2b767906793284

Request headers

Referer
https://zdnet3.cbsistatic.com/fly/css/video/htmlPlayerControls/controls-ebaf8ad91a-rev.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:37:25 GMT
server
nginx
status
200
etag
"5bd74555-12b"
vary
Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
max-age=31438495
accept-ranges
bytes
timing-allow-origin
*
content-length
213
expires
Tue, 29 Oct 2019 19:47:05 GMT
Raleway-Black.woff2
zdnet1.cbsistatic.com/bundles/zdnetcss/fonts/raleway/
25 KB
25 KB
Font
General
Full URL
https://zdnet1.cbsistatic.com/bundles/zdnetcss/fonts/raleway/Raleway-Black.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.211.9.67 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-211-9-67.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
c9f9ded1c66d9f290eeb0fadad73f3bba0d8cc2c784b078e9b00eca200eca125

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://zdnet1.cbsistatic.com/fly/1531-fly/css/core/main-6743c8f11b-rev.css
Origin
https://www.zdnet.com

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
last-modified
Wed, 20 Jun 2018 16:56:01 GMT
server
nginx
etag
"5b2a8721-624c"
status
200
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=23806841
accept-ranges
bytes
timing-allow-origin
*
content-length
25164
expires
Fri, 02 Aug 2019 11:52:51 GMT
truncated
/
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/gif
logo.png
zdnet4.cbsistatic.com/fly/1540834645-fly/bundles/zdnetcss/images/core/
4 KB
4 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/fly/1540834645-fly/bundles/zdnetcss/images/core/logo.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
ff2ae991ac0efdb5ae8b4428ba8555a0aeb0fd94b8014ce290c484242c524097

Request headers

Referer
https://zdnet1.cbsistatic.com/fly/1531-fly/css/core/main-6743c8f11b-rev.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:37:25 GMT
server
nginx
etag
W/"5bd74555-1009"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
4128
expires
Tue, 06 Nov 2018 22:52:10 GMT
ls-zdnet.js
js-sec.indexww.com/ht/
85 KB
26 KB
Script
General
Full URL
https://js-sec.indexww.com/ht/ls-zdnet.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
d6e6bd9d40a807b7402dd2c2b74700d0790e0733718a4343c2a6fa140da3a62e

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:10 GMT
Content-Encoding
gzip
Last-Modified
Tue, 30 Oct 2018 22:15:06 GMT
Server
Apache
ETag
"9049a9-15269-57979849aa701"
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=1444
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
text/javascript
Content-Length
26182
Expires
Tue, 30 Oct 2018 23:16:14 GMT
YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
c.go-mpulse.net/boomerang/ Frame E7AF
187 KB
55 KB
Script
General
Full URL
https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.60.198.210 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-60-198-210.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e0b8436d50fb200de76d7a25cf450ea238cd100197f8e9d462e9228153da873f

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:10 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/javascript;charset=UTF-8
Cache-Control
max-age=604800, s-maxage=604800
Transfer-Encoding
chunked
Connection
keep-alive, Transfer-Encoding
Timing-Allow-Origin
*
gpt.js
www.googletagservices.com/tag/js/
24 KB
9 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:821::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cbe1f033ed03b9f1b425c1ad45d6406f019fe8666c20ab24fb6719579f75065b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"9 / 949 of 1000 / last-modified: 1540922836"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
8892
x-xss-protection
1; mode=block
expires
Tue, 30 Oct 2018 22:52:10 GMT
sfp.js
native.sharethrough.com/assets/
365 KB
106 KB
Script
General
Full URL
https://native.sharethrough.com/assets/sfp.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.93.44 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-93-44.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
317b0ea8b9c2cae32b9f43e01d0a95803172e6b928ba36546261eee53f1f59ee

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 20:04:46 GMT
content-encoding
gzip
last-modified
Tue, 30 Oct 2018 20:04:43 GMT
server
AmazonS3
age
2845
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=3600
x-amz-cf-id
zmUhzqXhTtQaJvcm8mqumtIDuhRjYiQAF-1p4aIddcxAzwbHz55ocg==
via
1.1 60a935292c9892b0b7f9e56f65af863a.cloudfront.net (CloudFront)
expires
Tue, 30 Oct 2018 21:04:41 GMT
evidon-banner.js
c.evidon.com/sitenotice/
8 KB
3 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/evidon-banner.js
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.111.244.243 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-244-243.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
186e5821720593367310d36fc9e71747518897853d453a6823194d0004b51f16

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:10 GMT
Content-Encoding
gzip
Last-Modified
Thu, 25 Oct 2018 19:32:10 GMT
Server
Apache
ETag
"ac8d1520b10feab378ed0c2e13a475a0:1540495931"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=86400, private;max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2507
Expires
Wed, 31 Oct 2018 22:52:10 GMT
18863
l.betrad.com/site/v3/425/3445/3/1/2/2/
0
120 B
Image
General
Full URL
https://l.betrad.com/site/v3/425/3445/3/1/2/2/18863?consent=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.48.193 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-48-193.compute-1.amazonaws.com
Software
/ Express
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
x-powered-by
Express
etag
W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI"
vary
Accept-Encoding
main.default.js
zdnet3.cbsistatic.com/fly/1531-fly/js/
204 KB
69 KB
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/1531-fly/js/main.default.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
6c65a8205295ee9b8a16e60080102aa2125add70f44910fef31523649d252ac0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:40:53 GMT
server
nginx
etag
W/"5bd74625-330a4"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
70573
expires
Tue, 06 Nov 2018 22:52:10 GMT
18863
l.betrad.com/site/v3/425/3445/3/4/2/2/
0
120 B
Image
General
Full URL
https://l.betrad.com/site/v3/425/3445/3/4/2/2/18863?consent=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.48.193 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-48-193.compute-1.amazonaws.com
Software
/ Express
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
x-powered-by
Express
etag
W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI"
vary
Accept-Encoding
rid
match.adsrvr.org/track/
109 B
513 B
XHR
General
Full URL
https://match.adsrvr.org/track/rid?ttd_pid=casale&fmt=json&p=184216
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.50.182.20 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-50-182-20.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
23e9daa10cae0ae10331dea2810980b4f670e0dbfb318797ccb598055e6ff9ee

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
x-aspnet-version
4.0.30319
status
200
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.zdnet.com
cache-control
private
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Content-Length, Content-Encoding, Vary, Cache-Control, Accept
content-length
109
expires
Thu, 29 Nov 2018 22:52:10 GMT
integrator.js
adservice.google.de/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:820::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
integrator.js
adservice.google.com/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81a::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
pubads_impl_270.js
securepubads.g.doubleclick.net/gpt/
184 KB
63 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_270.js?21062715
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
sffe /
Resource Hash
516b065177d1546683627fa32c8574fd59edc3eb3bf92cef5882d53e58d7a1f2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 24 Oct 2018 15:56:38 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
64036
x-xss-protection
1; mode=block
expires
Tue, 30 Oct 2018 22:52:10 GMT
require.optional-dependency.js
zdnet4.cbsistatic.com/fly/js/libs/
582 B
518 B
Script
General
Full URL
https://zdnet4.cbsistatic.com/fly/js/libs/require.optional-dependency.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
f27c0c9f284c6959dd7db1e768c6e43a518ea650afc69d7a60383f3a963cde7b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 16:42:46 GMT
server
nginx
etag
"5b5f4006-246"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
307
expires
Tue, 06 Nov 2018 22:52:10 GMT
utag.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
94 KB
19 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/418F) /
Resource Hash
37594bf5cea078e78adfeaee203437d94166b7d2c073b5c3c170a1ba730eca01

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:20:43 GMT
server
ECS (fcn/418F)
etag
"241996515"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=300
accept-ranges
bytes
content-length
19623
expires
Tue, 30 Oct 2018 22:57:10 GMT
config.json
c.go-mpulse.net/api/ Frame E7AF
2 KB
1 KB
XHR
General
Full URL
https://c.go-mpulse.net/api/config.json?key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&d=www.zdnet.com&t=5136466&v=1.571.0&if=&sl=0&si=hm2r12hpln-NaN&plugins=ConfigOverride,Continuity,PageParams,IFrameDelay,AutoXHR,SPA,Angular,Backbone,Ember,History,RT,CrossDomain,BW,PaintTiming,NavigationTiming,ResourceTiming,Memory,CACHE_RELOAD,Errors,TPAnalytics,UserTiming,LOGN&acao=
Requested by
Host: c.go-mpulse.net
URL: https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.60.198.210 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-60-198-210.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c67e5c86a702ef23d3197cccef739cefd32fcdab3ccef2e7c0314fa1914adbaa

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com

Response headers

Date
Tue, 30 Oct 2018 22:52:10 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/json
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
private, max-age=300, stale-while-revalidate=60, stale-if-error=120
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
693
isInternalUser.js
iicbsi-a.akamaihd.net/common/js/esi/
28 B
268 B
Script
General
Full URL
https://iicbsi-a.akamaihd.net/common/js/esi/isInternalUser.js?cb=cbsiInternal
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2a02:26f0:6c00::210:ba1b , European Union, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
Apache /
Resource Hash
3c599ef176cecdb3de25c6c36bc2945b92c12bcbc2ab03350729f4de296b53b8

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:10 GMT
Cache-Control
max-age=298710
Server
Apache
Connection
keep-alive
ETag
"fb25287978f1b619e801f164a2dfd9ea:1473886414"
Content-Length
28
Content-Type
application/x-javascript
vglnk.js
cdn.viglink.com/api/
81 KB
28 KB
Script
General
Full URL
https://cdn.viglink.com/api/vglnk.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:a10d , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
009396e873c2f93482891861160df34a0a69bd1beaad7c5fc04d8dd36e4eec44

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
cf-cache-status
HIT
x-amz-request-id
BC4F97BA1F106EBB
status
200
content-length
28397
x-amz-id-2
J8zmvgfNzG4CAbCbuLht/1b8lYutez8aSXvKTUEfg4it7wLnVKLnn+V6bClwRuRWkmHXuBQrHDM=
last-modified
Wed, 24 Oct 2018 20:32:46 GMT
server
cloudflare
etag
"8132bd22613a0bbbdd73866340c33ab1"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=1800
accept-ranges
bytes
cf-ray
472173658c76646f-FRA
expires
Tue, 30 Oct 2018 23:22:10 GMT
utag.1783.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
1 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1783.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41AA) /
Resource Hash
4d049d83eef469c1f2cc0f5df820144ff6c5eb896b4e4aa2e681a1cba7d622a9

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Wed, 15 Mar 2017 15:25:15 GMT
server
ECS (fcn/41AA)
etag
"3913321605"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1130
expires
Wed, 14 Nov 2018 22:52:10 GMT
utag.1779.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
3 KB
2 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1779.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/4197) /
Resource Hash
cd5e6512fdbb698425174148dba05f72357a3b1944413f8812c55c4025d3d562

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Mon, 11 Jul 2016 20:43:57 GMT
server
ECS (fcn/4197)
etag
"392561602"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1785
expires
Wed, 14 Nov 2018 22:52:10 GMT
utag.1782.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
1 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1782.js?utv=ut4.43.201810291720
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FA) /
Resource Hash
791b7ff5657f9c41e24adaa1f6f5a4dc51046d292b25b01a5a8d152ff4a951ac

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:20:42 GMT
server
ECS (fcn/40FA)
etag
"3447796852+gzip"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1071
expires
Wed, 14 Nov 2018 22:52:10 GMT
utag.1787.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
142 KB
48 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FA) /
Resource Hash
694d40f6c8eb9760993e74b773dbb2cf3822ccb7f14a6d28320927cc5f9bad90

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Wed, 19 Sep 2018 18:08:20 GMT
server
ECS (fcn/40FA)
etag
"2497861228"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
48637
expires
Wed, 14 Nov 2018 22:52:10 GMT
utag.1790.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
956 B
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1790.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/4199) /
Resource Hash
10113bad06fefd5698a45480ffaedd421c6e06f9dbd0d1c772b7128bbea0842d

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Mon, 01 Aug 2016 14:31:10 GMT
server
ECS (fcn/4199)
etag
"2267415266"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
872
expires
Wed, 14 Nov 2018 22:52:10 GMT
utag.1791.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
1 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1791.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/4185) /
Resource Hash
7eae865fd7c820936603897a072b7ddd77b2c74e8022160fd19792291a63fac8

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Mon, 01 Aug 2016 14:31:10 GMT
server
ECS (fcn/4185)
etag
"3334871598"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1196
expires
Wed, 14 Nov 2018 22:52:10 GMT
utag.1792.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
4 KB
2 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1792.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40E2) /
Resource Hash
dabf73474662398f4f686a1b3103542f53384dd6241e6ac13f8ba535c6372aff

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Thu, 28 Jul 2016 14:28:47 GMT
server
ECS (fcn/40E2)
etag
"2022868805"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1664
expires
Wed, 14 Nov 2018 22:52:10 GMT
utag.1797.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
967 B
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1797.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40D6) /
Resource Hash
3ff065de0d90b0510727a72c173d05652c30967c5e6561dbf1d82fa077cabb22

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Wed, 25 Jan 2017 20:07:58 GMT
server
ECS (fcn/40D6)
etag
"1907756232"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
883
expires
Wed, 14 Nov 2018 22:52:10 GMT
utag.1800.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
995 B
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1800.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41A7) /
Resource Hash
e9b3eb7f022396e969766ad5e908b21df0b646c943e149902c64de590e9549d9

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Mon, 07 Aug 2017 22:40:35 GMT
server
ECS (fcn/41A7)
etag
"3890296134"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
912
expires
Wed, 14 Nov 2018 22:52:10 GMT
article-24f3426aea-rev.js
zdnet4.cbsistatic.com/fly/js/pages/
125 KB
35 KB
Script
General
Full URL
https://zdnet4.cbsistatic.com/fly/js/pages/article-24f3426aea-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
b836eb7325ac607513eaacb51a19639451d3fb357168f991c29bd6e9d9f250af

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Thu, 11 Oct 2018 15:17:41 GMT
server
nginx
etag
W/"5bbf6995-1f441"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
35342
expires
Tue, 06 Nov 2018 22:52:10 GMT
pixel.gif
cdn.viglink.com/images/
43 B
102 B
Image
General
Full URL
https://cdn.viglink.com/images/pixel.gif?ch=1&rn=1.125355062187557
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:a10d , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
89fe0ee6020314794fc2cfeacf3d10c31050cfe56f8ebddf1ed0a33fbe941fa7

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
cf-cache-status
HIT
last-modified
Tue, 10 Feb 2015 03:29:39 GMT
server
cloudflare
x-amz-request-id
16F2CAE6550D8A7A
etag
"221d8352905f2c38b3cb2bd191d630b0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=15, must-revalidate
accept-ranges
bytes
cf-ray
47217365bca1646f-FRA
content-length
43
x-amz-id-2
kn9W1C5w2RdjvPchL5jhV5QRYPujzpKW6xws+vl851eH3ychyZod7sgg6E5NuBtnLDBs+JbcXHQ=
pixel.gif
cdn.viglink.com/images/
43 B
102 B
Image
General
Full URL
https://cdn.viglink.com/images/pixel.gif?ch=2&rn=1.125355062187557
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:a10d , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
89fe0ee6020314794fc2cfeacf3d10c31050cfe56f8ebddf1ed0a33fbe941fa7

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
cf-cache-status
HIT
last-modified
Tue, 10 Feb 2015 03:29:39 GMT
server
cloudflare
x-amz-request-id
16F2CAE6550D8A7A
etag
"221d8352905f2c38b3cb2bd191d630b0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=15, must-revalidate
accept-ranges
bytes
cf-ray
47217365bca2646f-FRA
content-length
43
x-amz-id-2
kn9W1C5w2RdjvPchL5jhV5QRYPujzpKW6xws+vl851eH3ychyZod7sgg6E5NuBtnLDBs+JbcXHQ=
lightbox.js
www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/ Frame C1AA
321 B
448 B
Script
General
Full URL
https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/lightbox.js?cb=1540939930534&lv=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:4ea5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
18e110ff918c99541657918aa03e2f59e43e5490ac8f7d7fa84ad19ab622db0c

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
cf-cache-status
HIT
cf-bgj
minify
server
cloudflare
x-powered-by
ASP.NET
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cf-ray
47217365dd67c2c4-FRA
tag.aspx
ml314.com/
23 KB
11 KB
Script
General
Full URL
https://ml314.com/tag.aspx?3092018
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1782.js?utv=ut4.43.201810291720
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.246.247.78 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-246-247-78.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
2ccd728594ce65fa7e6651109e3bbd61877e548c4dab5480cafa6965f358a4e0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:09 GMT
Content-Encoding
gzip
Last-Modified
Tue, 30 Oct 2018 21:47:24 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, max-age=82513
Connection
keep-alive
Content-Length
11039
Expires
Wed, 31 Oct 2018 21:47:24 GMT
ds.js
dw.cbsi.com/js/cbsi/
18 KB
7 KB
Script
General
Full URL
https://dw.cbsi.com/js/cbsi/ds.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1790.js?utv=ut4.43.201805241512
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.30.224.172 Fort Lauderdale, United States, ASN6623 (CBSI-1 - CBS Interactive Inc., US),
Reverse DNS
phx1-dw-cbsi-xw-lb.cnet.com
Software
Apache/2.4.25 /
Resource Hash
d696da403b0169c2191d0ec0b0fcdaa85487b21b19fd58f4b1fb5b9edf40b153

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:10 GMT
Content-Encoding
gzip
Last-Modified
Wed, 13 Sep 2017 19:06:40 GMT
Server
Apache/2.4.25
ETag
"1917-55916dc13f000"
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=43200, s-maxage=1800
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=80, max=960
Content-Length
6423
Expires
Tue, 30 Oct 2018 23:22:10 GMT
st.v3.js
www.everestjs.net/static/
17 KB
6 KB
Script
General
Full URL
https://www.everestjs.net/static/st.v3.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.8.8.176 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-8-8-176.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
35733dd71de077b039d2bac6614c78eb3ab7d3879cb307cc10cc1907d2f61eb6

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:10 GMT
Content-Encoding
gzip
Last-Modified
Tue, 09 Oct 2018 10:27:09 GMT
Server
Apache
ETag
"12803d6-4205-577c92e263c39"
Vary
Accept-Encoding
Content-Type
text/javascript
Cache-Control
max-age=16017
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
5509
Expires
Wed, 31 Oct 2018 03:19:07 GMT
tag.js
js.agkn.com/prod/v0/
3 KB
3 KB
Script
General
Full URL
https://js.agkn.com/prod/v0/tag.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1800.js?utv=ut4.43.201805241512
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:200c:7e00:15:efbc:e300:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
faf50b9ffe58f834c4796d588923150c2a2ed752b0d670e32293827b6038c758

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Sun, 21 Oct 2018 23:15:26 GMT
via
1.1 e72ed739d85b0c5633dfd1f214a1adca.cloudfront.net (CloudFront)
last-modified
Thu, 18 Oct 2018 23:14:55 GMT
server
AmazonS3
age
85002
etag
"3523ddc9e3dce225ce1cfd9244246dc3"
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
3134
x-amz-cf-id
8Xwvptdqcq8f_vvU81jc5iJaDP8KSXjJMzX-qbYb1Pt1wmmOoQPCfA==
cbsinteractive.js
tru.am/scripts/custom/
2 KB
1 KB
Script
General
Full URL
https://tru.am/scripts/custom/cbsinteractive.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1797.js?utv=ut4.43.201805241512
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700:20::6819:a222 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
8a27fab6c5a0b1db438219c7d24ce2fff95e0910378fe4bdeb64b4f970eebccc

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Tue, 23 Jan 2018 19:10:31 GMT
server
cloudflare
etag
"8c3752e674fdabefc911d5c40f71780d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=14400
cf-ray
47217365f93164ed-FRA
expires
Wed, 31 Oct 2018 02:52:10 GMT
user.js
www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/ Frame C1AA
551 KB
120 KB
Script
General
Full URL
https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/user.js?cb=636754604557185965
Requested by
Host: www.lightboxcdn.com
URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/lightbox.js?cb=1540939930534&lv=1
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:4ea5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
3544c18bb4d954e8f42793b40c495a703718155222054639fd3be53139e0a363

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
cf-cache-status
HIT
content-md5
BsS3lyySk0m16t32fpLXVA==
cf-polished
origSize=915904
status
200
last-modified
Mon, 15 Oct 2018 20:59:40 GMT
x-ms-lease-status
unlocked
cf-bgj
minify
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
x-ms-request-id
54cc4450-d01e-00ca-094a-6ac60c000000
cache-control
public, max-age=31536000
x-ms-version
2009-09-19
cf-ray
47217365fda7c2c4-FRA
expires
Wed, 30 Oct 2019 22:52:10 GMT
anonc.js
dw.cbsi.com/
73 B
620 B
Script
General
Full URL
https://dw.cbsi.com/anonc.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.30.224.172 Fort Lauderdale, United States, ASN6623 (CBSI-1 - CBS Interactive Inc., US),
Reverse DNS
phx1-dw-cbsi-xw-lb.cnet.com
Software
Apache/2.4.25 /
Resource Hash
869ae907506390d8c2e636064ddd91a84705ce6a7c6eb9cbb8156b6be4dab4ec

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:10 GMT
Server
Apache/2.4.25
Etag
BZn/LVvY4Jo4qcgxTbo.1.dw_anonc
P3P
CP="CAO DSP COR CURa ADMa DEVa PSAa PSDa IVAi IVDi CONi OUR OTRi IND PHY ONL UNI FIN COM NAV INT DEM STA"
Cache-control
private, max-age=43200, s-max-age=0
Connection
Keep-Alive
Content-Type
application/javascript
Keep-Alive
timeout=80, max=534
Content-Length
73
Expires
Mon, 05 Jan 1970 12:12:12 GMT
zdnet-video-62b9e41c43-rev.js
zdnet1.cbsistatic.com/fly/js/components/
23 KB
8 KB
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/components/zdnet-video-62b9e41c43-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
901fc3206be099c4dc64931428fe93dc4a2130063aaba7e94090303ded1397a0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:40:49 GMT
server
nginx
etag
W/"5bd74621-5c35"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
7534
expires
Tue, 06 Nov 2018 22:52:10 GMT
video-playlist-connector-008b49b7a1-rev.js
zdnet2.cbsistatic.com/fly/js/components/
4 KB
2 KB
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/js/components/video-playlist-connector-008b49b7a1-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
a20c788fad1957d4bcd135b761c2ede3fd3ddc4a1b9a5ed0c565be047fe7e3f0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Thu, 30 Aug 2018 18:58:31 GMT
server
nginx
etag
W/"5b883e57-1194"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
1560
expires
Tue, 06 Nov 2018 22:52:10 GMT
Cookie set /
d.agkn.com/iframe/8613/ Frame 3C8B
0
0
Document
General
Full URL
https://d.agkn.com/iframe/8613/?che=587267178&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bpid=cbsinteractive&c=%7B%22bpid%22%3A%22cbsinteractive%22%2C%22loc%22%3A%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F%22%2C%22ref%22%3A%22-1%22%2C%22cid%22%3A%22-1%22%2C%22sid%22%3A%22-1%22%2C%22gen%22%3A%22-1%22%2C%22age%22%3A%22-1%22%2C%22cat%22%3A%22-1%22%2C%22brd%22%3A%22-1%22%7D
Requested by
Host: js.agkn.com
URL: https://js.agkn.com/prod/v0/tag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.208.88.219 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-208-88-219.eu-west-1.compute.amazonaws.com
Software
Apache-Coyote/1.1 /
Resource Hash

Request headers

Host
d.agkn.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Cache-Control
no-cache, must-revalidate
Content-Type
text/html;charset=UTF-8
Date
Tue, 30 Oct 2018 22:52:10 GMT
Expires
Sat, 01 Jan 2000 00:00:00 GMT
P3P
CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Pragma
no-cache
Server
Apache-Coyote/1.1
Set-Cookie
ab=0001%3AzexpE3lfXLsYgyd8hh7uU%2FhJGHuFrHUC;Max-Age=31536000;domain=agkn.com;path=/ u=C|0AEAja50aI2udGgAAAAAAAg1RAQCADVIBAIA;Max-Age=31536000;domain=agkn.com;path=/
Content-Length
503
Connection
keep-alive
ta-pagesocial-sdk.js
tru.am/scripts/
34 KB
14 KB
Script
General
Full URL
https://tru.am/scripts/ta-pagesocial-sdk.js
Requested by
Host: tru.am
URL: https://tru.am/scripts/custom/cbsinteractive.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700:20::6819:a222 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
fb9007c254c493be4a067de535b19a30f5e5aef3d5b19f58b1c72d2c65a04f79

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Mon, 21 May 2018 10:49:23 GMT
server
cloudflare
etag
"8761e04182a1c11ff30f706f8052c8d6"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
47217366695064ed-FRA
expires
Wed, 31 Oct 2018 22:52:10 GMT
utsync.ashx
ml314.com/
906 B
1 KB
Script
General
Full URL
https://ml314.com/utsync.ashx?pub=&adv=&et=0&eid=50070&ct=js&pi=&fp=&clid=&ps=&cl=&mlt=&data=&&cp=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&pv=1540939930625_fqngs1ktw&bl=en-us&cb=6584183&return=https%3A%2F%2Fdpm.demdex.net%2Fibs%3Adpid%3D22052%26dpuuid%3D%5BPersonID%5D%26redir%3D&ht=&d=&dc=&si=1540939930625_fqngs1ktw&cid=49657216-7986-4ed9-95d0-a60d7f09e775&s=1600x1200&rp=
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?3092018
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.246.247.78 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-246-247-78.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
cbeacd59b57d482da0073dbd5363079e9b7c70afdb535c3bdbbf18878183bfb0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:09 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
p3P
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
Cache-Control
private
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Content-Length
519
Expires
0
ud.ashx
in.ml314.com/
20 B
698 B
Script
General
Full URL
https://in.ml314.com/ud.ashx?topiclimit=&cb=3092018
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?3092018
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.231.154.145 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-231-154-145.compute-1.amazonaws.com
Software
Microsoft-IIS/8.5 / ASP.NET
Resource Hash
d0e4a6372d6fb5ffe9505dbe9e94aee8f1b9b96ec8e5e20684cce8b4c5a88fa7

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:10 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/8.5
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, no-cache="set-cookie"
Connection
keep-alive
Content-Length
138
Expires
Wed, 31 Oct 2018 22:52:10 GMT
mpulse-1.0.2.js
zdnet1.cbsistatic.com/fly/js/libs/
12 KB
5 KB
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/libs/mpulse-1.0.2.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
763fa0bd7eff816d0a5f8c3e4075f9173a5cebf51a1e2c0d1174f841de10b9dd

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Wed, 30 May 2018 18:14:04 GMT
server
nginx
etag
"5b0ee9ec-2fdf"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
4822
expires
Tue, 06 Nov 2018 22:52:10 GMT
ad-ef5cb79eaf-rev.js
zdnet2.cbsistatic.com/fly/js/managers/
7 KB
3 KB
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/js/managers/ad-ef5cb79eaf-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
56bf714084093ce2762a223acbaee3f925b631b6fb24aee9f2f96c09bcc94c66

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Thu, 09 Aug 2018 17:36:29 GMT
server
nginx
etag
W/"5b6c7b9d-1ad5"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
2431
expires
Tue, 06 Nov 2018 22:52:10 GMT
uvpjs-0826cffc14-rev.js
zdnet1.cbsistatic.com/fly/js/managers/
800 B
631 B
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/managers/uvpjs-0826cffc14-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
9242cae28bc65d0b14fc566242452e05bdce12813551d6bb027c066d54bbf2f7

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Thu, 24 May 2018 15:16:43 GMT
server
nginx
etag
"5b06d75b-320"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
419
expires
Tue, 06 Nov 2018 22:52:10 GMT
video-28e1825085-rev.js
zdnet1.cbsistatic.com/fly/js/translations/
702 B
650 B
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/translations/video-28e1825085-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
f8ab45ee0969bb98916fa2ba950a26e40d4039a8d402bc661bd99ee0392edbc0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Thu, 12 Jul 2018 13:43:48 GMT
server
nginx
etag
"5b475b14-2be"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
438
expires
Tue, 06 Nov 2018 22:52:10 GMT
video-controls-039169d901-rev.js
zdnet4.cbsistatic.com/fly/js/components/
21 KB
6 KB
Script
General
Full URL
https://zdnet4.cbsistatic.com/fly/js/components/video-controls-039169d901-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
579e81f46017126d8f898dd79dc3930782f6e9e41d0537e9050310cc8dadc73e

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Tue, 16 Oct 2018 16:40:20 GMT
server
nginx
etag
W/"5bc61474-52f1"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
5619
expires
Tue, 06 Nov 2018 22:52:10 GMT
swfobject-c3dea6a493-rev.js
zdnet3.cbsistatic.com/fly/js/components/
9 KB
4 KB
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/js/components/swfobject-c3dea6a493-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
40c707d407e524f6e535fe307be27c3d79067da9cbf8fa9eef3c9ec1933e12df

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Tue, 04 Sep 2018 15:22:12 GMT
server
nginx
etag
W/"5b8ea324-245c"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
3904
expires
Tue, 06 Nov 2018 22:52:10 GMT
jquery.ui.position-1.9.2.js
zdnet3.cbsistatic.com/fly/js/libs/jquery/ui/
7 KB
3 KB
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/js/libs/jquery/ui/jquery.ui.position-1.9.2.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
ee221041a905f4b0fbe76dc05e44575523fd26a93f9e038bcb19d16e4155ee5b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Tue, 07 Aug 2018 13:46:06 GMT
server
nginx
etag
W/"5b69a29e-1a3e"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
2661
expires
Tue, 06 Nov 2018 22:52:10 GMT
jquery.ui.draggable-1.9.2.js
zdnet4.cbsistatic.com/fly/js/libs/jquery/ui/
18 KB
5 KB
Script
General
Full URL
https://zdnet4.cbsistatic.com/fly/js/libs/jquery/ui/jquery.ui.draggable-1.9.2.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
6d4dc28c491ca7ff1c86fa292821d3174e2c7638170628e1daa411da61d10684

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Tue, 07 Aug 2018 13:46:06 GMT
server
nginx
etag
W/"5b69a29e-48d5"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
4875
expires
Tue, 06 Nov 2018 22:52:10 GMT
csync.ashx
ml314.com/
Redirect Chain
  • https://tags.bluekai.com/site/20486?limit=0&id=5978151442431788410&redir=https://ml314.com/csync.ashx%3Ffp=$_BK_UUID%26person_id=5978151442431788410%26eid=50056
  • https://tags.bluekai.com/site/20486?dt=0&r=1789343746&sig=2967659996&bkca=KJpn0zpBnnWND1+1LEVNBnzyBeD61EW01ER6+f9y1EHxv6oB0u00puQovuit6+4wpEWtBBanpLdPE0brpWFVu0pm3a9N5ALgLaVJ5dvmeylN5aWN1i+/nugmpTF...
  • https://ml314.com/csync.ashx?fp=csEsu99999YzLBCq&person_id=5978151442431788410&eid=50056
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=csEsu99999YzLBCq&person_id=5978151442431788410&eid=50056
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.246.247.78 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-246-247-78.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:10 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Wed, 31 Oct 2018 18:52:11 GMT

Redirect headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:11 GMT
P3P
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV", policyref="http://tags.bluekai.com/w3c/p3p.xml"
Location
https://ml314.com/csync.ashx?fp=csEsu99999YzLBCq&person_id=5978151442431788410&eid=50056
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Content-Length
0
BK-Server
6335
Expires
Thu, 01 Dec 1994 16:00:00 GMT
csync.ashx
ml314.com/
Redirect Chain
  • https://idsync.rlcdn.com/395886.gif?partner_uid=5978151442431788410
  • https://idsync.rlcdn.com/1000.gif?memo=CO6UGBIeChoIARCuXxoTNTk3ODE1MTQ0MjQzMTc4ODQxMBAAGg0ImsHj3gUSBQjoBxAAQgBKAA
  • https://ml314.com/csync.ashx?fp=&person_id=5978151442431788410&eid=50082
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=&person_id=5978151442431788410&eid=50082
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.246.247.78 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-246-247-78.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:10 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Wed, 31 Oct 2018 18:52:11 GMT

Redirect headers

status
307
date
Tue, 30 Oct 2018 22:52:11 GMT
cache-control
no-cache, no-store
timing-allow-origin
*
content-length
0
location
https://ml314.com/csync.ashx?fp=&person_id=5978151442431788410&eid=50082
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
csync.ashx
ml314.com/
Redirect Chain
  • https://pixel.mathtag.com/sync/img?redir=https://ml314.com/csync.ashx%3Ffp=[MM_UUID]%26person_id=5978151442431788410%26eid=50220
  • https://pixel.mathtag.com/sync/img?redir=https://ml314.com/csync.ashx%3Ffp=[MM_UUID]%26person_id=5978151442431788410%26eid=50220&mm_bnc&mm_bct
  • https://ml314.com/csync.ashx?fp=07745bd8-d6af-4d00-9dc7-479b9143afeb&person_id=5978151442431788410&eid=50220
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=07745bd8-d6af-4d00-9dc7-479b9143afeb&person_id=5978151442431788410&eid=50220
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.246.247.78 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-246-247-78.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:09 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Wed, 31 Oct 2018 18:52:10 GMT

Redirect headers

Date
Tue, 30 Oct 2018 22:52:10 GMT
Server
MT3 1.26.12.0 f85fe72 RELEASE cdg-pixel-x22
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Location
https://ml314.com/csync.ashx?fp=07745bd8-d6af-4d00-9dc7-479b9143afeb&person_id=5978151442431788410&eid=50220
Cache-Control
no-cache
Connection
keep-alive
Content-Type
image/gif
Content-Length
0
Expires
Tue, 30 Oct 2018 22:52:09 GMT
csync.ashx
ml314.com/
Redirect Chain
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D5978151442431788410
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D5978151442431788410
  • https://ml314.com/csync.ashx?fp=a68020edbc4215336f382d0d1c19c15f&eid=50146&person_id=5978151442431788410
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=a68020edbc4215336f382d0d1c19c15f&eid=50146&person_id=5978151442431788410
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.246.247.78 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-246-247-78.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:10 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Wed, 31 Oct 2018 18:52:10 GMT

Redirect headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:10 GMT
P3P
CP=NOI DSP COR NID PSAa PSDa OUR UNI COM NAV
Location
https://ml314.com/csync.ashx?fp=a68020edbc4215336f382d0d1c19c15f&eid=50146&person_id=5978151442431788410
Cache-Control
no-cache
X-Server
10.26.16.251
Connection
keep-alive
Content-Length
0
Expires
Thu, 01 Jan 1970 00:00:00 GMT
match
ps.eyeota.net/
Redirect Chain
  • https://ps.eyeota.net/pixel?pid=r8hrb20&t=gif
  • https://ps.eyeota.net/pixel/bounce/?pid=r8hrb20&t=gif
  • https://ml314.com/utsync.ashx?eid=50052&et=0&fp=2alV8VRg1h7-qUmr9RC89ugPpd8I9Ra9TORBGAb2IJ-4&return=https%3A%2F%2Fps.eyeota.net%2Fmatch%3Fbid%3Dr8hrb20%26uid%3Dnil
  • https://ml314.com/csync.ashx?fp=2alV8VRg1h7-qUmr9RC89ugPpd8I9Ra9TORBGAb2IJ-4&person_id=5978151442431788410&eid=50052&return=https%3a%2f%2fps.eyeota.net%2fmatch%3fbid%3dr8hrb20%26uid%3dnil
  • https://ps.eyeota.net/match?bid=r8hrb20&uid=nil
70 B
171 B
Image
General
Full URL
https://ps.eyeota.net/match?bid=r8hrb20&uid=nil
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
18.184.225.117 Cambridge, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-184-225-117.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
de9d3fd0eb948bd294477d0eda60a73b85caff1794803530d0463193a113da98

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:10 GMT
Content-Length
70
Content-Type
image/gif

Redirect headers

Date
Tue, 30 Oct 2018 22:52:10 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
text/html; charset=utf-8
Location
https://ps.eyeota.net/match?bid=r8hrb20&uid=nil
Cache-Control
private
Connection
keep-alive
Content-Length
168
Expires
Wed, 31 Oct 2018 18:52:10 GMT
demconf.jpg
dpm.demdex.net/
Redirect Chain
  • https://dpm.demdex.net/ibs:dpid=22052&dpuuid=5978151442431788410&redir=
  • https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=5978151442431788410&redir=
42 B
769 B
Image
General
Full URL
https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=5978151442431788410&redir=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.212.113.202 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-212-113-202.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

DCS
dcs-prod-irl1-v006-00a1293ef.edge-irl1.demdex.com 5.41.0.20181011114220 3ms
Pragma
no-cache
X-TID
rkBmKaOMSyg=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT

Redirect headers

Pragma
no-cache
X-TID
YAmmLO06QmQ=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Location
https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=5978151442431788410&redir=
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Length
0
Expires
Thu, 01 Jan 1970 00:00:00 GMT
config.json
c.go-mpulse.net/api/v2/
2 KB
1 KB
XHR
General
Full URL
https://c.go-mpulse.net/api/v2/config.json?key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&t=1540939930704&s=75ed08255b653feee77215eb8412519c23ecb1aa7310aa1e19585250e678ab51
Requested by
Host: zdnet1.cbsistatic.com
URL: https://zdnet1.cbsistatic.com/fly/js/libs/mpulse-1.0.2.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.60.198.210 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-60-198-210.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a862607c2fb71979258d7a62448f3909a8e8449a0e4fab3ddad1c88dbe61c266

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com

Response headers

Date
Tue, 30 Oct 2018 22:52:10 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
private, max-age=300, stale-while-revalidate=60, stale-if-error=120
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
716
beacon
beacon.tru.am/
17 B
230 B
Fetch
General
Full URL
https://beacon.tru.am/beacon
Requested by
Host: tru.am
URL: https://tru.am/scripts/ta-pagesocial-sdk.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700:20::6819:a322 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
27676ea482895bdddd3f3796f430a812e11364efc224227c86973a52398966c2

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded;charset=UTF-8

Response headers

pragma
no-cache
date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
server
cloudflare
status
200
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, private, max-age=0
cf-ray
47217366fa589706-FRA
content-length
41
expires
Thu, 01 Jan 1970 00:00:00 UTC
CBSI-PLAYER.js
vidtech.cbsinteractive.com/uvpjs/2.8.3/
760 KB
203 KB
Script
General
Full URL
https://vidtech.cbsinteractive.com/uvpjs/2.8.3/CBSI-PLAYER.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
1491a1594a4058a62ea4c08441cfcbbfe82a0916b4f26b55f3605af896766dd7

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Mon, 26 Mar 2018 15:42:34 GMT
server
Apache
etag
"ffe80da4a589534ffbb17f46d6ef50a3:1522078954"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=2592000
accept-ranges
bytes
expires
Thu, 29 Nov 2018 22:52:10 GMT
autoplay-controls-e5333d6243-rev.js
zdnet3.cbsistatic.com/fly/js/components/
3 KB
1 KB
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/js/components/autoplay-controls-e5333d6243-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
40d317f999e71c7635619879cf4c5901505ea487011a00a220e560996f7557b1

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Tue, 16 Oct 2018 16:40:19 GMT
server
nginx
etag
W/"5bc61473-c8d"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
1149
expires
Tue, 06 Nov 2018 22:52:10 GMT
ad-2.0.js
zdnet3.cbsistatic.com/fly/bundles/flyjs/js/managers/
19 KB
5 KB
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/bundles/flyjs/js/managers/ad-2.0.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
de749bdbeeb7bb7f79cb31ff00fe6830004064419f73fe9a6ec982e9de8bf19d

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Thu, 19 Apr 2018 09:47:08 GMT
server
nginx
etag
"5ad8659c-4c22"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
4885
expires
Tue, 06 Nov 2018 22:52:10 GMT
jquery.ui.slider-1.9.2.js
zdnet1.cbsistatic.com/fly/js/libs/jquery/ui/
10 KB
3 KB
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/libs/jquery/ui/jquery.ui.slider-1.9.2.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
fa107680c3e0cfd1620aebe62462103703993ada997d84aa6d5f55ce0ea3cba0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Tue, 07 Aug 2018 13:46:06 GMT
server
nginx
etag
W/"5b69a29e-278e"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
2914
expires
Tue, 06 Nov 2018 22:52:10 GMT
jquery.ui.core-1.9.2.js
zdnet3.cbsistatic.com/fly/js/libs/jquery/ui/
5 KB
2 KB
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/js/libs/jquery/ui/jquery.ui.core-1.9.2.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
965b325924d7bd803f6fb1007b982eeb412ebfd696a20986fd4e6bc221daf413

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Tue, 07 Aug 2018 13:46:06 GMT
server
nginx
etag
W/"5b69a29e-128b"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
2096
expires
Tue, 06 Nov 2018 22:52:10 GMT
jquery.ui.mouse-1.9.2.js
zdnet4.cbsistatic.com/fly/js/libs/jquery/ui/
3 KB
1 KB
Script
General
Full URL
https://zdnet4.cbsistatic.com/fly/js/libs/jquery/ui/jquery.ui.mouse-1.9.2.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
ddfc91f954a7df70ddb1b6d0265eb1792d1c7922d50463d968159e7a4403fb1c

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Tue, 07 Aug 2018 13:46:06 GMT
server
nginx
etag
W/"5b69a29e-bca"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
1002
expires
Tue, 06 Nov 2018 22:52:10 GMT
gpt-4.3.js
zdnet4.cbsistatic.com/fly/bundles/flyjs/js/managers/
52 KB
10 KB
Script
General
Full URL
https://zdnet4.cbsistatic.com/fly/bundles/flyjs/js/managers/gpt-4.3.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
d48e0904f1b40972f1fc6dac3f358719e080fab3291d13d2ca4a60405707a88b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
last-modified
Thu, 19 Apr 2018 09:47:08 GMT
server
nginx
etag
"5ad8659c-d143"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
10133
expires
Tue, 06 Nov 2018 22:52:10 GMT
c.gif
dw.cbsi.com/clear/
42 B
346 B
Image
General
Full URL
https://dw.cbsi.com/clear/c.gif?rsid=cnetzdnetglobalsite&sid=2&siteid=2&pagetype=article&assetguid=7a12161d-2a5f-4793-b0a4-9fac038733de&assettitle=gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20brazilian%20banks&assettype=content_article&pubdate=2018-10-01%2004%3A20%3A22&viewguid=49657216-7986-4ed9-95d0-a60d7f09e775&devicetype=desktop&sitetype=responsive%20web&author=catalin%20cimpanu&authorid=85fd8691-f525-4ea2-a601-af296f629f7f&topicguid=113c25b6-ec91-11e3-95d2-02911863765e&topic=security&topicbrcrm=security&ts=1540939930727&ld=www.zdnet.com&ldc=5ea0580e-6d92-4621-8883-b3e8862fbe8f&brwinsz=1600x1200&brscrsz=1600x1200&brlang=en-US&tcset=utf8&im=dsjs&clgf=BZn%2FLVvY4Jo4qcgxTbo&srcurl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&title=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.30.224.172 Fort Lauderdale, United States, ASN6623 (CBSI-1 - CBS Interactive Inc., US),
Reverse DNS
phx1-dw-cbsi-xw-lb.cnet.com
Software
Apache/2.4.25 /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:10 GMT
Server
Apache/2.4.25
Vary
*
Content-Type
image/gif
Cache-control
no-cache, must-revalidate, no-transform
Connection
Keep-Alive
Keep-Alive
timeout=80, max=454
Content-Length
42
Expires
Mon, 05 Jan 1970 12:12:12 GMT
id
dpm.demdex.net/
2 KB
1 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=2.3.0&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_orgid=10D31225525FF5790A490D4D%40AdobeOrg&d_nsid=0&ts=1540939930762
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.212.113.202 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-212-113-202.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
51979f4c4b881a194decaf4487925722017946d58e61c34e04125cad81d0fd7c

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v006-0fb6b1d95.edge-irl1.demdex.com 5.41.0.20181011114220 3ms
Pragma
no-cache
Content-Encoding
gzip
X-TID
v/zYa5GvQyA=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
701
Expires
Thu, 01 Jan 1970 00:00:00 GMT
utag.v.js
tags.tiqcdn.com/utag/tiqapp/
2 B
68 B
Script
General
Full URL
https://tags.tiqcdn.com/utag/tiqapp/utag.v.js?a=cbsi/zdnetglobalsite/201810291711&cb=1540939930763
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40EB) /
Resource Hash
a2c2339691fc48fbd14fb307292dff3e21222712d9240810742d7df0c6d74dfb

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:10 GMT
last-modified
Thu, 14 Apr 2016 16:59:33 GMT
server
ECS (fcn/40EB)
etag
"144534940"
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=600
accept-ranges
bytes
content-length
2
expires
Tue, 30 Oct 2018 23:02:10 GMT
fb_digioh.2.1.5.css
www.lightboxcdn.com/static/
4 KB
1 KB
Stylesheet
General
Full URL
https://www.lightboxcdn.com/static/fb_digioh.2.1.5.css?cb=636752339805538198
Requested by
Host: www.lightboxcdn.com
URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/user.js?cb=636754604557185965
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:4ea5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
802446cd0aefe1f43030cf3e02eddbbbec61e27e62479d990d8889266943a650

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Tue, 30 Oct 2018 22:52:10 GMT
content-encoding
gzip
cf-cache-status
HIT
content-md5
SPXkOHRrmvkdtUVAkMsWtg==
cf-polished
origSize=5365
status
200
last-modified
Thu, 22 Jun 2017 21:54:44 GMT
x-ms-lease-status
unlocked
cf-bgj
minify
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
x-ms-request-id
80c90c48-e01e-00e0-4e47-65b349000000
cache-control
public, max-age=31536000
x-ms-version
2009-09-19
cf-ray
4721736768a1c2c4-FRA
expires
Wed, 30 Oct 2019 22:52:10 GMT
Cookie set dest5.html
cbsi.demdex.net/ Frame 1B05
0
0
Document
General
Full URL
https://cbsi.demdex.net/dest5.html?d_nsid=undefined
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.246.133.167 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-246-133-167.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash

Request headers

Host
cbsi.demdex.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Cookie
demdex=14800636450567127481351596307358116261
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Accept-Ranges
bytes
Cache-Control
max-age=21600
Content-Encoding
gzip
Content-Type
text/html
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified
Tue, 23 Oct 2018 15:14:06 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Pragma
no-cache
Set-Cookie
demdex=14800636450567127481351596307358116261;Path=/;Domain=.demdex.net;Expires=Sun, 28-Apr-2019 22:52:10 GMT;Max-Age=15552000
Vary
Accept-Encoding, User-Agent
X-TID
suKxYM7nQII=
Content-Length
2766
Connection
keep-alive
id
saa.cbsi.com/
90 B
716 B
XHR
General
Full URL
https://saa.cbsi.com/id?d_visid_ver=2.3.0&d_fieldgroup=A&mcorgid=10D31225525FF5790A490D4D%40AdobeOrg&mid=15035568385724593481339362802659536093&ts=1540939930806
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.140.43.37 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
cbsi.com.ssl.sc.omtrdc.net
Software
Omniture DC/2.0.0 /
Resource Hash
db72d232206dbb103f4c7591aeca7c058192283dec7a22ee37f4be61d7d9a3bf
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Date
Tue, 30 Oct 2018 22:52:10 GMT
X-Content-Type-Options
nosniff
Server
Omniture DC/2.0.0
xserver
www93
Vary
Origin
X-C
ms-6.5.1
P3P
CP="This is not a P3P policy"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/x-javascript
Keep-Alive
timeout=15
Content-Length
90
X-XSS-Protection
1; mode=block
id
dpm.demdex.net/
2 KB
1 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=2.3.0&d_fieldgroup=AAM&d_rtbd=json&d_ver=2&d_orgid=10D31225525FF5790A490D4D%40AdobeOrg&d_nsid=0&d_mid=15035568385724593481339362802659536093&d_blob=RKhpRz8krg2tLO6pguXWp5olkAcUniQYPHaMWWgdJ3xzPWQmdj0y&d_cid_ic=AVID%012DEC704D053159D1-4000010BA0001969&ts=1540939930893
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.212.113.202 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-212-113-202.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
37a01e173304b3e8db18b7ecf014820e004f01057bd47e3bd07f38c53eccfcfa

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v006-0be9a871e.edge-irl1.demdex.com 5.41.0.20181011114220 7ms
Pragma
no-cache
Content-Encoding
gzip
X-TID
auAFRqW9Rfk=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
701
Expires
Thu, 01 Jan 1970 00:00:00 GMT
s92384348237358
saa.cbsi.com/b/ss/cnetzdnetglobalsite/10/JS-2.3.0/
2 KB
2 KB
Script
General
Full URL
https://saa.cbsi.com/b/ss/cnetzdnetglobalsite/10/JS-2.3.0/s92384348237358?AQB=1&ndh=1&pf=1&callback=s_c_il[0].doPostbacks&et=1&t=30%2F9%2F2018%2022%3A52%3A10%202%200&d.&nsid=0&jsonv=1&.d&mid=15035568385724593481339362802659536093&aid=2DEC704D053159D1-4000010BA0001969&aamlh=6&ce=UTF-8&ns=cbsinteractive&pageName=zdnet%3A%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&g=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&cc=USD&ch=editorial&server=www.zdnet.com&aamb=RKhpRz8krg2tLO6pguXWp5olkAcUniQYPHaMWWgdJ3xzPWQmdj0y&c1=zdnet&v1=zdnet&h1=editorial%7Carticle&c2=D%3Dv2&v2=eu&l2=113c25b6-ec91-11e3-95d2-02911863765e%7C54795830-f620-4b12-bd83-5740537be838&c3=D%3Dv3&v3=responsive%20web%7Cdesktop&l3=85fd8691-f525-4ea2-a601-af296f629f7f&c4=D%3Dv4&c5=D%3Dv5&v5=cnetzdnetglobalsite&c6=D%3Dv6&v6=editorial%7Carticle&c7=D%3Dv7&v7=D%3Dg&c8=D%3Dv8&v8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c9=D%3DUser-Agent&c10=D%3Dv10&v10=article&c11=D%3Dv11&v11=D%3Dch%2B%22%3A%22%2Bv10&v15=not%20authenticated%7Canon&c20=D%3Dv20&v20=gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20brazilian%20banks&c22=D%3Dv22&v22=content_article&c23=D%3Dv23&v23=113c25b6-ec91-11e3-95d2-02911863765e&c24=D%3Dv24&v24=49657216-7986-4ed9-95d0-a60d7f09e775&c25=D%3Dv25&c26=D%3Dv26&v26=bfccdd23-ed4a-11e3-95d2-02911863765e&c28=D%3Dv28&c30=D%3Dv30&v30=7a12161d-2a5f-4793-b0a4-9fac038733de&c31=D%3Dv31&c33=D%3Dv33&c34=D%3Dv34&c35=D%3Dv35&v35=BZn%2FLVvY4Jo4qcgxTbo&v44=zdnet&c50=D%3Dv50&v50=6%3A30PM&c51=D%3Dv51&v51=Tuesday&c52=D%3Dv52&v52=1&c53=D%3Dv53&v53=New&c54=D%3Dv54&v54=First%20Visit&c65=D%3Dv65&v65=discover&c69=D%3Dv69&v85=true&s=1600x1200&c=24&j=1.6&v=N&k=Y&bw=1600&bh=1200&mcorgid=10D31225525FF5790A490D4D%40AdobeOrg&AQE=1
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.140.43.37 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
cbsi.com.ssl.sc.omtrdc.net
Software
Omniture DC/2.0.0 /
Resource Hash
39792a87040a1614ad8fa37afddca74efcfdfb5f4983f008154bc2f3d5b13c4f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

X-AAM-TID
WyWMMteHSLY=
Date
Tue, 30 Oct 2018 22:52:10 GMT
X-Content-Type-Options
nosniff
X-C
ms-6.5.1
P3P
CP="This is not a P3P policy"
Connection
Keep-Alive
Content-Length
1721
X-XSS-Protection
1; mode=block
DCS
dcs-prod-irl1-v006-0549b38f7.edge-irl1.demdex.com 5.41.0.20181011114220 7ms
Pragma
no-cache
Last-Modified
Wed, 31 Oct 2018 22:52:10 GMT
Server
Omniture DC/2.0.0
xserver
www204
ETag
"3309143302312361984-5032527532079972705"
Vary
*
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Keep-Alive
timeout=15
Expires
Mon, 29 Oct 2018 22:52:10 GMT
ping
api.viglink.com/api/
265 B
945 B
XHR
General
Full URL
https://api.viglink.com/api/ping
Requested by
Host: cdn.viglink.com
URL: https://cdn.viglink.com/api/vglnk.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.175.204 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-175-204.eu-west-1.compute.amazonaws.com
Software
Apache-Coyote/1.1 /
Resource Hash
767032ff802abda20f0238fab293fe01a8c7ff1bffb06f5cf09d92a640d49a27

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:10 GMT
Server
Apache-Coyote/1.1
P3P
CP="ALL IND DSP COR CUR ADM TAIo PSDo OUR COM INT NAV PUR STA UNI"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript;charset=UTF-8
Content-Length
265
Expires
Thu, 01 Jan 1970 00:00:00 GMT
domains
api.viglink.com/api/
76 B
521 B
XHR
General
Full URL
https://api.viglink.com/api/domains
Requested by
Host: cdn.viglink.com
URL: https://cdn.viglink.com/api/vglnk.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.175.204 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-175-204.eu-west-1.compute.amazonaws.com
Software
Apache-Coyote/1.1 /
Resource Hash
fe748898d14a9ad7576bb309866e8c4190dc739d3a16fb8eea0c6ff59e449b59

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:10 GMT
Server
Apache-Coyote/1.1
P3P
CP="ALL IND DSP COR CUR ADM TAIo PSDo OUR COM INT NAV PUR STA UNI"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript;charset=UTF-8
Content-Length
76
Expires
Thu, 01 Jan 1970 00:00:00 GMT
/
22ffabbe.akstat.io/
0
354 B
XHR
General
Full URL
https://22ffabbe.akstat.io/?h.pg=article&when=1540939931212&t_other=custom4%7C1843&d=zdnet.com&h.key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&h.d=zdnet.com&h.cr=d0dd92ec8acf4cbe8bee46cf0513c9c742e3bf44&h.t=1540939930723&http.initiator=api&rt.start=api&rt.si=e6403dbe-899d-41d0-9913-e7f4273e7c4d&rt.ss=1540939933284&rt.sl=0&api=1&api.v=2&api.l=js&api.lv=0.0.1
Requested by
Host: zdnet1.cbsistatic.com
URL: https://zdnet1.cbsistatic.com/fly/js/libs/mpulse-1.0.2.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.8.11.168 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-8-11-168.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:11 GMT
Content-Type
image/gif
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
X-XSS-Protection
0
Expires
Tue, 30 Oct 2018 22:52:11 GMT
measure.min.js
asset.pagefair.com/
11 KB
4 KB
Script
General
Full URL
https://asset.pagefair.com/measure.min.js?_=1540939931552
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1531-fly/js/main.default.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
94.31.29.248 , United Kingdom, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
94.31.29.248.IPYX-077437-ZYO.above.net
Software
NetDNA-cache/2.2 /
Resource Hash
6ac72fa11e76ea6fdbb1b310f67b3b9b24c11da94774a89323b71930ae544eee

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:11 GMT
content-encoding
gzip
last-modified
Mon, 11 Jun 2018 11:42:29 GMT
server
NetDNA-cache/2.2
x-amz-request-id
63550D3887CEFD2A
etag
W/"5631e8df5abfee420cd07a2737665a78"
x-cache
MISS
content-type
application/x-javascript
status
200
cache-control
max-age=86400
x-amz-id-2
RbOK05Tyg88MVsdiOfDVjgAKGuSPnTmtcYmrnhRIP+Zx/8zSjR0TUFG1NcEa3Q+MrSEwWHPbRy8=
expires
Wed, 31 Oct 2018 22:52:11 GMT
ads.min.js
asset.pagefair.net/
0
351 B
Script
General
Full URL
https://asset.pagefair.net/ads.min.js?_=1540939931553
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1531-fly/js/main.default.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.161.188.128 Los Angeles, United States, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:11 GMT
content-encoding
gzip
last-modified
Fri, 09 Mar 2018 17:19:02 GMT
server
NetDNA-cache/2.2
x-amz-request-id
FEB35DCB2B4AADD3
etag
"263dfc0b0e2e32b880781aa6f238a031"
x-cache
MISS
content-type
application/x-javascript
status
200
cache-control
max-age=7200
accept-ranges
bytes
content-length
31
x-amz-id-2
mOLmIG+S/eHpPkB6XwvUgwTvn0+XDogdfSrFiizBKYJ4DCGmR3wKrqrtysACxXVAWY4ObTnCl4M=
jpt
secure.adnxs.com/
0
683 B
XHR
General
Full URL
https://secure.adnxs.com/jpt?id=11834629&size=728x90&callback=headertag.AppNexusHtb.adResponseCallback&callback_uid=iOBw4Chl&psa=0&promo_sizes=970x250&referrer=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.221 , European Union, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
Software
nginx/1.13.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:13 GMT
X-Proxy-Origin
148.251.45.254; 148.251.45.254; 316.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.53:80
AN-X-Request-Uuid
4d7dcc8c-d2e2-4536-9e67-d0de44db4a9f
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
jpt
secure.adnxs.com/
0
684 B
XHR
General
Full URL
https://secure.adnxs.com/jpt?id=11834625&size=300x250&callback=headertag.AppNexusHtb.adResponseCallback&callback_uid=Rmuet6hm&psa=0&referrer=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.221 , European Union, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
Software
nginx/1.13.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:13 GMT
X-Proxy-Origin
148.251.45.254; 148.251.45.254; 316.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.223.240:80
AN-X-Request-Uuid
4a890117-50ae-43be-99f5-5bf0df9f5f6a
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
jpt
secure.adnxs.com/
0
684 B
XHR
General
Full URL
https://secure.adnxs.com/jpt?id=11834627&size=300x250&callback=headertag.AppNexusHtb.adResponseCallback&callback_uid=RjLZOUkt&psa=0&referrer=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.221 , European Union, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
Software
nginx/1.13.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:13 GMT
X-Proxy-Origin
148.251.45.254; 148.251.45.254; 316.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.106:80
AN-X-Request-Uuid
75da14b4-6917-4b41-94d3-2df353760f89
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
jpt
secure.adnxs.com/
0
683 B
XHR
General
Full URL
https://secure.adnxs.com/jpt?id=11834631&size=300x250&callback=headertag.AppNexusHtb.adResponseCallback&callback_uid=CLN6ZORp&psa=0&promo_sizes=300x600&referrer=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.221 , European Union, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
Software
nginx/1.13.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:13 GMT
X-Proxy-Origin
148.251.45.254; 148.251.45.254; 316.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.223.86:80
AN-X-Request-Uuid
459e5ad3-fcfa-472c-b4e9-2d1b4f4ccb85
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
jpt
secure.adnxs.com/
0
683 B
XHR
General
Full URL
https://secure.adnxs.com/jpt?id=11834632&size=728x90&callback=headertag.AppNexusHtb.adResponseCallback&callback_uid=APvFSfSs&psa=0&promo_sizes=970x250&referrer=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.221 , European Union, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
Software
nginx/1.13.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:13 GMT
X-Proxy-Origin
148.251.45.254; 148.251.45.254; 316.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.22:80
AN-X-Request-Uuid
18b30de0-a49a-481e-be7b-5637e9214c97
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
cygnus
as-sec.casalemedia.com/
66 B
1001 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=182823&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A48296642%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22202%22%2C%22siteID%22%3A%22182829%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22220%22%2C%22siteID%22%3A%22183316%22%7D%2C%22id%22%3A%222%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22209%22%2C%22siteID%22%3A%22182828%22%7D%2C%22id%22%3A%223%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22210%22%2C%22siteID%22%3A%22182826%22%7D%2C%22id%22%3A%224%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22208%22%2C%22siteID%22%3A%22182824%22%7D%2C%22id%22%3A%225%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22222%22%2C%22siteID%22%3A%22182825%22%7D%2C%22id%22%3A%226%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22219%22%2C%22siteID%22%3A%22183315%22%7D%2C%22id%22%3A%227%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22201%22%2C%22siteID%22%3A%22182823%22%7D%2C%22id%22%3A%228%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%2C%22user%22%3A%7B%22eids%22%3A%5B%7B%22source%22%3A%22adserver.org%22%2C%22uids%22%3A%5B%7B%22id%22%3A%22e87e43a6-b3d7-4cb4-9023-424c3befc71f%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID%22%7D%7D%2C%7B%22id%22%3A%22FALSE%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_LOOKUP%22%7D%7D%2C%7B%22id%22%3A%222018-10-30T22%3A52%3A10%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_CREATED_AT%22%7D%7D%5D%7D%5D%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
50cba2f3945021dd8c300cd7a82a8c462b24c2695afe49596499400e357de132

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:11 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript
Content-Length
86
Expires
Tue, 30 Oct 2018 22:52:11 GMT
vglnk.js
cdn.viglink.com/api/
81 KB
28 KB
Script
General
Full URL
https://cdn.viglink.com/api/vglnk.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:a10d , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
009396e873c2f93482891861160df34a0a69bd1beaad7c5fc04d8dd36e4eec44

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:11 GMT
content-encoding
gzip
cf-cache-status
HIT
x-amz-request-id
BC4F97BA1F106EBB
status
200
content-length
28397
x-amz-id-2
J8zmvgfNzG4CAbCbuLht/1b8lYutez8aSXvKTUEfg4it7wLnVKLnn+V6bClwRuRWkmHXuBQrHDM=
last-modified
Wed, 24 Oct 2018 20:32:46 GMT
server
cloudflare
etag
"8132bd22613a0bbbdd73866340c33ab1"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=1800
accept-ranges
bytes
cf-ray
4721736d9937646f-FRA
expires
Tue, 30 Oct 2018 23:22:11 GMT
utag.1775.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
26 KB
9 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1775.js?utv=ut4.43.201810291720
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41AA) /
Resource Hash
0f4176807e149be9c6cc0e583699fffe630cccb37e57242ce5a7b1f7d63d859d

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:11 GMT
content-encoding
gzip
last-modified
Thu, 10 Nov 2016 20:41:55 GMT
server
ECS (fcn/41AA)
etag
"1112944691+gzip"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
8960
expires
Wed, 14 Nov 2018 22:52:11 GMT
utag.277.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
972 B
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.277.js?utv=ut4.43.201810291720
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40F9) /
Resource Hash
0e13cd6845611f0c419398a75b85ba014a7fffb1b9e9575c2e1b4cfefebd0017

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:11 GMT
content-encoding
gzip
last-modified
Mon, 11 Jul 2016 20:43:58 GMT
server
ECS (fcn/40F9)
etag
"461771432+gzip"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
863
expires
Wed, 14 Nov 2018 22:52:11 GMT
utag.1772.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
1 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1772.js?utv=ut4.43.201810291720
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40B3) /
Resource Hash
e482ba089d973ca257acfd70b2d7541447d5d333449b106d5c3dffebe322566a

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:11 GMT
content-encoding
gzip
last-modified
Mon, 11 Jul 2016 20:43:58 GMT
server
ECS (fcn/40B3)
etag
"4198895974+gzip"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
959
expires
Wed, 14 Nov 2018 22:52:11 GMT
utag.1796.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
8 KB
3 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1796.js?utv=ut4.43.201810291720
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40F9) /
Resource Hash
9337d4f2ef8a00759da573e178e302712fec944ac54cfd808f48c526b9816d3b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:11 GMT
content-encoding
gzip
last-modified
Mon, 28 Nov 2016 15:09:53 GMT
server
ECS (fcn/40F9)
etag
"931235332+gzip"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
2762
expires
Wed, 14 Nov 2018 22:52:11 GMT
pixel_details.html
www.everestjs.net/static/ Frame 3945
Redirect Chain
  • https://pixel.everesttech.net/4083/gr?ev_gb=0&url=https%3A%2F%2Fwww.everestjs.net%2Fstatic%2Fpixel_details.html%23google%3D__EFGCK__%26gsurfer%3D__EFGSURFER__%26optout%3D__EFOPTOUT__%26throttleCook...
  • https://www.everestjs.net/static/pixel_details.html
0
0
Document
General
Full URL
https://www.everestjs.net/static/pixel_details.html
Requested by
Host: www.everestjs.net
URL: https://www.everestjs.net/static/st.v3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.8.8.176 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-8-8-176.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Host
www.everestjs.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Server
Apache
Last-Modified
Tue, 04 Oct 2011 16:14:21 GMT
ETag
"8623-a6-4ae7b62583140"
Accept-Ranges
bytes
Content-Type
text/html
Content-Encoding
gzip
Content-Length
146
Cache-Control
max-age=49365
Expires
Wed, 31 Oct 2018 12:34:57 GMT
Date
Tue, 30 Oct 2018 22:52:12 GMT
Connection
keep-alive
Vary
Accept-Encoding

Redirect headers

Date
Tue, 30 Oct 2018 22:52:11 GMT
Server
Apache
Set-Cookie
everest_session_v2=W9jgmwAAAMaYAp17; path=/; domain=.everesttech.net everest_g_v2=g_surferid~W9jgmwAAAMaYAp17; path=/; domain=.everesttech.net; expires=Thu, 24-Sep-2020 09:32:11 GMT
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Cache-Control
no-cache
Location
https://www.everestjs.net/static/pixel_details.html#google=W9jgmwAAAMaYAp17&gsurfer=W9jgmwAAAMaYAp17&optout=0&throttleCookie=&time=20181030225211
Content-Length
345
Keep-Alive
timeout=15, max=996705
Connection
Keep-Alive
Content-Type
text/html; charset=iso-8859-1
ls.html
www.lightboxcdn.com/lclst/a1583f50-579b-41d0-8c4e-1cd1790d945c/ Frame 59B5
0
0
Document
General
Full URL
https://www.lightboxcdn.com/lclst/a1583f50-579b-41d0-8c4e-1cd1790d945c/ls.html?purl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&vid=a1583f50-579b-41d0-8c4e-1cd1790d945c&se=1&prev=0&cb=636752339805538198
Requested by
Host: www.lightboxcdn.com
URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/user.js?cb=636754604557185965
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:4ea5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

:method
GET
:authority
www.lightboxcdn.com
:scheme
https
:path
/lclst/a1583f50-579b-41d0-8c4e-1cd1790d945c/ls.html?purl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&vid=a1583f50-579b-41d0-8c4e-1cd1790d945c&se=1&prev=0&cb=636752339805538198
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
date
Tue, 30 Oct 2018 22:52:11 GMT
content-type
text/html
set-cookie
__cfduid=d1ff186885fcaf0b18f144f3b779364611540939931; expires=Wed, 30-Oct-19 22:52:11 GMT; path=/; domain=.lightboxcdn.com; HttpOnly
content-md5
2QlVA6sVmgJp4XZ5c8SrrQ==
last-modified
Mon, 15 Oct 2018 20:59:40 GMT
x-ms-request-id
237ee6fc-601e-0097-6887-693608000000
x-ms-version
2009-09-19
x-ms-lease-status
unlocked
x-ms-blob-type
BlockBlob
cf-cache-status
HIT
expires
Wed, 30 Oct 2019 22:52:11 GMT
cache-control
public, max-age=31536000
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
server
cloudflare
cf-ray
4721736e2d38c2c4-FRA
content-encoding
gzip
Cookie set dest5.html
cbsi.demdex.net/ Frame 9241
0
0
Document
General
Full URL
https://cbsi.demdex.net/dest5.html?d_nsid=0
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.246.133.167 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-246-133-167.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash

Request headers

Host
cbsi.demdex.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Cookie
demdex=14800636450567127481351596307358116261; dextp=127444-1-1540939931711
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Accept-Ranges
bytes
Cache-Control
max-age=21600
Content-Encoding
gzip
Content-Type
text/html
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified
Tue, 23 Oct 2018 15:17:15 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Pragma
no-cache
Set-Cookie
demdex=14800636450567127481351596307358116261;Path=/;Domain=.demdex.net;Expires=Sun, 28-Apr-2019 22:52:11 GMT;Max-Age=15552000
Vary
Accept-Encoding, User-Agent
X-TID
hkbYZGA6RIY=
Content-Length
2766
Connection
keep-alive
ads
securepubads.g.doubleclick.net/gampad/
112 KB
16 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=1721890552797406&correlator=3580406138137939&output=json_html&callback=googletag.impl.pubads.callbackProxy1&impl=fifs&adsid=NT&json_a=1&eid=21062715%2C21062624&vrg=270&guci=1.2.0.0.2.2.0&plat=1%3A32776%2C2%3A32776&sc=1&sfv=1-0-30&iu_parts=8264%2Cuk-zdnet%2Csecurity&enc_prev_ius=%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2&prev_iu_szs=7x7%7C5x5%2C1x1%2C1600x1000%2C728x90%7C970x66%7C970x250%2C300x250%7C300x600%7C300x1050%2C300x250%2C300x250%2C728x90%7C970x66%7C970x250%2C371x771&ists=128&prev_scp=pos%3Dnav%7C%7Cpos%3Dtop%7Cpos%3Dtop%7Cpos%3Dtop%7Cpos%3Dmiddle%7Cpos%3Dbottom%7Cpos%3Dbottom%7Cpos%3Dtop&eri=1&cust_params=buyingcycle%3Ddiscover%26topic%3Dsecurity%252Cinternet-of-things%26device%3Ddesktop%26ptype%3Darticle%26cid%3Dgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%26env%3Dprod%26firstpg%3D1%26vguid%3D49657216-7986-4ed9-95d0-a60d7f09e775%26session%3Df%26subses%3D1&cookie_enabled=1&bc=7&abxe=1&lmt=1540939932&dt=1540939932459&dlt=1540939929946&idt=576&frm=20&biw=1585&bih=1200&oid=3&adxs=0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0&adys=0%2C116%2C0%2C0%2C0%2C0%2C0%2C0%2C0&adks=1909511044%2C198297377%2C481687784%2C3051035465%2C198125302%2C3144844687%2C2852189862%2C83626704%2C1809959226&ucis=1%7C2%7C3%7C4%7C5%7C6%7C7%7C8%7C9&gut=v2&ifi=1&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&dssz=78&icsg=0&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1585x5621%7C1585x0%7C1585x-1%7C1585x-1%7C370x-1%7C370x-1%7C370x-1%7C1210x-1%7C370x-1&msz=7x30%7C1585x0%7C1600x-1%7C688x-1%7C300x-1%7C300x-1%7C300x-1%7C728x-1%7C371x-1&ga_vid=965284673.1540939932&ga_sid=1540939932&ga_hid=1795029455&fws=128%2C4%2C128%2C128%2C128%2C128%2C128%2C128%2C128
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_270.js?21062715
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
2364a14550f47455ce7c868b6ea1e3701aa6e09d4a7c482422fcdbfb35f04eb7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com

Response headers

date
Tue, 30 Oct 2018 22:52:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2,-2,-2,-2,-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
16186
x-xss-protection
1; mode=block
google-lineitem-id
4745974454,-2,4745166436,253246569,253246569,241984809,4745571990,241984809,4825966980
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138239360957,-2,138239321298,75374362809,75375443409,75375443409,138239450914,75374362809,138247024569
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_270.js
securepubads.g.doubleclick.net/gpt/
54 KB
20 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_270.js?21062715
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_270.js?21062715
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
sffe /
Resource Hash
f7739b424d4acd048d584bf1bfa99a1ea5481989d1abb8948e9bf571729f2c72
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 24 Oct 2018 15:56:38 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
20717
x-xss-protection
1; mode=block
expires
Tue, 30 Oct 2018 22:52:12 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-30/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-30/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_270.js?21062715
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Purpose
prefetch
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

expires
Sat, 12 Oct 2019 19:46:32 GMT
cache-control
public, immutable, max-age=31536000
last-modified
Fri, 12 Oct 2018 04:28:13 GMT
content-type
text/html
/
www.zdnet.com/components/breaking-news/xhr/
1 KB
2 KB
XHR
General
Full URL
https://www.zdnet.com/components/breaking-news/xhr/?slug=breaking-news-banner
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1531-fly/js/main.default.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
bbf03c4e25d86bbfa6c5bc4bb0f26a17602f93576366ec5d19d7e1c142522ba5
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/components/breaking-news/xhr/?slug=breaking-news-banner
pragma
no-cache
cookie
utag_main=_sn:1$_ss:0$_st:1540941731769$ses_id:1540939930482%3Bexp-session$_pn:1%3Bexp-session$linktag:undefined%3Bexp-session; RT="sl=1&ss=1540939928122&tt=3758&obo=0&bcn=%2F%2F22ffabbe.akstat.io%2F&sh=1540939931909%3D1%3A0%3A3758&dm=zdnet.com&si=e952bd0c-7094-4622-8840-ba662346d9f8&ld=1540939931910"
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
application/json, text/javascript, */*; q=0.01
cache-control
no-cache
:authority
www.zdnet.com
x-requested-with
XMLHttpRequest
:scheme
https
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
:method
GET
Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Accept-Encoding, User-Agent
content-length
496
x-xss-protection
1; mode=block
referrer-policy
no-referrer-when-downgrade
last-modified
Tue, 30 Oct 2018 22:44:33 GMT
server
nginx
x-frame-options
SAMEORIGIN
date
Tue, 30 Oct 2018 22:52:12 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-tx-id
56d603cc-ec61-4f2e-89a7-9e1f3191e364
content-type
application/json
access-control-allow-origin
https://www.zdnet.com
cache-control
max-age=5400, private
set-cookie
fly_device=desktop; expires=Tue, 06-Nov-2018 22:52:12 GMT; path=/; domain=.zdnet.com; secure fly_geo={"countryCode": "de"}; expires=Tue, 06-Nov-2018 22:52:12 GMT; path=/; domain=.zdnet.com; secure fly_preferred_edition=eu; path=/; domain=.zdnet.com; secure fly_default_edition=eu; path=/; domain=.zdnet.com; secure ak_bmsc=45D608388201C4E692EADB6DDEC62BC50210BAB7981700009CE0D85B6F4FCA72~plGYGyRj4JcMoP8YAWE5zOGaHUx2jpfI4gwDIxTxvL9JOBY7AwFqeCB4Kxdn1KEdsHBflr0GruH5jB8qAKgw80ntp7BbiUPvN40nf6OYPgFI4ctlute3UMIFnUuMopgYdYkDyakR1B833HnRqSS4at6FzFHNAoLuP/6Raa+PJQ7fR3uZpEPs0REvBjU22qRGYUca5zsK8YsSX40N8oLGSqvNNDfmzN2M9irVBa97NwQhg=; expires=Wed, 31 Oct 2018 00:52:12 GMT; max-age=7200; path=/; domain=.zdnet.com; HttpOnly
accept-ranges
bytes
expires
Wed, 31 Oct 2018 00:14:33 GMT
/
graph.facebook.com/
572 B
783 B
Script
General
Full URL
https://graph.facebook.com/?id=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&callback=jQuery183005938307649846686_1540939930384&_=1540939932558
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1531-fly/js/main.default.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a03:2880:f01a:1:face:b00c:0:1 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
36d28341aaffbfab267617d0b7218195130a68d5456ce911e14419558ff3e9cb
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=15552000; preload
content-encoding
gzip
etag
"12f766a2426bcee42afb50c18e5548579d42a0ff"
x-app-usage
{"call_count":0,"total_cputime":0,"total_time":0}
status
200
x-fb-rev
4478689
content-length
370
pragma
no-cache
x-fb-debug
ATnZdmkim9eflgFrkx9Sbp1TwCjUd2fww+jAQ2Alb7ksnRw0jCRTF8qZoPJW30ZXAMrscgOWj81HnlQBg3xXFA==
x-fb-trace-id
D/rSV2tNwFa
date
Tue, 30 Oct 2018 22:52:12 GMT
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, no-cache, no-store, must-revalidate
facebook-api-version
v2.8
expires
Sat, 01 Jan 2000 00:00:00 GMT
share
www.linkedin.com/countserv/count/
207 B
1 KB
Script
General
Full URL
https://www.linkedin.com/countserv/count/share?url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&callback=jQuery183005938307649846686_1540939930385&_=1540939932559
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1531-fly/js/main.default.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2620:109:c00c:104::b93f:9001 , United States, ASN14413 (LINKEDIN - LinkedIn Corporation, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
01629bfbfc659b4f648bdfd1d4749d9f23931c045114180094ba8d90091b938e
Security Headers
Name Value
Content-Security-Policy default-src *; connect-src 'self' static.licdn.com media.licdn.com static-exp1.licdn.com static-exp2.licdn.com media-exp1.licdn.com media-exp2.licdn.com https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' platform.linkedin.com spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'; report-uri https://www.linkedin.com/platform-telemetry/csp?f=l
Strict-Transport-Security max-age=2592000
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Accept-Encoding
x-li-uuid
XG9WWLSEYhUAPk8ZyioAAA==
server
Apache-Coyote/1.1
pragma
no-cache
x-li-pop
prod-tln1
x-frame-options
sameorigin
strict-transport-security
max-age=2592000
content-type
text/javascript;charset=UTF-8
x-xss-protection
1; mode=block
cache-control
no-cache, no-store
content-security-policy
default-src *; connect-src 'self' static.licdn.com media.licdn.com static-exp1.licdn.com static-exp2.licdn.com media-exp1.licdn.com media-exp2.licdn.com https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' platform.linkedin.com spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'; report-uri https://www.linkedin.com/platform-telemetry/csp?f=l
x-li-proto
http/2
x-li-fabric
prod-lor1
expires
Thu, 01 Jan 1970 00:00:00 GMT
disqus-count-5922ea1c53-rev.js
zdnet2.cbsistatic.com/fly/js/components/
406 B
480 B
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/js/components/disqus-count-5922ea1c53-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
b8c15c61feffdfe68b168cf2ac8cf58867f38547da3b15d7971a75c44f16bc26

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:12 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 16:42:34 GMT
server
nginx
etag
"5b5f3ffa-196"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
270
expires
Tue, 06 Nov 2018 22:52:12 GMT
controls-ebaf8ad91a-rev.css
zdnet3.cbsistatic.com/fly/css/video/htmlPlayerControls/
42 KB
7 KB
Stylesheet
General
Full URL
https://zdnet3.cbsistatic.com/fly/css/video/htmlPlayerControls/controls-ebaf8ad91a-rev.css
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1531-fly/js/main.default.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
b47241eabf30c18bf1761e363bdc9e5b755ea4b60d71ca9d1a0b3c4f7ffefdb7

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:12 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:41:16 GMT
server
nginx
etag
W/"5bd7463c-a910"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
6704
expires
Tue, 06 Nov 2018 22:52:12 GMT
image-gallery-modal-6c21b7dcbf-rev.js
zdnet1.cbsistatic.com/fly/js/components/
5 KB
2 KB
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/components/image-gallery-modal-6c21b7dcbf-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
b34a764a54cd042f769a2e1a002a27c14132167d8ab9967bc49419c87b694d99

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:12 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 16:42:34 GMT
server
nginx
etag
W/"5b5f3ffa-1503"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
2003
expires
Tue, 06 Nov 2018 22:52:12 GMT
a-6-cambridge.jpg
zdnet3.cbsistatic.com/hub/i/r/2018/07/24/7846cf7a-419e-4111-8a58-6119d0635e38/thumbnail/170x128/374809ede18d88b93f6aaa16332611b4/
4 KB
4 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/07/24/7846cf7a-419e-4111-8a58-6119d0635e38/thumbnail/170x128/374809ede18d88b93f6aaa16332611b4/a-6-cambridge.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
3abead375bb8d384d18dd455d548fa9d94dfd5a876dd8be9b3a5235c771abfec

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:12 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:18 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=23552262
timing-allow-origin
*
content-length
4321
expires
Tue, 30 Jul 2019 13:09:54 GMT
a-7-twitter.jpg
zdnet1.cbsistatic.com/hub/i/r/2018/07/24/43d0ec30-3aa9-4aa6-a680-9d91b6093b8d/thumbnail/170x128/9bd5990d0c901cf70c41161c1762e64b/
6 KB
6 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2018/07/24/43d0ec30-3aa9-4aa6-a680-9d91b6093b8d/thumbnail/170x128/9bd5990d0c901cf70c41161c1762e64b/a-7-twitter.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
31f2502985cd82156618c2842decdd66226091e4f616c8cd3867a9ead2c8a9e3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:12 GMT
content-encoding
gzip
last-modified
Fri, 27 Jul 2018 14:03:05 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=23296528
timing-allow-origin
*
content-length
5716
expires
Sat, 27 Jul 2019 14:07:40 GMT
a-8-tmobile.jpg
zdnet2.cbsistatic.com/hub/i/r/2018/07/24/c7a2b93b-8e6f-4c7e-a63c-7b4301d2a618/thumbnail/170x128/0d2049ff0b22993517383a83b1615952/
8 KB
8 KB
Image
General
Full URL
https://zdnet2.cbsistatic.com/hub/i/r/2018/07/24/c7a2b93b-8e6f-4c7e-a63c-7b4301d2a618/thumbnail/170x128/0d2049ff0b22993517383a83b1615952/a-8-tmobile.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
b2816ae41889388360482588c8af317634fce4179e6cfdad21f26e23ab6a9f7e

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:12 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:18 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=23552255
timing-allow-origin
*
content-length
7820
expires
Tue, 30 Jul 2019 13:09:47 GMT
b-1-jira.jpg
zdnet4.cbsistatic.com/hub/i/r/2018/07/24/0d4315b4-d3f1-49b0-85f5-b29eeacbd413/thumbnail/170x128/feaaa90fe1d813c719d7f9508ea15efe/
3 KB
4 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/hub/i/r/2018/07/24/0d4315b4-d3f1-49b0-85f5-b29eeacbd413/thumbnail/170x128/feaaa90fe1d813c719d7f9508ea15efe/b-1-jira.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
2dbd42e5d6b936274e0cf1688678f567784f89ae4f350d3eaee2dd6b86f65075

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:12 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:18 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=23552216
timing-allow-origin
*
content-length
3425
expires
Tue, 30 Jul 2019 13:09:08 GMT
b-2-raileurope.jpg
zdnet3.cbsistatic.com/hub/i/r/2018/07/24/6f624ea0-dabf-4ae6-a828-b863f83d7f07/thumbnail/170x128/5040b91fae3f612b107fbd27ad2cb882/
7 KB
7 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/07/24/6f624ea0-dabf-4ae6-a828-b863f83d7f07/thumbnail/170x128/5040b91fae3f612b107fbd27ad2cb882/b-2-raileurope.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
35c04e5b7a4044d3d19a6ccd99871a0e7d999570e2c5cfca5c91837e54ebfc9f

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:12 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:18 GMT
server
nginx
status
200
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
http://origin.img.hub.zdnet.com
cache-control
max-age=23552196
timing-allow-origin
*
content-length
6847
expires
Tue, 30 Jul 2019 13:08:48 GMT
/
www.zdnet.com/newsletter/xhr/widget-login/
2 KB
2 KB
XHR
General
Full URL
https://www.zdnet.com/newsletter/xhr/widget-login/?topic=security
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1531-fly/js/main.default.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
221a4620fcc4d7af712510e6ddc3db1dd5b70af63cbc2f414ba647daad2d6c4c
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/newsletter/xhr/widget-login/?topic=security
pragma
no-cache
cookie
utag_main=_sn:1$_ss:0$_st:1540941731769$ses_id:1540939930482%3Bexp-session$_pn:1%3Bexp-session$linktag:undefined%3Bexp-session; RT="sl=1&ss=1540939928122&tt=3758&obo=0&bcn=%2F%2F22ffabbe.akstat.io%2F&sh=1540939931909%3D1%3A0%3A3758&dm=zdnet.com&si=e952bd0c-7094-4622-8840-ba662346d9f8&ld=1540939931910"
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
application/json, text/javascript, */*; q=0.01
cache-control
no-cache
:authority
www.zdnet.com
x-requested-with
XMLHttpRequest
:scheme
https
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
:method
GET
Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Accept-Encoding, User-Agent
content-length
733
x-xss-protection
1; mode=block
pragma
no-cache
referrer-policy
no-referrer-when-downgrade
server
nginx
x-frame-options
SAMEORIGIN
date
Tue, 30 Oct 2018 22:52:12 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-tx-id
68c19789-9e7a-4b14-86ec-e5d601354848
content-type
application/json
access-control-allow-origin
https://www.zdnet.com
cache-control
max-age=0, no-cache, no-store
set-cookie
fly_session=o1nrhrvg7tk88id50hbj2oj5a5; path=/; domain=.zdnet.com; secure; HttpOnly fly_device=desktop; expires=Tue, 06-Nov-2018 22:52:12 GMT; path=/; domain=.zdnet.com; secure fly_geo={"countryCode": "de"}; expires=Tue, 06-Nov-2018 22:52:12 GMT; path=/; domain=.zdnet.com; secure fly_preferred_edition=eu; path=/; domain=.zdnet.com; secure fly_default_edition=eu; path=/; domain=.zdnet.com; secure ak_bmsc=ADAAAA6F76A9858A0381577169A2B33B0210BAB7981700009CE0D85B25B5861F~plHbePmCz8C5nDur82OLLuLlRM0YvMqpnzss+4x5/sjw8836Ee15j8rzAnZCLZBNfjqSyyw/1aRN1db8VKZ3iW8ZoP2mcl+RPIRGMQtYIZQQdLrNe7UnHf6WhTjq2+iyC2KYrE4rhPWm70+to8j0kD9tY6Ht6fxCmn0tbeOK3gq+6M+kisS5bv0S3AiLFHzruIVUSUzcNoJNPKHvu1FhFCgsX6TdfGHhVD2PvhzY77qAQ=; expires=Wed, 31 Oct 2018 00:52:12 GMT; max-age=7200; path=/; domain=.zdnet.com; HttpOnly
accept-ranges
bytes
expires
Tue, 30 Oct 2018 22:52:12 GMT
front-door-carousel-56427878d9-rev.js
zdnet1.cbsistatic.com/fly/js/components/
5 KB
2 KB
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/components/front-door-carousel-56427878d9-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
5ecc6a93ec2939faa8dbf80084346c7d940f5a2181ee69343810da52902eb92d

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:12 GMT
content-encoding
gzip
last-modified
Thu, 16 Aug 2018 13:35:07 GMT
server
nginx
etag
W/"5b757d8b-124a"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
cneonction
close
timing-allow-origin
*
content-length
1564
expires
Tue, 06 Nov 2018 22:52:12 GMT
urban-airship-29ae327ed0-rev.js
zdnet3.cbsistatic.com/fly/js/components/
1 KB
1 KB
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/js/components/urban-airship-29ae327ed0-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
fa33d1db535d783b0baf4e74bdc7ce9e54633f87a03669b2803e567088d64ccb

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:12 GMT
content-encoding
gzip
last-modified
Wed, 29 Aug 2018 13:13:23 GMT
server
nginx
etag
W/"5b869bf3-514"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
827
expires
Tue, 06 Nov 2018 22:52:12 GMT
cs.js
sb.scorecardresearch.com/c2/3005086/
0
400 B
Script
General
Full URL
https://sb.scorecardresearch.com/c2/3005086/cs.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1775.js?utv=ut4.43.201810291720
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.57.19.23 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-57-19-23.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:12 GMT
Content-Encoding
gzip
Last-Modified
Fri, 08 Apr 2011 23:11:26 GMT
ETag
"d41d8cd98f00b204e9800998ecf8427e:1349196464"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=259200
Connection
keep-alive
Content-Length
20
Expires
Fri, 02 Nov 2018 22:52:12 GMT
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=3005086&ns__t=1540939932682&ns_c=UTF-8&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZD...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=3005086&ns__t=1540939932682&ns_c=UTF-8&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20Z...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=3005086&ns__t=1540939932682&ns_c=UTF-8&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c9=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.57.19.23 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-57-19-23.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:12 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=3005086&ns__t=1540939932682&ns_c=UTF-8&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c9=
Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:12 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
/
zn_3xebfjduss0srw5-cbs.siteintercept.qualtrics.com/WRSiteInterceptEngine/
51 KB
13 KB
Script
General
Full URL
https://zn_3xebfjduss0srw5-cbs.siteintercept.qualtrics.com/WRSiteInterceptEngine/?Q_ZID=ZN_3xeBFJDuSs0SRW5&Q_LOC=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.277.js?utv=ut4.43.201810291720
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.77.209.221 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-77-209-221.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
9acc0eb4103d7b741c330849d8234002afa518fd931f8dc964dd3824298d41a1
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:12 GMT
content-encoding
gzip
server
Apache
vary
Accept-Encoding
p3p
CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
status
200
cache-control
public, max-age=60
strict-transport-security
max-age=31536000; includeSubDomains; preload
servershortname
content-type
application/javascript
content-length
12663
expires
Tue, 30 Oct 2018 22:53:12 GMT
m
secure-us.imrworldwide.com/cgi-bin/
Redirect Chain
  • https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-304254h&cg=0&cc=1&si=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp=&ts=compac...
  • https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-304254h&cg=0&cc=1&si=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp=&ts=compac...
44 B
332 B
Image
General
Full URL
https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-304254h&cg=0&cc=1&si=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp=&ts=compact&rnd=1540939932685&ja=1
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.215.27.193 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-215-27-193.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
5ecb58845a9ac30e4eb4b18eb0e7431ba1fb195ce035309735efaee67421c7a3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 30 Oct 2018 22:52:12 GMT
server
nginx
status
200
access-control-allow-methods
POST, OPTIONS
p3p
P3P policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
access-control-allow-origin
*
cache-control
no-cache
content-type
image/gif
content-length
44
expires
Thu, 01 Dec 1994 16:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 30 Oct 2018 22:52:12 GMT
server
nginx
status
302
location
https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-304254h&cg=0&cc=1&si=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp=&ts=compact&rnd=1540939932685&ja=1
access-control-allow-methods
POST, OPTIONS
p3p
P3P policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
access-control-allow-origin
*
cache-control
no-cache
content-length
0
expires
Thu, 01 Dec 1994 16:00:00 GMT
fbevents.js
connect.facebook.net/en_US/
45 KB
14 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
8896bd9aad2399ee52a9878c7ada2e49df2f66ba91afd102244018c25ffd88e2
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
14136
x-xss-protection
0
pragma
public
x-fb-debug
8gO6aSk0VXNxqHblQkXe6/EO84hQWvNh4kheDWwqJ2yTbZ8TNfjmte67uP6K2PHCZi/L5LHSjndKxauDIBOw5A==
x-frame-options
DENY
date
Tue, 30 Oct 2018 22:52:12 GMT
strict-transport-security
max-age=31536000; preload; includeSubDomains
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
expires
Sat, 01 Jan 2000 00:00:00 GMT
adsense.js
asset.pagefair.com/adimages/
0
377 B
Script
General
Full URL
https://asset.pagefair.com/adimages/adsense.js
Requested by
Host: asset.pagefair.com
URL: https://asset.pagefair.com/measure.min.js?_=1540939931552
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
94.31.29.248 , United Kingdom, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
94.31.29.248.IPYX-077437-ZYO.above.net
Software
NetDNA-cache/2.2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:12 GMT
content-encoding
gzip
last-modified
Fri, 09 Mar 2018 17:19:01 GMT
server
NetDNA-cache/2.2
x-amz-request-id
2710969232C88FD9
etag
"8193452d6ae440ec23eff2e1559d5461"
x-cache
HIT
content-type
application/x-javascript
status
200
cache-control
max-age=86400
accept-ranges
bytes
content-length
31
x-amz-id-2
N58qsKobAtW8GF7lHIpkGMSfSvjVesd6ZGlqF4jNgh4zBodoG5Gs0V/4TUAGl73bQPdYvEeNk5o=
expires
Wed, 31 Oct 2018 22:52:12 GMT
textlink-ads.jpg
asset.pagefair.net/adimages/
518 B
540 B
Image
General
Full URL
https://asset.pagefair.net/adimages/textlink-ads.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.161.188.128 Los Angeles, United States, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
87bc265dda5e31597442c420def76eeadb5c516d016213a47f570c65d5558b72

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:12 GMT
content-encoding
gzip
last-modified
Fri, 09 Mar 2018 17:19:02 GMT
server
NetDNA-cache/2.2
x-amz-request-id
E17B31B952B346AB
etag
"262857636d8f02be18171bed8e10c82b"
x-cache
HIT
content-type
image/jpeg
status
200
cache-control
max-age=2592000
accept-ranges
bytes
content-length
229
x-amz-id-2
0c0Jadcy4863JsOsVxRBN1dnrHwY0gGkgn+IvIq6QYjrMoRbaFgTXqcLprTJN4PS5OAkt+h6bOk=
textlink-ads.jpg
asset.pagefair.com/adimages/
518 B
568 B
Image
General
Full URL
https://asset.pagefair.com/adimages/textlink-ads.jpg
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
94.31.29.248 , United Kingdom, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
94.31.29.248.IPYX-077437-ZYO.above.net
Software
NetDNA-cache/2.2 /
Resource Hash
87bc265dda5e31597442c420def76eeadb5c516d016213a47f570c65d5558b72

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:12 GMT
content-encoding
gzip
last-modified
Fri, 09 Mar 2018 17:19:02 GMT
server
NetDNA-cache/2.2
x-amz-request-id
151BA16F428B5E12
etag
"262857636d8f02be18171bed8e10c82b"
x-cache
HIT
content-type
image/jpeg
status
200
cache-control
max-age=86400
accept-ranges
bytes
content-length
229
x-amz-id-2
A7s1JJDViF4zew9OvRn9QoRNkAWfBwOwwmH0svIplay09NP/144VpCMw7Kv+mpD8DWa4eT+lNJA=
expires
Wed, 31 Oct 2018 22:52:12 GMT
headerstats
as-sec.casalemedia.com/
0
337 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=182823&u=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:12 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Tue, 30 Oct 2018 22:52:12 GMT
4083-12969.js
www.everestjs.net/dl/4083/
484 B
655 B
Script
General
Full URL
https://www.everestjs.net/dl/4083/4083-12969.js
Requested by
Host: www.everestjs.net
URL: https://www.everestjs.net/static/st.v3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.8.8.176 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-8-8-176.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
1d4d518e1da495fb6d6d8b3d86bba79d7597b61b466e71c45cdb09ed79659c53

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:12 GMT
Content-Encoding
gzip
Last-Modified
Mon, 25 Nov 2013 14:23:10 GMT
Server
Apache
ETag
"4a5a49-1e4-4ec011a776f80"
Vary
Accept-Encoding
Content-Type
text/javascript
Cache-Control
max-age=45872
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
288
Expires
Wed, 31 Oct 2018 11:36:44 GMT
v
pixel.everesttech.net/4083/
128 B
716 B
Image
General
Full URL
https://pixel.everesttech.net/4083/v?ev___loc=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ev___ref=%2F%2F
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_CBC
Server
66.117.28.68 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
bf94db5c7d218f9a2a2edfff6c01bf65f5946a32000cd41835fee5b564efa62f

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:12 GMT
Last-Modified
Wed, 19 Oct 2016 22:11:25 GMT
Server
Apache
ETag
"9c37b1-80-53f3f17013d40"
Vary
Cookie
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Cache-Control
no-cache
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
image/png
Keep-Alive
timeout=15, max=994994
Content-Length
128
1x1
pixel.everesttech.net/
Redirect Chain
  • https://cm.everesttech.net/cm
  • https://cm.g.doubleclick.net/pixel?google_nid=everest&google_cm&google_sc&ev_rs=1&url=/1x1&google_hm=VzlqZ213QUFBTWFZQXAxNw
  • https://cm.g.doubleclick.net/pixel?google_nid=everest&google_cm=&google_sc=&ev_rs=1&url=/1x1&google_hm=VzlqZ213QUFBTWFZQXAxNw&google_tc=
  • https://cm.everesttech.net/cm/ax?cookieid=&ev_rs=1&url=/1x1&google_gid=CAESEI5F_fSt8RgseDriF2oFWbM&google_cver=1
  • https://pixel.everesttech.net/1x1
128 B
407 B
Image
General
Full URL
https://pixel.everesttech.net/1x1
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_CBC
Server
66.117.28.68 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
bf94db5c7d218f9a2a2edfff6c01bf65f5946a32000cd41835fee5b564efa62f

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:13 GMT
Last-Modified
Wed, 19 Oct 2016 22:11:25 GMT
Server
Apache
ETag
"4436fc-80-53f3f17013d40"
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=15, max=987281
Content-Length
128

Redirect headers

Date
Tue, 30 Oct 2018 22:52:12 GMT
Server
AMO-cookiemap/1.1
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Location
https://pixel.everesttech.net/1x1
Cache-Control
no-cache
Connection
Keep-Alive
Keep-Alive
timeout=15,max=100
Content-Length
0
advertisement-d41d8cd98f-rev.js
zdnet2.cbsistatic.com/fly/js/utils/
0
178 B
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/js/utils/advertisement-d41d8cd98f-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:12 GMT
last-modified
Fri, 10 Aug 2018 18:33:06 GMT
server
nginx
etag
"5b6dda62-0"
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
0
expires
Tue, 06 Nov 2018 22:52:12 GMT
comscore.streaming.6.1.1.171219.min.js
vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/comscore/
104 KB
19 KB
Script
General
Full URL
https://vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/comscore/comscore.streaming.6.1.1.171219.min.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
081873caa83744b6d819ab294b08927e20b60841dd8f23a87c2a57e15f65591c

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:12 GMT
content-encoding
gzip
last-modified
Mon, 26 Mar 2018 15:42:35 GMT
server
Apache
etag
"c3c30c0ebfc35a9426296256fc3133d8:1522078959"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=2592000
accept-ranges
bytes
content-length
18881
expires
Thu, 29 Nov 2018 22:52:12 GMT
fly-disqus-count-1f604770a3-rev.js
zdnet2.cbsistatic.com/fly/js/components/
882 B
671 B
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/js/components/fly-disqus-count-1f604770a3-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
b2ab8784d5ca4bc5e4e1990ba55c6d9f041b8fe8cf41ad9afa37bc1c3dd12756

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:12 GMT
content-encoding
gzip
last-modified
Fri, 25 May 2018 17:24:03 GMT
server
nginx
etag
"5b0846b3-372"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
460
expires
Tue, 06 Nov 2018 22:52:12 GMT
ua-sdk.min.js
web-sdk.urbanairship.com/notify/v1/
78 KB
17 KB
Script
General
Full URL
https://web-sdk.urbanairship.com/notify/v1/ua-sdk.min.js
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/js/components/urban-airship-29ae327ed0-rev.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:19d::e3d , European Union, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
UploadServer /
Resource Hash
1ff53412e0f7149ee0e54173d5681958ad656643e3213acdd588941c89642f9e

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:12 GMT
content-encoding
gzip
x-goog-meta-goog-reserved-file-mtime
1538677181
x-guploader-uploadid
AEnB2UqqNR4wk19g2tb73nuacsujibGNsep56eyKg2AAQHmN9zM-JuHosoBENlEbE24CHAOLBA7mSn6E37SJiiFRs5XWCq1sUA
x-goog-storage-class
MULTI_REGIONAL
status
200
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-length
16960
last-modified
Thu, 04 Oct 2018 18:57:14 GMT
server
UploadServer
etag
"66b301ea9923f38e2300df3d9e6b1156"
vary
Accept-Encoding
x-goog-hash
crc32c=1WWWOQ==, md5=ZrMB6pkj844jAN89nmsRVg==
x-goog-generation
1538679434316060
cache-control
public, max-age=300
x-goog-stored-content-length
79839
accept-ranges
bytes
content-type
application/x-javascript
expires
Tue, 30 Oct 2018 22:57:12 GMT
ima3.js
s0.2mdn.net/instream/html5/
239 KB
82 KB
Script
General
Full URL
https://s0.2mdn.net/instream/html5/ima3.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2006 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
196cf7096a620f542f2560e5c4f17e2e453a546c1c9b6d6fc4730e773595af59
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
83782
x-xss-protection
1; mode=block
expires
Tue, 30 Oct 2018 22:52:12 GMT
config.json
c.go-mpulse.net/api/v2/
2 KB
1 KB
XHR
General
Full URL
https://c.go-mpulse.net/api/v2/config.json?key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&t=1540939932844&s=4777d38f18cf3e4250b3a21d5e08faf7c55821b81c9a2672fe4c213ac9fc73f8
Requested by
Host: zdnet1.cbsistatic.com
URL: https://zdnet1.cbsistatic.com/fly/js/libs/mpulse-1.0.2.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.60.198.210 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-60-198-210.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
25e9475fd11aa1a1d5e4f8c67e26a1a4c6b29533548a7641e9fe8437c2117691

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com

Response headers

Date
Tue, 30 Oct 2018 22:52:12 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
private, max-age=300, stale-while-revalidate=60, stale-if-error=120
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
715
309391486091569
connect.facebook.net/signals/config/
104 KB
19 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/309391486091569?v=2.8.30&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
78e6c9bd32bac30d3171f0257ad9961c141202694725e96d005fd11a8281f556
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' *.atlassolutions.com blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* *.atlassolutions.com attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
19056
x-xss-protection
0
pragma
public
x-fb-debug
3Wpa7+/Dh6THtG6d96hMdUfD+l4NFfy5JxzgJ2EOI/tEo6AZOgZm1ewPUvYx3T0TooLvyH9woyjTFcQ5z/ILlw==
x-frame-options
DENY
date
Tue, 30 Oct 2018 22:52:12 GMT
strict-transport-security
max-age=31536000; preload; includeSubDomains
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
expires
Sat, 01 Jan 2000 00:00:00 GMT
/
www.google.de/pagead/1p-user-list/1036174608/
Redirect Chain
  • https://www.googleadservices.com/pagead/conversion/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&guid=ON&script=0
  • https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&guid=ON&script=0&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&ocp_id=nODYW7uqNYbE7g...
  • https://www.google.com/pagead/1p-user-list/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&random=353963634&crd=CKrPGwiJ0hsIhNAb&cdct=2&is_vtc=1&random=2879898736
  • https://www.google.de/pagead/1p-user-list/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&random=353963634&crd=CKrPGwiJ0hsIhNAb&cdct=2&is_vtc=1&random=28798987...
42 B
109 B
Image
General
Full URL
https://www.google.de/pagead/1p-user-list/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&random=353963634&crd=CKrPGwiJ0hsIhNAb&cdct=2&is_vtc=1&random=2879898736&ipr=y
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:821::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 30 Oct 2018 22:52:13 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 30 Oct 2018 22:52:12 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
image/gif
location
https://www.google.de/pagead/1p-user-list/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&random=353963634&crd=CKrPGwiJ0hsIhNAb&cdct=2&is_vtc=1&random=2879898736&ipr=y
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel
ad.yieldmanager.com/
0
1 KB
Image
General
Full URL
https://ad.yieldmanager.com/pixel?id=2447099&t=2
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1288:110:422::3000 , United Kingdom, ASN34010 (YAHOO-IRD, GB),
Reverse DNS
Software
ATS /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:12 GMT
X-Content-Type-Options
nosniff
Server
ATS
Age
1
Expect-CT
max-age=31536000, report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only"
Strict-Transport-Security
max-age=31536000
Public-Key-Pins-Report-Only
max-age=2592000; pin-sha256="2fRAUXyxl4A1/XHrKNBmc8bTkzA7y4FB/GLJuNAzCqY="; pin-sha256="I/Lt/z7ekCWanjD0Cvj5EqXls2lOaThEA0H2Bg4BT/o="; pin-sha256="K87oWBWM9UZfyddvDfoxL+8lpNyoUB2ptGtn0fv6G2Q="; pin-sha256="Wd8xe/qfTwq3ylFNd3IpaqLHZbh2ZNCLluVzmeNkcpw="; pin-sha256="WoiWRyIOVNa9ihaBciRSC7XHjliYS9VwUGOIud4PB18="; pin-sha256="cGuxAXyFXFkWm61cF4HPWX8S0srS9j0aSqN0k4AP+4A="; pin-sha256="dolnbtzEBnELx/9lOEQ22e6OZO/QNb6VSSX2XHA3E7A="; pin-sha256="i7WTqTvh0OioIruIfFR4kMPnBqrS2rdiVPl/s2uC/CY="; pin-sha256="r/mIkG3eEpVdm+u/ko/cwxzOMo1bk4TyHIlByibiA5E="; pin-sha256="uUwZgwDOxcBXrQcntwu+kYFpkiVkOaezL0WYEZ3anJc="; includeSubdomains; report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-hpkp-report-only"
Connection
keep-alive
Content-Length
0
X-XSS-Protection
1; mode=block
s
pixel.everesttech.net/4083/
128 B
716 B
Image
General
Full URL
https://pixel.everesttech.net/4083/s?s=12969
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_CBC
Server
66.117.28.68 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
bf94db5c7d218f9a2a2edfff6c01bf65f5946a32000cd41835fee5b564efa62f

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:12 GMT
Last-Modified
Wed, 19 Oct 2016 22:11:25 GMT
Server
Apache
ETag
"9c37b1-80-53f3f17013d40"
Vary
Cookie
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Cache-Control
no-cache
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
image/png
Keep-Alive
timeout=15, max=994985
Content-Length
128
a.js
stats.pagefair.com/stats/page_view_event/3393B7A52D1447DD/
25 B
720 B
XHR
General
Full URL
https://stats.pagefair.com/stats/page_view_event/3393B7A52D1447DD/a.js?wl_div_hid_t0=0&div_hid_t0=0&s_blk=0&wl_i_blk=0&i_blk=0&is_ab=0&is_wl=1&new_monthly=1&new_daily=1&_=1540939932895
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1531-fly/js/main.default.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.76.196.204 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-76-196-204.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
2671d72b96d6d9a1b8bbc1429048505ea6dbc3514daf22ab6dd6dfc8a70ce8d3

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:55 GMT
Server
nginx
Access-Control-Allow-Methods
GET, POST, OPTIONS
P3P
CP="NID DSP ALL COR"
Access-Control-Allow-Origin
https://www.zdnet.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/javascript
Access-Control-Allow-Headers
Authorization,Content-Type,Accept,Origin,User-Agent,Cache-Control,Keep-Alive,X-Requested-With,If-Modified-Since,X-CSRF-TOKEN
Content-Length
25
count.js
zdnet-1.disqus.com/
1 KB
1 KB
Script
General
Full URL
https://zdnet-1.disqus.com/count.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.120.134 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
3487ef2baf0c08ba660a8a143cdeb8ebeec961eea04bccd7c49096b4eb26b875
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:13 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Age
1524531
P3P
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Connection
keep-alive
Content-Length
871
X-XSS-Protection
1; mode=block
Last-Modified
Fri, 12 Oct 2018 17:48:14 GMT
Server
nginx
ETag
"5bc0de5e-367"
Strict-Transport-Security
max-age=300; includeSubdomains
Content-Type
application/javascript; charset=utf-8
Cache-Control
max-age=2592000
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
Expires
Mon, 12 Nov 2018 07:23:22 GMT
/
22ffabbe.akstat.io/
0
354 B
Other
General
Full URL
https://22ffabbe.akstat.io/
Requested by
Host: c.go-mpulse.net
URL: https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.8.11.168 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-8-11-168.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:13 GMT
Content-Type
image/gif
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
X-XSS-Protection
0
Expires
Tue, 30 Oct 2018 22:52:13 GMT
/
www.facebook.com/tr/
44 B
244 B
Image
General
Full URL
https://www.facebook.com/tr/?id=309391486091569&ev=PageView&dl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&rl=&if=false&ts=1540939932982&sw=1600&sh=1200&v=2.8.30&r=stable&a=tmtealium&ec=0&o=30&fbp=fb.1.1540939932981.718383062&it=1540939932859&coo=false
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:12 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Tue, 30 Oct 2018 22:52:12 GMT
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/ Frame F0DF
73 KB
27 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
13112639ea5d320063c21803f0172ec3273678f4d8a6215df67c4774659a233e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 24 Oct 2018 17:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
538723
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27234
x-xss-protection
1; mode=block
server
cafe
etag
10801174140179827322
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 07 Nov 2018 17:13:30 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame F0DF
282 KB
87 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_270.js?21062715
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2b28e861a4e45fd1f546a63afabd2f757f8f9e18ec13a5316812237d02a74ecc

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:13 GMT
Content-Encoding
gzip
Last-Modified
Tue, 16 Oct 2018 15:02:25 GMT
Server
AmazonS3
x-amz-request-id
042C6E681D3B8472
ETag
"de2606cae8bdc1e40ebf6e50b8adf558"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=21244
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88514
x-amz-id-2
VH5kWZPBWRhOJV3unQqyHUMBFL5fvqMmS9PvW6ck6djw0i8rwOf4oVexaSy7vp+pQlFv8Gjdncw=
osd.js
pagead2.googlesyndication.com/pagead/
73 KB
27 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/osd.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_270.js?21062715
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
cce5c991fc672328e8eb7e5f9026496acd4fa608d26d0df95c54b7f16a8e5cc4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:29:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1378
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27406
x-xss-protection
1; mode=block
server
cafe
etag
6345757217691752979
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=3600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 23:29:15 GMT
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/ Frame 3F85
73 KB
27 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
13112639ea5d320063c21803f0172ec3273678f4d8a6215df67c4774659a233e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 24 Oct 2018 17:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
538723
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27234
x-xss-protection
1; mode=block
server
cafe
etag
10801174140179827322
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 07 Nov 2018 17:13:30 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame 3F85
282 KB
87 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_270.js?21062715
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2b28e861a4e45fd1f546a63afabd2f757f8f9e18ec13a5316812237d02a74ecc

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:13 GMT
Content-Encoding
gzip
Last-Modified
Tue, 16 Oct 2018 15:02:25 GMT
Server
AmazonS3
x-amz-request-id
042C6E681D3B8472
ETag
"de2606cae8bdc1e40ebf6e50b8adf558"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=21244
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88514
x-amz-id-2
VH5kWZPBWRhOJV3unQqyHUMBFL5fvqMmS9PvW6ck6djw0i8rwOf4oVexaSy7vp+pQlFv8Gjdncw=
9818.js
ads.rubiconproject.com/ad/ Frame E297
26 KB
8 KB
Script
General
Full URL
https://ads.rubiconproject.com/ad/9818.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache / PHP/5.3.3
Resource Hash
d02197080b9680999381b5f5337fedd92674e5a1550ddfcc0c70612d3170a5e3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:13 GMT
Content-Encoding
gzip
Server
Apache
X-Powered-By
PHP/5.3.3
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=3282
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
7558
Expires
Tue, 30 Oct 2018 23:46:55 GMT
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/ Frame E297
73 KB
27 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
13112639ea5d320063c21803f0172ec3273678f4d8a6215df67c4774659a233e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 24 Oct 2018 17:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
538723
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27234
x-xss-protection
1; mode=block
server
cafe
etag
10801174140179827322
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 07 Nov 2018 17:13:30 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame E297
282 KB
87 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_270.js?21062715
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2b28e861a4e45fd1f546a63afabd2f757f8f9e18ec13a5316812237d02a74ecc

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:13 GMT
Content-Encoding
gzip
Last-Modified
Tue, 16 Oct 2018 15:02:25 GMT
Server
AmazonS3
x-amz-request-id
042C6E681D3B8472
ETag
"de2606cae8bdc1e40ebf6e50b8adf558"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=21244
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88514
x-amz-id-2
VH5kWZPBWRhOJV3unQqyHUMBFL5fvqMmS9PvW6ck6djw0i8rwOf4oVexaSy7vp+pQlFv8Gjdncw=
9818.js
ads.rubiconproject.com/ad/ Frame 3DE3
26 KB
8 KB
Script
General
Full URL
https://ads.rubiconproject.com/ad/9818.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache / PHP/5.3.3
Resource Hash
d02197080b9680999381b5f5337fedd92674e5a1550ddfcc0c70612d3170a5e3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:13 GMT
Content-Encoding
gzip
Server
Apache
X-Powered-By
PHP/5.3.3
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=3282
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
7558
Expires
Tue, 30 Oct 2018 23:46:55 GMT
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/ Frame 3DE3
73 KB
27 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
13112639ea5d320063c21803f0172ec3273678f4d8a6215df67c4774659a233e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 24 Oct 2018 17:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
538723
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27234
x-xss-protection
1; mode=block
server
cafe
etag
10801174140179827322
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 07 Nov 2018 17:13:30 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame 3DE3
282 KB
87 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_270.js?21062715
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2b28e861a4e45fd1f546a63afabd2f757f8f9e18ec13a5316812237d02a74ecc

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:13 GMT
Content-Encoding
gzip
Last-Modified
Tue, 16 Oct 2018 15:02:25 GMT
Server
AmazonS3
x-amz-request-id
042C6E681D3B8472
ETag
"de2606cae8bdc1e40ebf6e50b8adf558"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=21244
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88514
x-amz-id-2
VH5kWZPBWRhOJV3unQqyHUMBFL5fvqMmS9PvW6ck6djw0i8rwOf4oVexaSy7vp+pQlFv8Gjdncw=
9818.js
ads.rubiconproject.com/ad/ Frame E6EF
26 KB
8 KB
Script
General
Full URL
https://ads.rubiconproject.com/ad/9818.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache / PHP/5.3.3
Resource Hash
d02197080b9680999381b5f5337fedd92674e5a1550ddfcc0c70612d3170a5e3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:13 GMT
Content-Encoding
gzip
Server
Apache
X-Powered-By
PHP/5.3.3
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=3282
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
7558
Expires
Tue, 30 Oct 2018 23:46:55 GMT
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/ Frame E6EF
73 KB
27 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
13112639ea5d320063c21803f0172ec3273678f4d8a6215df67c4774659a233e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 24 Oct 2018 17:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
538723
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27234
x-xss-protection
1; mode=block
server
cafe
etag
10801174140179827322
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 07 Nov 2018 17:13:30 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame E6EF
282 KB
87 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_270.js?21062715
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2b28e861a4e45fd1f546a63afabd2f757f8f9e18ec13a5316812237d02a74ecc

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:13 GMT
Content-Encoding
gzip
Last-Modified
Tue, 16 Oct 2018 15:02:25 GMT
Server
AmazonS3
x-amz-request-id
042C6E681D3B8472
ETag
"de2606cae8bdc1e40ebf6e50b8adf558"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=21244
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88514
x-amz-id-2
VH5kWZPBWRhOJV3unQqyHUMBFL5fvqMmS9PvW6ck6djw0i8rwOf4oVexaSy7vp+pQlFv8Gjdncw=
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/ Frame 3762
73 KB
27 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
13112639ea5d320063c21803f0172ec3273678f4d8a6215df67c4774659a233e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 24 Oct 2018 17:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
538723
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27234
x-xss-protection
1; mode=block
server
cafe
etag
10801174140179827322
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 07 Nov 2018 17:13:30 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame 3762
282 KB
87 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_270.js?21062715
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2b28e861a4e45fd1f546a63afabd2f757f8f9e18ec13a5316812237d02a74ecc

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:13 GMT
Content-Encoding
gzip
Last-Modified
Tue, 16 Oct 2018 15:02:25 GMT
Server
AmazonS3
x-amz-request-id
042C6E681D3B8472
ETag
"de2606cae8bdc1e40ebf6e50b8adf558"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=21244
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88514
x-amz-id-2
VH5kWZPBWRhOJV3unQqyHUMBFL5fvqMmS9PvW6ck6djw0i8rwOf4oVexaSy7vp+pQlFv8Gjdncw=
9818.js
ads.rubiconproject.com/ad/ Frame C1AF
26 KB
8 KB
Script
General
Full URL
https://ads.rubiconproject.com/ad/9818.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache / PHP/5.3.3
Resource Hash
d02197080b9680999381b5f5337fedd92674e5a1550ddfcc0c70612d3170a5e3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:13 GMT
Content-Encoding
gzip
Server
Apache
X-Powered-By
PHP/5.3.3
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=3282
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
7558
Expires
Tue, 30 Oct 2018 23:46:55 GMT
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/ Frame C1AF
73 KB
27 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
13112639ea5d320063c21803f0172ec3273678f4d8a6215df67c4774659a233e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 24 Oct 2018 17:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
538723
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27234
x-xss-protection
1; mode=block
server
cafe
etag
10801174140179827322
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 07 Nov 2018 17:13:30 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame C1AF
282 KB
87 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_270.js?21062715
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2b28e861a4e45fd1f546a63afabd2f757f8f9e18ec13a5316812237d02a74ecc

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:13 GMT
Content-Encoding
gzip
Last-Modified
Tue, 16 Oct 2018 15:02:25 GMT
Server
AmazonS3
x-amz-request-id
042C6E681D3B8472
ETag
"de2606cae8bdc1e40ebf6e50b8adf558"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=21244
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88514
x-amz-id-2
VH5kWZPBWRhOJV3unQqyHUMBFL5fvqMmS9PvW6ck6djw0i8rwOf4oVexaSy7vp+pQlFv8Gjdncw=
adKit.min.js
rev.cbsi.com/common/js/ Frame 523E
6 KB
2 KB
Script
General
Full URL
https://rev.cbsi.com/common/js/adKit.min.js?2076383587
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
576e8bf4510a62d7cdcfedd8b749f3039d0c5aa8b2bdfe2e38a44645e0f982e4

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
last-modified
Mon, 07 Nov 2016 21:14:51 GMT
server
Apache
etag
"61acd092be7016e54f2dac81f3076225:1478553291"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
accept-ranges
bytes
content-length
2158
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/ Frame 523E
73 KB
27 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
13112639ea5d320063c21803f0172ec3273678f4d8a6215df67c4774659a233e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 24 Oct 2018 17:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
538723
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27234
x-xss-protection
1; mode=block
server
cafe
etag
10801174140179827322
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 07 Nov 2018 17:13:30 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame 523E
282 KB
87 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_270.js?21062715
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2b28e861a4e45fd1f546a63afabd2f757f8f9e18ec13a5316812237d02a74ecc

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:13 GMT
Content-Encoding
gzip
Last-Modified
Tue, 16 Oct 2018 15:02:25 GMT
Server
AmazonS3
x-amz-request-id
042C6E681D3B8472
ETag
"de2606cae8bdc1e40ebf6e50b8adf558"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=21244
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88514
x-amz-id-2
VH5kWZPBWRhOJV3unQqyHUMBFL5fvqMmS9PvW6ck6djw0i8rwOf4oVexaSy7vp+pQlFv8Gjdncw=
view
securepubads.g.doubleclick.net/pcs/ Frame F0DF
0
63 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuN1ip27yS0xYxPgilUNx2GIBVT7nAcXLbRYVVN5W6hygM7CwMO1vgK3UkGnT6BXuBu85xhgsw5MaNqLVa8579RkyOb_aXr-fhOCZ1rJg84G8QYyRJcgSOpEt9GVt9w6OsRIivxtz1mKChVyvFG4E3IqAHvJKfNkJzbeo4SQgKISMwqIkay9ahHUBUQbrjo4DK7n3YeECIZsdGTRcOVp_XeZMzXG58PG4o1l8RGSi0BtUPboLIRdiplYS97-Eyv_w&sai=AMfl-YQfNmzUUJswLpCuYHqfP3S7-G08eNpYMPOSL79gdzKDu8Qn2XwF6aW5lugLr0P7Gukrmvv9PFCRg61_2TAoD_fGPfthYU5Ke-WFJnTX&sig=Cg0ArKJSzILFismUs5AAEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 22:52:13 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame 3F85
0
63 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsu_ArY01w20lJ0SfhD0ii-tyGC8Na0wIN5m7a5vxKeQFtAWlij8KN7YlrUaRfuOiHfSiXu34A7C9BlkAvmee9D2aPHoKOuezDO7Lm6tNYwVn8evCwwZN2R_t8DnV8KklLLczGf7Go6cGshilxamV1rQhu_F7GVXUS1cf0BZfLqVL12u-BNFZcAkZ4cteTFISgnW-EVWCvEMxaCerZNQ-wawdR7jhyn8Aw3YqftoSFENyKPOGkR6h6FBfKWsKKDPHg&sai=AMfl-YRzO3etKngldvTJeiZOOdeyeNX9a75zE1t5I8nrPkoClVSVF9oHl1w5cYqA84wvq3vry4Vz1j8xIUGpLdb6DBpZx7Ssj5b5X6wjkvES&sig=Cg0ArKJSzAI8kNc2GAKOEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 22:52:13 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame E297
0
54 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssJ3kMxTq6JabTlrME0iwPtoSfAD9GezQj-lAg2GxSvUKAwBF9cQb-IY9HeDuVnA-BEXvpL6M7e1pXFIzw37xKcEvZySFmyhaPy6I5GUwoo6cAiGObDHFN6so07sDhf6VWIS7zW2leeuoC8IqhAxvUNJS2kzm9K_tlSJnlfoV_pvDN0jXyWfwHRQcu6PRKVE3yMRXID7QTtqFxv79-MYBwp8Y1LvsU_ZtvrQgc8-R6WLy-uYEmaj3i8vFii&sai=AMfl-YShS2uX3IN8uXsIVUb5aWucErGNYJsA65XYZreWysA6niEndFOsP60G46tayt7n3CuqxA29OIjNDbIDjKLJm91IY21O_4ABdCTMaGGS&sig=Cg0ArKJSzBi8rb7vR4bCEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 22:52:13 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame 3DE3
0
54 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssAYecC7DKvTA3D5OEmOFfSYBLx1MIXxMyV6D9pGC2yMchfq-SDLbZiFWe8MHiP5yNOuOPubQRuwks9NqPOr2fAWmVdg6IsSNUtdlorgcoNKsedRUhADqX2x1UKnSk4xlri7ZqzGkKQ63IiFqmpTx4ChcS4XawHgDrmhIzlxdowuIuiCP0YcKP_mpH-OogFRmvt8UYXpZd9DeZQyiEduFETgRkH2xUZaM8lDWgr-PdcZI49cULRp0Vlfb7n&sai=AMfl-YSLgs-KUxh45uVIFy6-Q6KBCLqUkbuk5PdmepkcNUXRlzETBboWVe55iC46hDvq_lEKKGi4QOgWdF4I9x7ZSG3FEvh_6b5IbcTADlhs&sig=Cg0ArKJSzA4s12a0fz7UEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 22:52:13 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame E6EF
0
63 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvbuLEMjUQOeuaAX0aDWVN2uORQGzy3SLtgo_CmyIpZyYY1rGEuv-FzCs2GtVUfkBrItmD-HYa0Ru8IViVFb2_LT2ZQh_oH179jHYBHyXmRPcJWbB-U3kiEGKPyEOIui5C9ETTJsIErY9EsoVHK-ULmrrb5uKEYI75gnRkWxqveM89wpHkLqoNoVliNWTlljuhgJrvCRLZd5-eMiNrkSx1cWSM2ckIONwixpP8iw2ZLbwUqgRSnFjljN2v4&sai=AMfl-YSMDUZlmhqkh9aZB5R6Bc9cpZpOc_FopPT418Vqm9yRJylb-i5oqET8B6Pipa6ZEEl6NXXI-vUeZDk_LG8xlqZ7SfGtrlNFRsn6oG2c&sig=Cg0ArKJSzPpp0EPbUkWMEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 22:52:13 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame 3762
0
63 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvpCneTXAOYH2z9-8c5eiAU8z8yjPC5dREy66dgvDU7XqGwzE972RW8-Lyrhp2xwu6a_GBfhJIHPNvah1UFMpd-tt2IJSYFWJGb-l7ztj8uxrFxZ71ln1QqHgENqN--NAjhiFNh9DmyclIrrebUXQKfdDrES0cRNmcxjvgNv7XQ6gSVlRrqgagVtaiPmfDDD0ysCvmXoDfGIe3fEU2-rcRv8l46NIuyBtVBzED2YvrmEgAwAZHpD4FXnVzjdAPzLA&sai=AMfl-YSdrru5rLcgZajSo9CbyVAUKwiB-4iMWg0eXlFrv0KArXdJ_x30VMrsI9GeP7hIZWuufkqX8wTS1GzkZju1gDX8vv-iqQVBKq_ksS9r&sig=Cg0ArKJSzFoA9RgxuRM9EAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 22:52:13 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame C1AF
0
63 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstzeR3jqLBA0VIZhwYv9lCOXK1w8zXdxayMFpMtEsYc_vzoBpChgX4uCsmJpcTv3XaMliEOYIQSSsml-Eed1x9aJxbR-w-jnRj4ZwP141ho1fr2TGx9Eg-5NbVD-0ODZd9DBfhoUO31Lbb_oLiQIPfTtbqdnF37wyTZRi2GD6J_DkcKPKNyUBZaxji9RvJZaGI2ULWIF-NzHKf6GOan_e_EdaBnzUP1Hx3Qd2iRPTZn81LkpC8-UBXyXnzE&sai=AMfl-YQOnWaSjSebN5lAW5IQwE0gp2P0P_iCxDjKVu9jk0ZcR4wwlqzGvypc6j8BCkFMp8XyRsM4xDJZ_4sN726QVrlCVmY10c91rLEl33L3&sig=Cg0ArKJSzPzlNsOoPWobEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 22:52:13 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame 523E
0
54 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsu6nEnE0Ovnr-w7NfYBQuBT2JLukI7CHe3qAiatw5uCdMBRc-NO_h9IC6HIdyPs1Bt42PoVcAYZauEyBZpZFBUbInzSsjmkHsT9XjMGS16pTbh1oHq65B8huTBIFXHSQabbiXiEQv2WUqkiX9-daBkdpNUTYr-lojml6H13ZKysnzVBjU57YSQCa7LD2R5pFg6sTRp1nP0IntcTNLHdMDCAXJVyBH8g8lINklS_xxR7S6Ndz_qZJQ1DyfWKWR-GGQ&sai=AMfl-YTftP1E_WGx0o97WUo7dsDyaPIq1uhnKDOYVWK0fIc0IYiCFe9BONQtMiQcs7Q9KT4qkInX7d08P8ZGLxp3DUe8DJ7zUFEYGCKGYhtv&sig=Cg0ArKJSzLNlJyDD-JbFEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 22:52:13 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
283812-2.js
optimized-by.rubiconproject.com/a/9818/59604/ Frame E297
2 KB
1 KB
Script
General
Full URL
https://optimized-by.rubiconproject.com/a/9818/59604/283812-2.js?&cb=0.3685812402983639&tk_st=1&rf=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp_s=c&p_pos=atf&p_screen_res=1600x1200&ad_slot=59604_2&rp_secure=1
Requested by
Host: ads.rubiconproject.com
URL: https://ads.rubiconproject.com/ad/9818.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.61 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
23f515e63abad47efe09fc0e9199340c22b063467f3c72be0937ac0a5c3fef73

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:13 GMT
Content-Encoding
gzip
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Connection
Keep-Alive
Content-Type
text/javascript
Keep-Alive
timeout=0, max=7
Content-Length
1069
Expires
Wed, 17 Sep 1975 21:32:10 GMT
283812-15.js
optimized-by.rubiconproject.com/a/9818/59604/ Frame 3DE3
2 KB
1 KB
Script
General
Full URL
https://optimized-by.rubiconproject.com/a/9818/59604/283812-15.js?&cb=0.677572582874701&tk_st=1&rf=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp_s=c&p_pos=atf&p_screen_res=1600x1200&ad_slot=59604_15&rp_secure=1
Requested by
Host: ads.rubiconproject.com
URL: https://ads.rubiconproject.com/ad/9818.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.61 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
37c1f28fa5af6044e8bbaf10eb2e55ec5f102a23ec29430f6b4b1fa5c0ba3f7b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:13 GMT
Content-Encoding
gzip
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Connection
Keep-Alive
Content-Type
text/javascript
Keep-Alive
timeout=0, max=8
Content-Length
920
Expires
Wed, 17 Sep 1975 21:32:10 GMT
283812-15.js
optimized-by.rubiconproject.com/a/9818/59604/ Frame E6EF
2 KB
1 KB
Script
General
Full URL
https://optimized-by.rubiconproject.com/a/9818/59604/283812-15.js?&cb=0.9596133517494687&tk_st=1&rf=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp_s=c&p_pos=btf&p_screen_res=1600x1200&ad_slot=59604_15&rp_secure=1
Requested by
Host: ads.rubiconproject.com
URL: https://ads.rubiconproject.com/ad/9818.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.61 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
a774caeb545e1303d90eecc947ec2bf8e8bf534b7db6b17ec88b7cf44ca0ccc4

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:13 GMT
Content-Encoding
gzip
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Connection
Keep-Alive
Content-Type
text/javascript
Keep-Alive
timeout=0, max=6
Content-Length
918
Expires
Wed, 17 Sep 1975 21:32:10 GMT
283812-2.js
optimized-by.rubiconproject.com/a/9818/59604/ Frame C1AF
2 KB
1 KB
Script
General
Full URL
https://optimized-by.rubiconproject.com/a/9818/59604/283812-2.js?&cb=0.10955452410261213&tk_st=1&rf=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp_s=c&p_pos=btf&p_screen_res=1600x1200&ad_slot=59604_2&rp_secure=1
Requested by
Host: ads.rubiconproject.com
URL: https://ads.rubiconproject.com/ad/9818.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.61 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
9b0b6168c980a7f48beb5e4482e3f39275b7b341427b4ebd437392f71c4bdff0

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:13 GMT
Content-Encoding
gzip
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Connection
Keep-Alive
Content-Type
text/javascript
Keep-Alive
timeout=0, max=4
Content-Length
919
Expires
Wed, 17 Sep 1975 21:32:10 GMT
count-data.js
zdnet-1.disqus.com/
243 B
769 B
Script
General
Full URL
https://zdnet-1.disqus.com/count-data.js?1=7a12161d-2a5f-4793-b0a4-9fac038733de
Requested by
Host: zdnet-1.disqus.com
URL: https://zdnet-1.disqus.com/count.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.120.134 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
ebff5e526eaecb20e91c2af0476f72cdae479b8e36b89f4e3068ce46dd1db96f
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:13 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Server
nginx
Age
3518
X-Frame-Options
SAMEORIGIN
Connection
keep-alive
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Vary
Accept-Encoding
Cache-Control
public, max-age=600
Strict-Transport-Security
max-age=300; includeSubdomains
Content-Type
application/javascript; charset=UTF-8
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
Content-Length
205
X-XSS-Protection
1; mode=block
mux.js
vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/
70 KB
22 KB
Script
General
Full URL
https://vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/mux.js
Requested by
Host: vidtech.cbsinteractive.com
URL: https://vidtech.cbsinteractive.com/uvpjs/2.8.3/CBSI-PLAYER.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
3ae5d0f70dfeb1308462aaaa19d8326a6bd2d41781323b07db04cccffc09cf5f

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
last-modified
Mon, 26 Mar 2018 15:42:36 GMT
server
Apache
etag
"6ff5de35d5b5d1d667e341d5109a9c19:1522078959"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=2592000
accept-ranges
bytes
content-length
21978
expires
Thu, 29 Nov 2018 22:52:13 GMT
ggcmb510.js
cdn-gl.imrworldwide.com/novms/js/2/
12 KB
5 KB
Script
General
Full URL
https://cdn-gl.imrworldwide.com/novms/js/2/ggcmb510.js
Requested by
Host: vidtech.cbsinteractive.com
URL: https://vidtech.cbsinteractive.com/uvpjs/2.8.3/CBSI-PLAYER.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.93.121 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-93-121.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
f68ec7cf550e86cb14e4d992724157c4f625ea3f0cd7d06e9e533c17c735401d

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 04 Oct 2018 18:49:05 GMT
Content-Encoding
gzip
Last-Modified
Wed, 03 Oct 2018 17:26:15 GMT
Server
AmazonS3
Age
14585
x-amz-server-side-encryption
AES256
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
x-amz-version-id
DqBXYNAeWk9c9ecQe6fCjbgUkjUpFyFY
Via
1.1 e7c35757c4581d46396ae4c0a48815ef.cloudfront.net (CloudFront)
Cache-Control
max-age=86400
Transfer-Encoding
chunked
Connection
keep-alive
Content-Type
application/javascript
X-Amz-Cf-Id
WSk5RMSYfRl7Pa7huCxXQspRlfr95Bnj7K_Y2hWoY8Kk8KLZ_8nMjg==
AppMeasurement-2.3.0.min.js
vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/adobe/
77 KB
27 KB
Script
General
Full URL
https://vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/adobe/AppMeasurement-2.3.0.min.js
Requested by
Host: vidtech.cbsinteractive.com
URL: https://vidtech.cbsinteractive.com/uvpjs/2.8.3/CBSI-PLAYER.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
4974c54f5183f50fd1f3c3d49c496fd79602f8159b6d393d3fab09e4433555dd

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
last-modified
Mon, 26 Mar 2018 15:42:35 GMT
server
Apache
etag
"d71ba6c9a930b6864408830c3e2705f9:1522078958"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=2592000
accept-ranges
bytes
content-length
27260
expires
Thu, 29 Nov 2018 22:52:13 GMT
VideoHeartbeat-2.0.2.min.js
vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/adobe/
143 KB
29 KB
Script
General
Full URL
https://vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/adobe/VideoHeartbeat-2.0.2.min.js
Requested by
Host: vidtech.cbsinteractive.com
URL: https://vidtech.cbsinteractive.com/uvpjs/2.8.3/CBSI-PLAYER.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e08209b44a15fd9f6b9977d2580034e8d3da36542235802c2722ff8db4c0a461

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
last-modified
Mon, 26 Mar 2018 15:42:35 GMT
server
Apache
etag
"215943f0e77b4fcc9cc72b98a8ea1cfc:1522078958"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=2592000
accept-ranges
bytes
content-length
28977
expires
Thu, 29 Nov 2018 22:52:13 GMT
gpt.js
www.googletagservices.com/tag/js/ Frame 523E
24 KB
9 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: rev.cbsi.com
URL: https://rev.cbsi.com/common/js/adKit.min.js?2076383587
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:821::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cbe1f033ed03b9f1b425c1ad45d6406f019fe8666c20ab24fb6719579f75065b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"9 / 928 of 1000 / last-modified: 1540922836"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
8892
x-xss-protection
1; mode=block
expires
Tue, 30 Oct 2018 22:52:13 GMT
show_ads.js
pagead2.googlesyndication.com/pagead/ Frame E297
54 KB
21 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/show_ads.js
Requested by
Host: optimized-by.rubiconproject.com
URL: https://optimized-by.rubiconproject.com/a/9818/59604/283812-2.js?&cb=0.3685812402983639&tk_st=1&rf=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp_s=c&p_pos=atf&p_screen_res=1600x1200&ad_slot=59604_2&rp_secure=1
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
334ecb5de067cf73650b13cd8a01b4493877bdbcb41405cde049e4fdcb14d487
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
21089
x-xss-protection
1; mode=block
server
cafe
etag
1636307937246973836
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 22:52:13 GMT
7e736788-48c4-47bb-b3f9-2ee4eb9d6a45
beacon-eu-ams3.rubiconproject.com/beacon/d/ Frame E297
43 B
268 B
Image
General
Full URL
https://beacon-eu-ams3.rubiconproject.com/beacon/d/7e736788-48c4-47bb-b3f9-2ee4eb9d6a45?oo=51&accountId=9818&siteId=59604&zoneId=283812&sizeId=2&e=6A1E40E384DA563B733A341ECEB6CAF22C414C73BAE364A1A9EDF17025A0926CEE4BEAA0FF87408B60680EEE92D5EBA4FE5D718BBE08EF1C8D594F908BC828E4E4B2ACB518B53AB53570ECD3831C9446AC237D6FA0EBFC9ADFFA16DC2C67B308EB2496EFCC5E65F1F5BE0B04AD33F58D33F8630F2FDB6069
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.57 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
Rubicon Project /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:13 GMT
Cache-Control
private, max-age=0, no-cache
Server
Rubicon Project
Content-Type
image/webp
Content-Length
43
Expires
01 Jan 1970 10:00:00 GMT
show_ads.js
pagead2.googlesyndication.com/pagead/ Frame 3DE3
54 KB
21 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/show_ads.js
Requested by
Host: optimized-by.rubiconproject.com
URL: https://optimized-by.rubiconproject.com/a/9818/59604/283812-15.js?&cb=0.677572582874701&tk_st=1&rf=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp_s=c&p_pos=atf&p_screen_res=1600x1200&ad_slot=59604_15&rp_secure=1
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
334ecb5de067cf73650b13cd8a01b4493877bdbcb41405cde049e4fdcb14d487
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
21089
x-xss-protection
1; mode=block
server
cafe
etag
1636307937246973836
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 22:52:13 GMT
eacfdc6f-0685-4397-a540-2e13c5f44337
beacon-eu-ams3.rubiconproject.com/beacon/d/ Frame 3DE3
43 B
268 B
Image
General
Full URL
https://beacon-eu-ams3.rubiconproject.com/beacon/d/eacfdc6f-0685-4397-a540-2e13c5f44337?oo=51&accountId=9818&siteId=59604&zoneId=283812&sizeId=15&e=6A1E40E384DA563B637FF533CC576E7018D01A6BD7E42A439FC08DB5AC74FE0A5AC8A13430D647E3065C33EF831F9D9A347417BE7FFEFA4D574B2301107A7819BF7B1D292FD36836B4243BD7F3A6BBEB9E3C1C10F9FC8DCDB602FF66AE46020F9126BDA689EC8399109478760DFABCFE32997889F1DA11D8
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.57 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
Rubicon Project /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:13 GMT
Cache-Control
private, max-age=0, no-cache
Server
Rubicon Project
Content-Type
image/webp
Content-Length
43
Expires
01 Jan 1970 10:00:00 GMT
show_ads.js
pagead2.googlesyndication.com/pagead/ Frame E6EF
54 KB
21 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/show_ads.js
Requested by
Host: optimized-by.rubiconproject.com
URL: https://optimized-by.rubiconproject.com/a/9818/59604/283812-15.js?&cb=0.9596133517494687&tk_st=1&rf=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp_s=c&p_pos=btf&p_screen_res=1600x1200&ad_slot=59604_15&rp_secure=1
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
334ecb5de067cf73650b13cd8a01b4493877bdbcb41405cde049e4fdcb14d487
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
21089
x-xss-protection
1; mode=block
server
cafe
etag
1636307937246973836
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 22:52:13 GMT
cc733d1e-70f5-4ad8-b0c9-e46525af9a0b
beacon-eu-ams3.rubiconproject.com/beacon/d/ Frame E6EF
43 B
268 B
Image
General
Full URL
https://beacon-eu-ams3.rubiconproject.com/beacon/d/cc733d1e-70f5-4ad8-b0c9-e46525af9a0b?oo=51&accountId=9818&siteId=59604&zoneId=283812&sizeId=15&e=6A1E40E384DA563BFC4E2EADD62EE40B0A62C8CEC115A162C0204A31BAB80BE211CCC41CC28FAE468882778672FB14D4FE5D718BBE08EF1C9C9076E5F0F554DDE4B2ACB518B53AB53570ECD3831C9446AC237D6FA0EBFC9ADFFA16DC2C67B3089339CFA995EA1520F5BE0B04AD33F58D33F8630F2FDB6069
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.57 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
Rubicon Project /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:13 GMT
Cache-Control
private, max-age=0, no-cache
Server
Rubicon Project
Content-Type
image/webp
Content-Length
43
Expires
01 Jan 1970 10:00:00 GMT
show_ads.js
pagead2.googlesyndication.com/pagead/ Frame C1AF
54 KB
21 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/show_ads.js
Requested by
Host: optimized-by.rubiconproject.com
URL: https://optimized-by.rubiconproject.com/a/9818/59604/283812-2.js?&cb=0.10955452410261213&tk_st=1&rf=https%3A//www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/&rp_s=c&p_pos=btf&p_screen_res=1600x1200&ad_slot=59604_2&rp_secure=1
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
334ecb5de067cf73650b13cd8a01b4493877bdbcb41405cde049e4fdcb14d487
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
21089
x-xss-protection
1; mode=block
server
cafe
etag
1636307937246973836
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 22:52:13 GMT
17a93e36-5f6b-4061-8a6c-fdc55a849a75
beacon-eu-ams3.rubiconproject.com/beacon/d/ Frame C1AF
43 B
268 B
Image
General
Full URL
https://beacon-eu-ams3.rubiconproject.com/beacon/d/17a93e36-5f6b-4061-8a6c-fdc55a849a75?oo=51&accountId=9818&siteId=59604&zoneId=283812&sizeId=2&e=6A1E40E384DA563B37B35B58C7DAA04036E163706C319FC83FE785E25F7C0289A2450B96C42F2E5F65682992D1CD6118347417BE7FFEFA4D7489C0125BE63920BF7B1D292FD36836B4243BD7F3A6BBEB9E3C1C10F9FC8DCDB602FF66AE46020F9126BDA689EC8399109478760DFABCFE32997889F1DA11D8
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.57 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
Rubicon Project /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:13 GMT
Cache-Control
private, max-age=0, no-cache
Server
Rubicon Project
Content-Type
image/webp
Content-Length
43
Expires
01 Jan 1970 10:00:00 GMT
integrator.js
adservice.google.de/adsid/ Frame E297
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:820::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
integrator.js
adservice.google.com/adsid/ Frame E297
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81a::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
ca-pub-1991679624331369.js
pagead2.googlesyndication.com/pub-config/r20160913/ Frame E297
68 B
149 B
Script
General
Full URL
https://pagead2.googlesyndication.com/pub-config/r20160913/ca-pub-1991679624331369.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8ba131a677ea1357ae7fdc95d6a5c67c3b02d171bb286f6c9ec6bce3cef5c211
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:33:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
age
1121
content-type
text/javascript
status
200
cache-control
public, max-age=43200
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
88
x-xss-protection
1; mode=block
expires
Wed, 31 Oct 2018 10:33:32 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/ Frame E297
201 KB
75 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
181124d1788d7083ab1de6fbeb87f524e1a3c9658ccdf54c4f49ab523df2253c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
76196
x-xss-protection
1; mode=block
server
cafe
etag
4706987710021974220
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 22:52:13 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/ Frame 0BFD
201 KB
75 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
181124d1788d7083ab1de6fbeb87f524e1a3c9658ccdf54c4f49ab523df2253c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
76196
x-xss-protection
1; mode=block
server
cafe
etag
4706987710021974220
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 22:52:13 GMT
analytics.js
s.update.rubiconproject.com/2/873648/ Frame E297
0
75 B
Script
General
Full URL
https://s.update.rubiconproject.com/2/873648/analytics.js?si=59604&di=www.zdnet.com&ap=&dm=2&pi=283812&ti=7e736788-48c4-47bb-b3f9-2ee4eb9d6a45&r5=Mozilla%2F5.0%20(Macintosh%3B%20Intel%20Mac%20OS%20X%2010_13_5)%20AppleWebKit%2F537.36%20(KHTML%2C%20like%20Gecko)%20Chrome%2F67.0.3396.87%20Safari%2F537.36&dt=8736481428691810142000
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
18.233.16.74 Cambridge, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-18-233-16-74.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:13 GMT
Content-Length
0
usync.html
eus.rubiconproject.com/ Frame E6A5
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Tue, 09 Oct 2018 10:25:22 GMT
Content-Encoding
gzip
Content-Length
7376
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=31840
Expires
Wed, 31 Oct 2018 07:42:53 GMT
Date
Tue, 30 Oct 2018 22:52:13 GMT
Connection
keep-alive
Vary
Accept-Encoding
integrator.js
adservice.google.de/adsid/ Frame 3DE3
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:820::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
integrator.js
adservice.google.com/adsid/ Frame 3DE3
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81a::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
ca-pub-1991679624331369.js
pagead2.googlesyndication.com/pub-config/r20160913/ Frame 3DE3
68 B
145 B
Script
General
Full URL
https://pagead2.googlesyndication.com/pub-config/r20160913/ca-pub-1991679624331369.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8ba131a677ea1357ae7fdc95d6a5c67c3b02d171bb286f6c9ec6bce3cef5c211
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:33:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
age
1121
content-type
text/javascript
status
200
cache-control
public, max-age=43200
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
88
x-xss-protection
1; mode=block
expires
Wed, 31 Oct 2018 10:33:32 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/ Frame 3DE3
201 KB
75 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
181124d1788d7083ab1de6fbeb87f524e1a3c9658ccdf54c4f49ab523df2253c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
76196
x-xss-protection
1; mode=block
server
cafe
etag
4706987710021974220
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 22:52:13 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/ Frame C13F
201 KB
75 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
181124d1788d7083ab1de6fbeb87f524e1a3c9658ccdf54c4f49ab523df2253c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
76196
x-xss-protection
1; mode=block
server
cafe
etag
4706987710021974220
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 22:52:13 GMT
usync.html
eus.rubiconproject.com/ Frame F2DB
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Tue, 09 Oct 2018 10:25:22 GMT
Content-Encoding
gzip
Content-Length
7376
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=31840
Expires
Wed, 31 Oct 2018 07:42:53 GMT
Date
Tue, 30 Oct 2018 22:52:13 GMT
Connection
keep-alive
Vary
Accept-Encoding
integrator.js
adservice.google.de/adsid/ Frame E6EF
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:820::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
integrator.js
adservice.google.com/adsid/ Frame E6EF
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81a::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
ca-pub-1991679624331369.js
pagead2.googlesyndication.com/pub-config/r20160913/ Frame E6EF
68 B
145 B
Script
General
Full URL
https://pagead2.googlesyndication.com/pub-config/r20160913/ca-pub-1991679624331369.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8ba131a677ea1357ae7fdc95d6a5c67c3b02d171bb286f6c9ec6bce3cef5c211
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:33:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
age
1121
content-type
text/javascript
status
200
cache-control
public, max-age=43200
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
88
x-xss-protection
1; mode=block
expires
Wed, 31 Oct 2018 10:33:32 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/ Frame E6EF
201 KB
75 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
181124d1788d7083ab1de6fbeb87f524e1a3c9658ccdf54c4f49ab523df2253c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
76196
x-xss-protection
1; mode=block
server
cafe
etag
4706987710021974220
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 22:52:13 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/ Frame B32C
201 KB
75 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
181124d1788d7083ab1de6fbeb87f524e1a3c9658ccdf54c4f49ab523df2253c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
76196
x-xss-protection
1; mode=block
server
cafe
etag
4706987710021974220
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 22:52:13 GMT
usync.html
eus.rubiconproject.com/ Frame 8190
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Tue, 09 Oct 2018 10:25:22 GMT
Content-Encoding
gzip
Content-Length
7376
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=31840
Expires
Wed, 31 Oct 2018 07:42:53 GMT
Date
Tue, 30 Oct 2018 22:52:13 GMT
Connection
keep-alive
Vary
Accept-Encoding
integrator.js
adservice.google.de/adsid/ Frame C1AF
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:820::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
integrator.js
adservice.google.com/adsid/ Frame C1AF
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81a::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
ca-pub-1991679624331369.js
pagead2.googlesyndication.com/pub-config/r20160913/ Frame C1AF
68 B
145 B
Script
General
Full URL
https://pagead2.googlesyndication.com/pub-config/r20160913/ca-pub-1991679624331369.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8ba131a677ea1357ae7fdc95d6a5c67c3b02d171bb286f6c9ec6bce3cef5c211
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:33:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
age
1121
content-type
text/javascript
status
200
cache-control
public, max-age=43200
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
88
x-xss-protection
1; mode=block
expires
Wed, 31 Oct 2018 10:33:32 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/ Frame C1AF
201 KB
75 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
181124d1788d7083ab1de6fbeb87f524e1a3c9658ccdf54c4f49ab523df2253c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
76196
x-xss-protection
1; mode=block
server
cafe
etag
4706987710021974220
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 22:52:13 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/ Frame A231
201 KB
75 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
181124d1788d7083ab1de6fbeb87f524e1a3c9658ccdf54c4f49ab523df2253c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
76196
x-xss-protection
1; mode=block
server
cafe
etag
4706987710021974220
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 22:52:13 GMT
usync.html
eus.rubiconproject.com/ Frame 3522
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Tue, 09 Oct 2018 10:25:22 GMT
Content-Encoding
gzip
Content-Length
7376
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=31840
Expires
Wed, 31 Oct 2018 07:42:53 GMT
Date
Tue, 30 Oct 2018 22:52:13 GMT
Connection
keep-alive
Vary
Accept-Encoding
integrator.js
adservice.google.de/adsid/ Frame 523E
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:820::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 22:52:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
integrator.js
adservice.google.com/adsid/ Frame 523E
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81a::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 22:52:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
104
x-xss-protection
1; mode=block
pubads_impl_270.js
securepubads.g.doubleclick.net/gpt/ Frame 523E
184 KB
63 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_270.js?21062715
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
sffe /
Resource Hash
516b065177d1546683627fa32c8574fd59edc3eb3bf92cef5882d53e58d7a1f2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 24 Oct 2018 15:56:38 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
64036
x-xss-protection
1; mode=block
expires
Tue, 30 Oct 2018 22:52:14 GMT
n.js
geo.moatads.com/ Frame F0DF
107 B
371 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&i=CBSDFPCW2&hp=1&cm=20&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1540939934102&de=315261906537&m=0&ar=7554d5b-clean&q=2&cb=0&cu=1540939934102&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25477209%3A2356361194%3A4745974454%3A138239360957&zMoatPS=nav&zMoatPT=article&zMoatW=7&zMoatH=7&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatSN=f&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=nav-ad&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=nav-ad-5bd8e099312c0&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=nav&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=7x7&zMoatSZPS=7x7%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&tz=nav-ad&fs=152610&na=472947047&cs=0&callback=MoatSuperV26.gna771618
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.130.88.116 Cambridge, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-130-88-116.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
2a0910180c90117140d4839a65e12b3a9b62f0ec56c507ff5b809dadf6e9f1f9

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:14 GMT
Server
nginx/1.7.9
Etag
"734a86cd6fa963d19bc4a4b899762f1b0540b962"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
107
n.js
geo.moatads.com/ Frame 3F85
105 B
369 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&i=CBSDFPCW2&hp=1&cm=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1540939934190&de=973407356147&m=0&ar=7554d5b-clean&q=6&cb=0&cu=1540939934190&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25477209%3A2356361194%3A4745166436%3A138239321298&zMoatPS=top&zMoatPT=article&zMoatW=1600&zMoatH=1000&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatSN=f&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=skin&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=skin-5bd8e099312c0&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=1600x1000&zMoatSZPS=1600x1000%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&tz=skin&fs=152610&na=1466921437&cs=0&callback=MoatSuperV26.gna692369
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.130.88.116 Cambridge, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-130-88-116.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
678fd380b7f978e41cbe90b8fa8f463c5e44db228e8e5a7aae06cf5dc33db45e

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:14 GMT
Server
nginx/1.7.9
Etag
"bc442ff114e2a81cd58c205f7e3ee2ae9155841d"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
105
truncated
/ Frame E297
210 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d64f82c9b53b37bef6aa77d35e939e067fc74c96bc78d5a630f2425ca7a64ccc

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
truncated
/ Frame 3DE3
209 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
261603859cac0e676a2208b1b117c220249063b789e8216039e9148bfbbb5d34

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
truncated
/ Frame E6EF
210 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0b2cb31e08683eea5c3cb7cfb26f89ef1c95d64d0ff031fc2c6fb3ba393158fc

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
truncated
/ Frame C1AF
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c1edbbc80d61f94af9ae00bb2923e5c73d1f31f847e3c7722a2deae4fae8535f

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CBSDFPCW2&hp=1&cm=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1540939934190&de=973407356147&m=0&ar=7554d5b-clean&q=7&cb=0&cu=1540939934190&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25477209%3A2356361194%3A4745166436%3A138239321298&zMoatPS=top&zMoatPT=article&zMoatW=1600&zMoatH=1000&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatSN=f&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=skin&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=skin-5bd8e099312c0&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=1600x1000&zMoatSZPS=1600x1000%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&tz=skin&fs=152610&na=688849706&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.38.18.151 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-38-18-151.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:14 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:14 GMT
n.js
geo.moatads.com/ Frame E297
107 B
371 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&i=CBSDFPCW2&hp=1&cm=16&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1540939934301&de=69228196138&m=0&ar=7554d5b-clean&q=10&cb=0&cu=1540939934301&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25299489%3A251370729%3A253246569%3A75374362809&zMoatPS=top&zMoatPT=article&zMoatW=728&zMoatH=90&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatSN=f&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=leader-plus-top&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=leader-plus-top-5bd8e099312c0&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=728x90&zMoatSZPS=728x90%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&tz=leader-plus-top&fs=152610&na=360743164&cs=0&callback=MoatSuperV26.gna138390
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.130.88.116 Cambridge, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-130-88-116.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
c56ce4f47224f4a6f86cd8102f446357b5038738ae9d156773f6d39efd908ecd

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:14 GMT
Server
nginx/1.7.9
Etag
"6c56029af83e4535c242d5532b6e4c637161f280"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
107
/
www.facebook.com/tr/ Frame 1E8C
0
0
Document
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash

Request headers

:method
POST
:authority
www.facebook.com
:scheme
https
:path
/tr/
content-length
4576
pragma
no-cache
cache-control
no-cache
origin
https://www.zdnet.com
upgrade-insecure-requests
1
content-type
application/x-www-form-urlencoded
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
cookie
fr=024iKnU53NS1YwlvJ..Bb2OCc...1.0.Bb2OCc.
Origin
https://www.zdnet.com
Upgrade-Insecure-Requests
1
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
content-type
text/plain
content-length
0
server
proxygen-bolt
date
Tue, 30 Oct 2018 22:52:14 GMT
n.js
geo.moatads.com/ Frame 3DE3
106 B
370 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&i=CBSDFPCW2&hp=1&cm=44&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1540939934537&de=906827746672&m=0&ar=7554d5b-clean&q=14&cb=0&cu=1540939934537&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25299489%3A251370729%3A253246569%3A75375443409&zMoatPS=top&zMoatPT=article&zMoatW=300&zMoatH=250&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatSN=f&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=mpu-plus-top&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=mpu-plus-top-5bd8e099312c0&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=300x250&zMoatSZPS=300x250%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&tz=mpu-plus-top&fs=152610&na=896607478&cs=0&callback=MoatSuperV26.gna137259
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.130.88.116 Cambridge, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-130-88-116.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
110c6ce599b9f03196d683eba46e5a17770c9859893efc2d97a2b05e1d6c6998

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:14 GMT
Server
nginx/1.7.9
Etag
"f95575a8bc61a2aa30ae799a5e8d150b7ffa2b7e"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
106
n.js
geo.moatads.com/ Frame E6EF
107 B
371 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&i=CBSDFPCW2&hp=1&cm=47&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1540939934822&de=590553916494&m=0&ar=7554d5b-clean&q=18&cb=0&cu=1540939934822&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25299489%3A251370729%3A241984809%3A75375443409&zMoatPS=middle&zMoatPT=article&zMoatW=300&zMoatH=250&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatSN=f&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=mpu-middle&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=mpu-middle-5bd8e099312c0&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=middle&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=300x250&zMoatSZPS=300x250%20%7C%20middle&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&tz=mpu-middle&fs=152610&na=1274899947&cs=0&callback=MoatSuperV26.gna146031
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.130.88.116 Cambridge, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-130-88-116.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
6bd6c1f48bbf2f3f10bdcf7f938a263f9b5aac6bf47357bb1d4e0d6baa216839

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:14 GMT
Server
nginx/1.7.9
Etag
"3bd61647aea094507e760460ceea7031b2fe291a"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
107
n.js
geo.moatads.com/ Frame C1AF
105 B
369 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&i=CBSDFPCW2&hp=1&cm=48&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1540939935037&de=964709489565&m=0&ar=7554d5b-clean&q=22&cb=0&cu=1540939935037&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25299489%3A251370729%3A241984809%3A75374362809&zMoatPS=bottom&zMoatPT=article&zMoatW=728&zMoatH=90&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatSN=f&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=leader-plus-bottom&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=leader-plus-bottom-5bd8e099312c0&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=bottom&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=728x90&zMoatSZPS=728x90%20%7C%20bottom&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&tz=leader-plus-bottom&fs=152610&na=783694048&cs=0&callback=MoatSuperV26.gna785217
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.130.88.116 Cambridge, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-130-88-116.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
c45325cec13fd257eb7af08698d810061c425c91ca137b3fb1c9b350170fde0d

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:15 GMT
Server
nginx/1.7.9
Etag
"5a8c2c79eb09f5bf00c802cb9715cedeee1ab146"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
105
n.js
geo.moatads.com/ Frame 523E
106 B
370 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&i=CBSDFPCW2&hp=1&cm=10&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1540939935249&de=725026763227&m=0&ar=7554d5b-clean&q=26&cb=0&cu=1540939935249&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25477209%3A2356361194%3A4825966980%3A138247024569&zMoatPS=top&zMoatPT=article&zMoatW=371&zMoatH=771&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatSN=f&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=dynamic-showcase-top&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=dynamic-showcase-top-5bd8e099312c0&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=371x771&zMoatSZPS=371x771%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&tz=dynamic-showcase-top&fs=152610&na=946909722&cs=0&callback=MoatSuperV26.gna670011
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.130.88.116 Cambridge, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-130-88-116.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
769f5af15dd678e43d180cba425f2b943f20aeaf2c66de356583e64d9d987216

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:15 GMT
Server
nginx/1.7.9
Etag
"825dc6953a4f9357020aab327bee9e8ae46aa015"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
106
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=23&fi=0&apd=46&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75374362809&S1id=23605329&S2id=23619609&ord=1540939934301&r=69228196138&t=meas&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=1&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:15 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:15 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=46&tet=1137&fi=0&apd=1160&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75374362809&S1id=23605329&S2id=23619609&ord=1540939934301&r=69228196138&t=iv&os=1&fi2=0&div1=1&ait=557&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=2&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:15 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:15 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=46&tet=1137&fi=0&apd=1160&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75374362809&S1id=23605329&S2id=23619609&ord=1540939934301&r=69228196138&t=hdn&os=1&fi2=0&div1=1&ait=557&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=3&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:15 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:15 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=46&tet=1137&fi=0&apd=1160&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75374362809&S1id=23605329&S2id=23619609&ord=1540939934301&r=69228196138&t=nht&os=1&fi2=0&div1=1&ait=557&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=4&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:15 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:15 GMT
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=32&fi=1&apd=63&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25477209&L2id=2356361194&L3id=4745166436&L4id=138239321298&S1id=23605329&S2id=23619609&ord=1540939934190&r=973407356147&t=meas&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=1&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:15 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:15 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=32&fi=1&apd=63&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25477209&L2id=2356361194&L3id=4745166436&L4id=138239321298&S1id=23605329&S2id=23619609&ord=1540939934190&r=973407356147&t=fv&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=2&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:15 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:15 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=63&tet=1194&fi=1&apd=1225&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25477209&L2id=2356361194&L3id=4745166436&L4id=138239321298&S1id=23605329&S2id=23619609&ord=1540939934190&r=973407356147&t=iv&os=1&fi2=0&div1=1&ait=581&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=3&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:15 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:15 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=63&tet=1194&fi=1&apd=1225&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25477209&L2id=2356361194&L3id=4745166436&L4id=138239321298&S1id=23605329&S2id=23619609&ord=1540939934190&r=973407356147&t=hdn&os=1&fi2=0&div1=1&ait=581&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=4&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:15 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:15 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&kq=1&lo=0&qs=1&ak=https%3A%2F%2Fwww.zdnet.com%2F%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2FBODY&i=CBSDFPCW2&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&bq=0&wp=3&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=1200&w=1600&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&cm=13&f=0&j=&o=3&t=1540939934190&de=973407356147&cu=1540939934190&m=102&ar=7554d5b-clean&cb=0&ll=2&lm=0&ln=1&r=0&dl=0&dm=1000&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5909&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&as=0&ag=32&an=0&gf=32&gg=0&ix=32&ic=32&ez=1&aj=1&pg=100&pf=0&cc=0&bw=32&bx=0&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=63&cd=0&ah=63&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=25477209%3A2356361194%3A4745166436%3A138239321298&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=1600x1000&zMoatPS=top&zMoatSZPS=1600x1000%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&zMoatW=1600&zMoatH=1000&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatSN=f&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=skin&zMoatDfpSlotId=skin-5bd8e099312c0&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=1%3A1&tz=skin&fs=152610&na=281186491&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.38.18.151 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-38-18-151.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:15 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:15 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=53&fi=1&apd=105&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1540939934537&r=906827746672&t=meas&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=1&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:15 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:15 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=53&fi=1&apd=105&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1540939934537&r=906827746672&t=fv&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=2&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:15 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:15 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=901&fi=1&apd=953&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1540939934537&r=906827746672&t=hdn&os=1&fi2=0&div1=0&ait=424&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=3&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:15 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:15 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame E297
42 B
112 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsskL7JqkYe4ahnNzUOV-FskX0-o6JYDrMu4NcC9GQZWGaz4tlDsQxZWr2vtvmO6QeW1th5yKTgJOQMB2KubJuT2NU5RDJ_nLlpHl5M&sig=Cg0ArKJSzG21n4KGTY10EAE&adk=3051035465&tt=2114&bs=1585%2C1200&mtos=1066,1066,1066,1066,1066&tos=1066,0,0,0,0&p=393,429,483,1157&mcvt=1066&rs=3&ht=0&tfs=1107&tls=2173&mc=1&lte=1&bas=0&bac=0&avms=geo&rst=1540939933030&rpt=1435&ps=1585%2C5909&ss=1600%2C1200&pt=65&deb=1-8-8-32-9-60-33-0&tvt=2133&r=v&id=osdim&uc=3&tgt=DIV&cl=1&cec=14&clc=1&cac=0&cd=728x94&v=r20181024
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 30 Oct 2018 22:52:15 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 3DE3
42 B
112 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsumUAaKipYLpfV5bd02JoYNb44zukzkC2A60VOJgXt_-qxVLFVM5AdkHLXHqMDxMN8_c-WPmmnl2ZLNgHNKNbyMpLsT85BxHIBjrqU&sig=Cg0ArKJSzJfOCFY0ZPHDEAE&adk=198125302&tt=2114&bs=1585%2C1200&mtos=1013,1013,1013,1013,1013&tos=1013,0,0,0,0&p=513,1043,763,1343&mcvt=1013&rs=3&ht=0&tfs=1160&tls=2173&mc=1&lte=1&bas=0&bac=0&avms=geo&rst=1540939933041&rpt=1477&ps=1585%2C5909&ss=1600%2C1200&pt=65&deb=1-8-8-32-9-60-33-0&tvt=2133&r=v&id=osdim&uc=2&tgt=DIV&cl=1&cec=14&clc=1&cac=0&cd=300x254&v=r20181024
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 30 Oct 2018 22:52:15 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=91&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=241984809&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1540939934822&r=590553916494&t=meas&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=1&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:15 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:15 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=804&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=241984809&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1540939934822&r=590553916494&t=hdn&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=2&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:15 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:15 GMT
truncated
/
2 KB
0
Media
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7e9696aabfbb60803028b14636581f459404cea187d0c0c50b7d4d5cf8e1a3b1

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
video/mp4
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=63&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=241984809&L4id=75374362809&S1id=23605329&S2id=23619609&ord=1540939935037&r=964709489565&t=meas&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=1&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:15 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:15 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=601&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=241984809&L4id=75374362809&S1id=23605329&S2id=23619609&ord=1540939935037&r=964709489565&t=hdn&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=2&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:15 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:15 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=63&tet=1479&fi=1&apd=1510&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25477209&L2id=2356361194&L3id=4745166436&L4id=138239321298&S1id=23605329&S2id=23619609&ord=1540939934190&r=973407356147&t=nht&os=1&fi2=0&div1=1&ait=866&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=5&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:15 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:15 GMT
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20181024/r20180604/ Frame 35DF
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/html/r20181024/r20180604/zrt_lookup.html
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:815::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/html/r20181024/r20180604/zrt_lookup.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
cookie
IDE=AHWqTUkpuXgOZvu7040icthGsLlgMIAmlJEznAUEv_myUlyBmFseP62yKPzWOGAO
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
vary
Accept-Encoding
date
Thu, 25 Oct 2018 05:45:53 GMT
expires
Thu, 08 Nov 2018 05:45:53 GMT
content-type
text/html; charset=UTF-8
etag
12810928231326100212
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
6940
x-xss-protection
1; mode=block
cache-control
public, max-age=1209600
age
493582
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
ads
googleads.g.doubleclick.net/pagead/ Frame E3F5
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=90&slotname=3084619100&adk=3828543735&adf=4077151326&w=728&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1540939933586&bpp=98&bdt=879&fdt=2172&idt=2161&shv=r20181024&cbv=r20180604&saldr=sa&correlator=741797030273&frm=23&ife=5&pv=2&ga_vid=907141319.1540939936&ga_sid=1540939936&ga_hid=907981603&ga_fc=0&iag=3&icsg=693856&nhd=1&dssz=21&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=429&ady=393&biw=1585&bih=1200&isw=728&ish=90&ifk=2834320770&scr_x=0&scr_y=0&eid=21060853%2C21070025&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C728%2C90&vis=1&rsz=%7C%7CoeE%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=4066913089&ifi=1&fsb=1&dtd=2211
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:815::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-1991679624331369&output=html&h=90&slotname=3084619100&adk=3828543735&adf=4077151326&w=728&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1540939933586&bpp=98&bdt=879&fdt=2172&idt=2161&shv=r20181024&cbv=r20180604&saldr=sa&correlator=741797030273&frm=23&ife=5&pv=2&ga_vid=907141319.1540939936&ga_sid=1540939936&ga_hid=907981603&ga_fc=0&iag=3&icsg=693856&nhd=1&dssz=21&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=429&ady=393&biw=1585&bih=1200&isw=728&ish=90&ifk=2834320770&scr_x=0&scr_y=0&eid=21060853%2C21070025&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C728%2C90&vis=1&rsz=%7C%7CoeE%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=4066913089&ifi=1&fsb=1&dtd=2211
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
cookie
IDE=AHWqTUkpuXgOZvu7040icthGsLlgMIAmlJEznAUEv_myUlyBmFseP62yKPzWOGAO
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
gzip
date
Tue, 30 Oct 2018 22:52:16 GMT
server
cafe
cache-control
private
content-length
19036
x-xss-protection
1; mode=block
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
osd.js
pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/ Frame E297
73 KB
27 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/osd.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
cce5c991fc672328e8eb7e5f9026496acd4fa608d26d0df95c54b7f16a8e5cc4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 25 Oct 2018 04:46:48 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
497127
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27406
x-xss-protection
1; mode=block
server
cafe
etag
6345757217691752979
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Thu, 08 Nov 2018 04:46:48 GMT
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20181024/r20180604/ Frame DDD6
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/html/r20181024/r20180604/zrt_lookup.html
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:815::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/html/r20181024/r20180604/zrt_lookup.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
cookie
IDE=AHWqTUkpuXgOZvu7040icthGsLlgMIAmlJEznAUEv_myUlyBmFseP62yKPzWOGAO
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
vary
Accept-Encoding
date
Thu, 25 Oct 2018 05:45:53 GMT
expires
Thu, 08 Nov 2018 05:45:53 GMT
content-type
text/html; charset=UTF-8
etag
12810928231326100212
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
6940
x-xss-protection
1; mode=block
cache-control
public, max-age=1209600
age
493582
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
ads
googleads.g.doubleclick.net/pagead/ Frame 948E
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=250&slotname=8385808081&adk=1919950094&adf=4077151327&w=300&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1540939933707&bpp=65&bdt=999&fdt=2225&idt=2214&shv=r20181024&cbv=r20180604&saldr=sa&correlator=741797030273&frm=23&ife=5&pv=1&ga_vid=1148122416.1540939936&ga_sid=1540939936&ga_hid=330462937&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1043&ady=513&biw=1585&bih=1200&isw=300&ish=250&ifk=2180882631&scr_x=0&scr_y=0&eid=21060853%2C21070025&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CoeE%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=3832671437&ifi=1&fsb=1&dtd=2286
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:815::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-1991679624331369&output=html&h=250&slotname=8385808081&adk=1919950094&adf=4077151327&w=300&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1540939933707&bpp=65&bdt=999&fdt=2225&idt=2214&shv=r20181024&cbv=r20180604&saldr=sa&correlator=741797030273&frm=23&ife=5&pv=1&ga_vid=1148122416.1540939936&ga_sid=1540939936&ga_hid=330462937&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1043&ady=513&biw=1585&bih=1200&isw=300&ish=250&ifk=2180882631&scr_x=0&scr_y=0&eid=21060853%2C21070025&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CoeE%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=3832671437&ifi=1&fsb=1&dtd=2286
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
cookie
IDE=AHWqTUkpuXgOZvu7040icthGsLlgMIAmlJEznAUEv_myUlyBmFseP62yKPzWOGAO
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
gzip
date
Tue, 30 Oct 2018 22:52:16 GMT
server
cafe
cache-control
private
content-length
82
x-xss-protection
1; mode=block
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
osd.js
pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/ Frame 3DE3
73 KB
27 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/osd.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
cce5c991fc672328e8eb7e5f9026496acd4fa608d26d0df95c54b7f16a8e5cc4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 25 Oct 2018 04:46:48 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
497128
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27406
x-xss-protection
1; mode=block
server
cafe
etag
6345757217691752979
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Thu, 08 Nov 2018 04:46:48 GMT
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20181024/r20180604/ Frame E216
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/html/r20181024/r20180604/zrt_lookup.html
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:815::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/html/r20181024/r20180604/zrt_lookup.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
cookie
IDE=AHWqTUkpuXgOZvu7040icthGsLlgMIAmlJEznAUEv_myUlyBmFseP62yKPzWOGAO
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
vary
Accept-Encoding
date
Thu, 25 Oct 2018 05:45:53 GMT
expires
Thu, 08 Nov 2018 05:45:53 GMT
content-type
text/html; charset=UTF-8
etag
12810928231326100212
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
6940
x-xss-protection
1; mode=block
cache-control
public, max-age=1209600
age
493583
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
ads
googleads.g.doubleclick.net/pagead/ Frame A808
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=250&slotname=8385808081&adk=1919950094&adf=4077151324&w=300&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1540939933805&bpp=26&bdt=1096&fdt=2248&idt=2233&shv=r20181024&cbv=r20180604&saldr=sa&correlator=741797030273&frm=23&ife=5&pv=1&ga_vid=1601660820.1540939936&ga_sid=1540939936&ga_hid=1493547831&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1043&ady=1501&biw=1585&bih=1200&isw=300&ish=250&ifk=1789179933&scr_x=0&scr_y=0&eid=21060853%2C21070025&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=3832671437&ifi=1&fsb=1&dtd=2318
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:815::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-1991679624331369&output=html&h=250&slotname=8385808081&adk=1919950094&adf=4077151324&w=300&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1540939933805&bpp=26&bdt=1096&fdt=2248&idt=2233&shv=r20181024&cbv=r20180604&saldr=sa&correlator=741797030273&frm=23&ife=5&pv=1&ga_vid=1601660820.1540939936&ga_sid=1540939936&ga_hid=1493547831&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1043&ady=1501&biw=1585&bih=1200&isw=300&ish=250&ifk=1789179933&scr_x=0&scr_y=0&eid=21060853%2C21070025&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=3832671437&ifi=1&fsb=1&dtd=2318
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
gzip
date
Tue, 30 Oct 2018 22:52:16 GMT
server
cafe
cache-control
private
content-length
18294
x-xss-protection
1; mode=block
set-cookie
test_cookie=CheckForPermission; expires=Tue, 30-Oct-2018 23:07:16 GMT; path=/; domain=.doubleclick.net
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
expires
Tue, 30 Oct 2018 22:52:16 GMT
osd.js
pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/ Frame E6EF
73 KB
27 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/osd.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
cce5c991fc672328e8eb7e5f9026496acd4fa608d26d0df95c54b7f16a8e5cc4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 25 Oct 2018 04:46:48 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
497128
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27406
x-xss-protection
1; mode=block
server
cafe
etag
6345757217691752979
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Thu, 08 Nov 2018 04:46:48 GMT
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20181024/r20180604/ Frame 84D4
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/html/r20181024/r20180604/zrt_lookup.html
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:815::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/html/r20181024/r20180604/zrt_lookup.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
vary
Accept-Encoding
date
Thu, 25 Oct 2018 05:45:53 GMT
expires
Thu, 08 Nov 2018 05:45:53 GMT
content-type
text/html; charset=UTF-8
etag
12810928231326100212
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
6940
x-xss-protection
1; mode=block
cache-control
public, max-age=1209600
age
493583
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
ads
googleads.g.doubleclick.net/pagead/ Frame 4316
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=90&slotname=3084619100&adk=3828543735&adf=4077151314&w=728&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1540939933842&bpp=33&bdt=1131&fdt=2299&idt=2295&shv=r20181024&cbv=r20180604&saldr=sa&correlator=741797030273&frm=23&ife=5&pv=1&ga_vid=1542925972.1540939936&ga_sid=1540939936&ga_hid=2016365171&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=429&ady=5494&biw=1585&bih=1200&isw=728&ish=90&ifk=1649710351&scr_x=0&scr_y=0&eid=10573696%2C20195144%2C21060853%2C21070025&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C728%2C90&vis=1&rsz=%7C%7CopeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=4066913089&ifi=1&fsb=1&dtd=2357
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:815::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-1991679624331369&output=html&h=90&slotname=3084619100&adk=3828543735&adf=4077151314&w=728&guci=1.2.0.0.2.2.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1540939933842&bpp=33&bdt=1131&fdt=2299&idt=2295&shv=r20181024&cbv=r20180604&saldr=sa&correlator=741797030273&frm=23&ife=5&pv=1&ga_vid=1542925972.1540939936&ga_sid=1540939936&ga_hid=2016365171&ga_fc=0&iag=3&icsg=173472&nhd=1&dssz=19&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=429&ady=5494&biw=1585&bih=1200&isw=728&ish=90&ifk=1649710351&scr_x=0&scr_y=0&eid=10573696%2C20195144%2C21060853%2C21070025&oid=3&rx=0&eae=2&fc=528&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C728%2C90&vis=1&rsz=%7C%7CopeEbr%7C&abl=CS&ppjl=u&pfx=0&fu=20&bc=7&osw_key=4066913089&ifi=1&fsb=1&dtd=2357
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
gzip
date
Tue, 30 Oct 2018 22:52:16 GMT
server
cafe
cache-control
private
content-length
82
x-xss-protection
1; mode=block
set-cookie
test_cookie=CheckForPermission; expires=Tue, 30-Oct-2018 23:07:16 GMT; path=/; domain=.doubleclick.net
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
expires
Tue, 30 Oct 2018 22:52:16 GMT
osd.js
pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/ Frame C1AF
73 KB
27 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/osd.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20181024/r20180604/show_ads_impl.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
cce5c991fc672328e8eb7e5f9026496acd4fa608d26d0df95c54b7f16a8e5cc4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 25 Oct 2018 04:46:48 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
497128
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27406
x-xss-protection
1; mode=block
server
cafe
etag
6345757217691752979
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Thu, 08 Nov 2018 04:46:48 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=953&tet=1680&fi=1&apd=1732&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1540939934537&r=906827746672&t=iv&os=1&fi2=0&div1=1&ait=1203&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=4&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:16 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:16 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=953&tet=1680&fi=1&apd=1732&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1540939934537&r=906827746672&t=nht&os=1&fi2=0&div1=1&ait=1203&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=5&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:16 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:16 GMT
ads
securepubads.g.doubleclick.net/gampad/ Frame 523E
27 KB
7 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=1122867755017624&correlator=3231566048338190&output=json_html&callback=googletag.impl.pubads.callbackProxy1&impl=fifs&adsid=NT&json_a=1&eid=21061863%2C21062715&vrg=270&guci=1.2.0.0.2.2.0&plat=1%3A32776%2C2%3A32776&sc=1&sfv=1-0-30&iu_parts=8264%2Cuk-zdnet%2Csecurity&enc_prev_ius=%2F0%2F1%2F2%2C%2F0%2F1%2F2&prev_iu_szs=372x142%2C372x142&prev_scp=env%3Dprod%26session%3Df%26subses%3D1%26ptype%3Darticle%26vguid%3D49657216-7986-4ed9-95d0-a60d7f09e775%7Cenv%3Dprod%26session%3Df%26subses%3D1%26ptype%3Darticle%26vguid%3D49657216-7986-4ed9-95d0-a60d7f09e775&cookie_enabled=1&cdm=www.zdnet.com&bc=7&lmt=1540939936&dt=1540939936349&dlt=1540939932711&idt=3598&frm=23&biw=1585&bih=1200&isw=371&ish=771&oid=3&adxs=0%2C0&adys=0%2C0&adks=3261246841%2C3261246840&ucis=a1alp5s5au8i%7Cq1j1ocl228ji&gut=v2&ifi=1&ifk=821850233&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&nhd=1&iag=3&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&top=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&dssz=16&icsg=43552&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x0%7C0x0&msz=0x0%7C0x0&ga_vid=1539395076.1540939936&ga_sid=1540939936&ga_hid=1104333764&fws=384%2C384
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_270.js?21062715
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
f5c73ee2715971ba4663672c0233757ed4add12f12ef8d74ce9c62d7da46f11c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com

Response headers

date
Tue, 30 Oct 2018 22:52:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
7213
x-xss-protection
1; mode=block
google-lineitem-id
4746066197,4746066197
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138239375180,138239375540
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_270.js
securepubads.g.doubleclick.net/gpt/ Frame 523E
54 KB
20 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_270.js?21062715
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_270.js?21062715
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
sffe /
Resource Hash
f7739b424d4acd048d584bf1bfa99a1ea5481989d1abb8948e9bf571729f2c72
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 24 Oct 2018 15:56:38 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
20717
x-xss-protection
1; mode=block
expires
Tue, 30 Oct 2018 22:52:16 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-30/html/ Frame 523E
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-30/html/container.html?n=1
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_270.js?21062715
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Purpose
prefetch
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

expires
Sat, 12 Oct 2019 19:46:34 GMT
cache-control
public, immutable, max-age=31536000
last-modified
Fri, 12 Oct 2018 04:28:13 GMT
content-type
text/html
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=1563&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=241984809&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1540939934822&r=590553916494&t=nht&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=3&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:16 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:16 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=1356&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=241984809&L4id=75374362809&S1id=23605329&S2id=23619609&ord=1540939935037&r=964709489565&t=nht&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&bedc=1&q=3&nu=1&ib=1&dc=1&ob=1&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:16 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:16 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&kq=1&lo=0&qs=1&ak=-&i=CBSDFPCW2&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&bq=0&wp=3&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=1200&w=1600&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&cm=13&f=0&j=&o=3&t=1540939934190&de=973407356147&cu=1540939934190&m=1234&ar=7554d5b-clean&cb=0&ll=2&lm=0&ln=1&r=0&dl=0&dm=1000&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5909&le=1&lh=1181&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1194&an=32&gi=1&gf=1194&gg=32&ix=1194&ic=1194&ez=1&ck=1194&kw=63&aj=1&pg=100&pf=100&cc=1&bw=1194&bx=32&ci=1194&jz=63&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=63&cd=63&ah=63&am=63&rf=0&re=1&ft=581&fv=0&fw=581&wb=1&cl=0&at=0&d=25477209%3A2356361194%3A4745166436%3A138239321298&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=1600x1000&zMoatPS=top&zMoatSZPS=1600x1000%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&zMoatW=1600&zMoatH=1000&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatSN=f&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=skin&zMoatDfpSlotId=skin-5bd8e099312c0&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=1%3A1&tz=skin&fs=152610&na=412569900&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.38.18.151 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-38-18-151.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:16 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:16 GMT
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/ Frame DF90
73 KB
0
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
13112639ea5d320063c21803f0172ec3273678f4d8a6215df67c4774659a233e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

date
Wed, 24 Oct 2018 17:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
538723
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27234
x-xss-protection
1; mode=block
server
cafe
etag
10801174140179827322
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 07 Nov 2018 17:13:30 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame DF90
282 KB
0
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_270.js?21062715
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2b28e861a4e45fd1f546a63afabd2f757f8f9e18ec13a5316812237d02a74ecc

Request headers

Response headers

Date
Tue, 30 Oct 2018 22:52:13 GMT
Content-Encoding
gzip
Last-Modified
Tue, 16 Oct 2018 15:02:25 GMT
Server
AmazonS3
x-amz-request-id
042C6E681D3B8472
ETag
"de2606cae8bdc1e40ebf6e50b8adf558"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=21244
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88514
x-amz-id-2
VH5kWZPBWRhOJV3unQqyHUMBFL5fvqMmS9PvW6ck6djw0i8rwOf4oVexaSy7vp+pQlFv8Gjdncw=
osd.js
pagead2.googlesyndication.com/pagead/ Frame 523E
73 KB
27 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/osd.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_270.js?21062715
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
cce5c991fc672328e8eb7e5f9026496acd4fa608d26d0df95c54b7f16a8e5cc4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:29:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1382
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="44,43,39,35",quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27406
x-xss-protection
1; mode=block
server
cafe
etag
6345757217691752979
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=3600
timing-allow-origin
*
expires
Tue, 30 Oct 2018 23:29:15 GMT
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/ Frame 6A2A
73 KB
0
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20181024/r20110914/activeview/osd_listener.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
13112639ea5d320063c21803f0172ec3273678f4d8a6215df67c4774659a233e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Response headers

date
Wed, 24 Oct 2018 17:13:30 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
538723
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
27234
x-xss-protection
1; mode=block
server
cafe
etag
10801174140179827322
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 07 Nov 2018 17:13:30 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame 6A2A
282 KB
0
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_270.js?21062715
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2b28e861a4e45fd1f546a63afabd2f757f8f9e18ec13a5316812237d02a74ecc

Request headers

Response headers

Date
Tue, 30 Oct 2018 22:52:13 GMT
Content-Encoding
gzip
Last-Modified
Tue, 16 Oct 2018 15:02:25 GMT
Server
AmazonS3
x-amz-request-id
042C6E681D3B8472
ETag
"de2606cae8bdc1e40ebf6e50b8adf558"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=21244
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88514
x-amz-id-2
VH5kWZPBWRhOJV3unQqyHUMBFL5fvqMmS9PvW6ck6djw0i8rwOf4oVexaSy7vp+pQlFv8Gjdncw=
view
securepubads.g.doubleclick.net/pcs/ Frame DF90
0
56 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsv4Rb-UYHCFlrkWHXdRStBON2_DO7TgRBd29MvhIwhWwo2nIR0Gj4SIyHpaxFCutrJOJXH87xLXjIBAXQnZ2FLJsc42CmNSDaSyovqecUb8O43z7q83BCJ_nRVNETEdmXUfNwmgwLDi0KYTyq-r74ub9LxLSqV633g-Wa_42-_RGVF3pqh2qhzoWWQX5IIG1pnH4pVWjhWwGXyQcOOjZ6rY53n4GKTG8OPBX_Bzo77ON0ZeaTsm3b3G06blCm_Zag&sai=AMfl-YSVtyShcGMXmy1nZHsBdby3ApXHsUNsFu6EqgP2uprJjn_gilJskLzmM6TwC1R_5u4sjkMBsA07Da4zIdr0z1j1eyOT-gX9B0E_RSA4TxlBp6h4AtebX4CtgxW3&sig=Cg0ArKJSzOY-u-rqyhoREAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 22:52:17 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
view
securepubads.g.doubleclick.net/pcs/ Frame 6A2A
0
56 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstSv130EXV4uN9AxTJSrSkXnxbqbmlDyvXW3RwVgSDeODOJSZ3VbHyMALr245o_GPeV_i9NzhnPyJhJcO-GrOA9Ng1sgWiuRe7c082J01GkqcwOxC3LhXp-dZfmyzwaJjIz4YDCtBW7408zYRzm15u7ULneGCFdJtHHnlfJEwd2CF5Js0IiKwxRz37NCHV4z6OFUW_GGLK9FU2hjnIKnXqjDgKFofSmzIzh4QYXdZ1Xi2HAOrwmmjdJp2P2JhrB9g&sai=AMfl-YRdKTxxGZxA4rnGDIhITskW3n7x11RJaGkVfaopiYZkAJIi07GcAlTjcRnc06TWAOtb5zWQCdYWhJiriGL4HrYfgM2Nx_Jsjj0AY4Tt1I79Wv1ax4APYg82Wb7N&sig=Cg0ArKJSzPfNNzvlYvdCEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 30 Oct 2018 22:52:17 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
0
x-xss-protection
1; mode=block
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&kq=1&lo=0&qs=1&ak=-&i=CBSDFPCW2&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&bq=0&wp=3&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=1200&w=1600&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&cm=13&f=0&j=&o=3&t=1540939934190&de=973407356147&cu=1540939934190&m=1236&ar=7554d5b-clean&cb=0&ll=2&lm=0&ln=1&r=0&dl=0&dm=1000&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5909&le=1&lh=1181&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1194&an=1194&gi=1&gf=1194&gg=1194&ix=1194&ic=1194&ez=1&ck=1194&kw=63&aj=1&pg=100&pf=100&cc=1&bw=1194&bx=1194&ci=1194&jz=63&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=63&cd=63&ah=63&am=63&rf=0&re=1&ft=581&fv=581&fw=581&wb=1&cl=0&at=0&d=25477209%3A2356361194%3A4745166436%3A138239321298&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=1600x1000&zMoatPS=top&zMoatSZPS=1600x1000%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&zMoatW=1600&zMoatH=1000&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatSN=f&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=skin&zMoatDfpSlotId=skin-5bd8e099312c0&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=1%3A1&tz=skin&fs=152610&na=836685422&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.38.18.151 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-38-18-151.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:17 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:17 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&kq=1&lo=0&qs=1&ak=-&i=CBSDFPCW2&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&bq=0&wp=3&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=1200&w=1600&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&cm=13&f=0&j=&o=3&t=1540939934190&de=973407356147&cu=1540939934190&m=1242&ar=7554d5b-clean&cb=0&ll=2&lm=0&ln=1&r=0&dl=0&dm=1000&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5909&le=1&lh=1181&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1194&an=1194&gi=1&gf=1194&gg=1194&ix=1194&ic=1194&ez=1&ck=1194&kw=63&aj=1&pg=100&pf=100&cc=1&bw=1194&bx=1194&ci=1194&jz=63&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=63&cd=63&ah=63&am=63&rf=0&re=1&ft=581&fv=581&fw=581&wb=1&cl=0&at=0&d=25477209%3A2356361194%3A4745166436%3A138239321298&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=1600x1000&zMoatPS=top&zMoatSZPS=1600x1000%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&zMoatW=1600&zMoatH=1000&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatSN=f&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=skin&zMoatDfpSlotId=skin-5bd8e099312c0&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=1%3A1&tz=skin&fs=152610&na=51227720&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.38.18.151 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-38-18-151.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:17 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:17 GMT
glcfg510.js
cdn-gl.imrworldwide.com/novms/js/2/configs/
2 KB
1 KB
Script
General
Full URL
https://cdn-gl.imrworldwide.com/novms/js/2/configs/glcfg510.js
Requested by
Host: cdn-gl.imrworldwide.com
URL: https://cdn-gl.imrworldwide.com/novms/js/2/ggcmb510.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.93.121 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-93-121.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
acf3b5b3ade1391096f23120b725a032dce430448ba8aff2a6f0c3f9c598b2a3

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 04 Oct 2018 18:49:04 GMT
Content-Encoding
gzip
Last-Modified
Wed, 03 Oct 2018 17:26:15 GMT
Server
AmazonS3
Age
14587
x-amz-server-side-encryption
AES256
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
x-amz-version-id
l2xJuxUC0tglEkdOi9HXoncecbKiMqKp
Via
1.1 e7c35757c4581d46396ae4c0a48815ef.cloudfront.net (CloudFront)
Cache-Control
max-age=86400
Transfer-Encoding
chunked
Connection
keep-alive
Content-Type
application/javascript
X-Amz-Cf-Id
5mRKj3kGUzg-AvyX518tYh-5XbftxOydHwdFuAhyrh257d8d39j3tw==
id
dpm.demdex.net/
2 KB
1 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=2.3.0&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_orgid=10D31225525FF5790A490D4D%40AdobeOrg&d_nsid=0&d_cid_ic=userId%01&d_cid_ic=puuid%01&ts=1540939937599
Requested by
Host: vidtech.cbsinteractive.com
URL: https://vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/adobe/AppMeasurement-2.3.0.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.212.113.202 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-212-113-202.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
c798d4e19a4c22d6aa1eea2cf92bc5d455e7cf6eb876256612522f1b75ef54fa

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v006-0549b38f7.edge-irl1.demdex.com 5.41.0.20181011114220 5ms
Pragma
no-cache
Content-Encoding
gzip
X-Error
300,300
X-TID
2fdt6nCbSIQ=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
703
Expires
Thu, 01 Jan 1970 00:00:00 GMT
bridge3.250.3_en.html
imasdk.googleapis.com/js/core/ Frame D244
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.250.3_en.html
Requested by
Host: s0.2mdn.net
URL: https://s0.2mdn.net/instream/html5/ima3.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:816::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.250.3_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
173878
date
Tue, 30 Oct 2018 03:53:13 GMT
expires
Wed, 30 Oct 2019 03:53:13 GMT
last-modified
Tue, 30 Oct 2018 03:48:48 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
1; mode=block
cache-control
public, max-age=31536000
age
68344
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
client.js
s0.2mdn.net/instream/video/
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: s0.2mdn.net
URL: https://s0.2mdn.net/instream/html5/ima3.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2006 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:17 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
10523
x-xss-protection
1; mode=block
expires
Tue, 30 Oct 2018 22:52:17 GMT
/
www.zdnet.com/m3d0s1/xhr/right-rail/
9 KB
3 KB
XHR
General
Full URL
https://www.zdnet.com/m3d0s1/xhr/right-rail/?promo=2150&count=3&siteId=2&rsid=cnetzdnetglobalsite&sl=en&sc=&pagetype=article&topicname=security&secondarytopicnames=internet+of+things&topicbrcrm=editorial&assetguid=7a12161d-2a5f-4793-b0a4-9fac038733de&assettitle=gigantic+100%2C000-strong+botnet+used+to+hijack+traffic+meant+for+brazilian+banks&assettype=content_article&devicetype=desktop&viewguid=49657216-7986-4ed9-95d0-a60d7f09e775&upId=725930232&template=right-rail
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1531-fly/js/main.default.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/m3d0s1/xhr/right-rail/?promo=2150&count=3&siteId=2&rsid=cnetzdnetglobalsite&sl=en&sc=&pagetype=article&topicname=security&secondarytopicnames=internet+of+things&topicbrcrm=editorial&assetguid=7a12161d-2a5f-4793-b0a4-9fac038733de&assettitle=gigantic+100%2C000-strong+botnet+used+to+hijack+traffic+meant+for+brazilian+banks&assettype=content_article&devicetype=desktop&viewguid=49657216-7986-4ed9-95d0-a60d7f09e775&upId=725930232&template=right-rail
pragma
no-cache
cookie
__gads=ID=e64ba9279cc27d53:T=1540939936:S=ALNI_MbOO_bTk20UZdQjzCS1SCamlaTdQQ; AMCV_10D31225525FF5790A490D4D%40AdobeOrg=T; upid_725930232=1
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
application/json, text/javascript, */*; q=0.01
cache-control
no-cache
:authority
www.zdnet.com
x-requested-with
XMLHttpRequest
:scheme
https
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
:method
GET
Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Accept-Encoding, User-Agent
content-length
1476
x-xss-protection
1; mode=block
pragma
no-cache
referrer-policy
no-referrer-when-downgrade
server
nginx
x-frame-options
SAMEORIGIN
date
Tue, 30 Oct 2018 22:52:17 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-tx-id
72ee8cf4-c7f4-45ac-8504-22c76c724ce8
content-type
application/json
access-control-allow-origin
https://www.zdnet.com
cache-control
max-age=0, no-cache, no-store
set-cookie
fly_device=desktop; expires=Tue, 06-Nov-2018 22:52:17 GMT; path=/; domain=.zdnet.com; secure fly_geo={"countryCode": "de"}; expires=Tue, 06-Nov-2018 22:52:17 GMT; path=/; domain=.zdnet.com; secure fly_preferred_edition=eu; path=/; domain=.zdnet.com; secure fly_default_edition=eu; path=/; domain=.zdnet.com; secure ak_bmsc=D41495E6A6F1E4CCD16C1CF93FABDFC30210BAB798170000A1E0D85B4A16766B~plyp9ECX1JY67EZ2CN5uaWXfRjrjOBL7zTLplGr8ZJkkcsSMNXKBZC60942fWJO/ZaTgd92WtF/ALOWCRzYMzr/cuzOOwNCt/aeJtTX/pFCEUJC+ZGqQ4XNToEYG2xG4SDk1cZcY6wl5KJUXUcO8LU80Fjd1zRnF1TPukVDoBljjFyeccb8m2KHfM7UPNHWRTRink1nt1d8LkeDk3q/fW34zch+EfZZ4a7bhAPRIOA6J0=; expires=Wed, 31 Oct 2018 00:52:17 GMT; max-age=7200; path=/; domain=.zdnet.com; HttpOnly
accept-ranges
bytes
expires
Tue, 30 Oct 2018 22:52:17 GMT
default-se4908240cd.png
zdnet1.cbsistatic.com/fly/images/sprites/video/controls/1x/
8 KB
8 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/fly/images/sprites/video/controls/1x/default-se4908240cd.png
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1531-fly/js/main.default.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash

Request headers

Referer
https://zdnet3.cbsistatic.com/fly/css/video/htmlPlayerControls/controls-ebaf8ad91a-rev.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:17 GMT
content-encoding
gzip
last-modified
Wed, 20 Jun 2018 17:00:35 GMT
server
nginx
etag
W/"5b2a8833-1e14"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
7728
expires
Tue, 06 Nov 2018 22:52:17 GMT
/
www.zdnet.com/video/selector/andromeda-botnet-malware-is-still-an-infection-issue/
3 KB
2 KB
XHR
General
Full URL
https://www.zdnet.com/video/selector/andromeda-botnet-malware-is-still-an-infection-issue/?acp=sz%3D640x483%26iu%3D%2F8264%2Fvaw-zdnet%2Fdesktop%2Fzdnet%26ciu_szs%3D300x60%26impl%3Ds%26gdfp_req%3D1%26env%3Dvp%26output%3Dxml_vmap1%26unviewed_position_start%3D1%26url%3Dhttps%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F%26description_url%3Dhttps%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F%26correlator%3D1540939937716%26cmsid%3D2289%26vid%3DWXE3_slFKFdtChIY_WrGbURUW8jGB7YM%26pp%3Dvpaid_js%26cust_params%3Dvid%253DWXE3_slFKFdtChIY_WrGbURUW8jGB7YM%2526ptype%253Darticle%2526vguid%253D49657216-7986-4ed9-95d0-a60d7f09e775%2526session%253Df%2526subses%253D1%2526microsite%253D%2526campaign%253D%2526cid%253Dgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2526collection%253D%2526mfr%253D%2526carrier%253D%2526section%253Deditorial%2526userGroup%253D%2526tag%253D%2526edition%253D%2526test%253D%2526score%253D%2526feat%253D%2526subcollection%253D%2526topic%253Dsecurity%2526sectopic%253D&m=%2Fvideo%2Fmanifest%2Fandromeda-botnet-malware-is-still-an-infection-issue.m3u8%3Fdevice%3Dott%26change-to-host%3Dtechrepublicmedia.akamaized.net%26secure%3Dtrue&callback=uvpHandleJsonpResult
Requested by
Host: vidtech.cbsinteractive.com
URL: https://vidtech.cbsinteractive.com/uvpjs/2.8.3/CBSI-PLAYER.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/video/selector/andromeda-botnet-malware-is-still-an-infection-issue/?acp=sz%3D640x483%26iu%3D%2F8264%2Fvaw-zdnet%2Fdesktop%2Fzdnet%26ciu_szs%3D300x60%26impl%3Ds%26gdfp_req%3D1%26env%3Dvp%26output%3Dxml_vmap1%26unviewed_position_start%3D1%26url%3Dhttps%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F%26description_url%3Dhttps%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F%26correlator%3D1540939937716%26cmsid%3D2289%26vid%3DWXE3_slFKFdtChIY_WrGbURUW8jGB7YM%26pp%3Dvpaid_js%26cust_params%3Dvid%253DWXE3_slFKFdtChIY_WrGbURUW8jGB7YM%2526ptype%253Darticle%2526vguid%253D49657216-7986-4ed9-95d0-a60d7f09e775%2526session%253Df%2526subses%253D1%2526microsite%253D%2526campaign%253D%2526cid%253Dgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2526collection%253D%2526mfr%253D%2526carrier%253D%2526section%253Deditorial%2526userGroup%253D%2526tag%253D%2526edition%253D%2526test%253D%2526score%253D%2526feat%253D%2526subcollection%253D%2526topic%253Dsecurity%2526sectopic%253D&m=%2Fvideo%2Fmanifest%2Fandromeda-botnet-malware-is-still-an-infection-issue.m3u8%3Fdevice%3Dott%26change-to-host%3Dtechrepublicmedia.akamaized.net%26secure%3Dtrue&callback=uvpHandleJsonpResult
pragma
no-cache
cookie
__gads=ID=e64ba9279cc27d53:T=1540939936:S=ALNI_MbOO_bTk20UZdQjzCS1SCamlaTdQQ; AMCV_10D31225525FF5790A490D4D%40AdobeOrg=T; upid_725930232=1; zdnetSettingsPermanent=%7B%22autoplayEnabled%22%3A%22on%22%7D
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.zdnet.com
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
:scheme
https
:method
GET
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Accept-Encoding, User-Agent
content-length
1014
x-xss-protection
1; mode=block
pragma
no-cache
referrer-policy
no-referrer-when-downgrade
server
nginx
x-frame-options
SAMEORIGIN
date
Tue, 30 Oct 2018 22:52:18 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-tx-id
e9073815-657b-42d0-a61b-d19b3a4d426b
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
cache-control
max-age=0, no-cache, no-store
set-cookie
fly_device=desktop; expires=Tue, 06-Nov-2018 22:52:18 GMT; path=/; domain=.zdnet.com; secure fly_geo={"countryCode": "de"}; expires=Tue, 06-Nov-2018 22:52:18 GMT; path=/; domain=.zdnet.com; secure fly_preferred_edition=eu; path=/; domain=.zdnet.com; secure fly_default_edition=eu; path=/; domain=.zdnet.com; secure ak_bmsc=EAE55285F317EDFEE8C3C12578962DBA0210BAB798170000A2E0D85B9E271D4F~pltLXQt5Rd3rGNQ6A63yCjEVz/4uMKL0wbuicWEqjz3Ch/tK3cuWJprbw11BYlezvcjauuOeDjk48PMNCD3FGhJy85GXUrJdTLuCE9koU+QB9o8gLU5TbIRxvrocLB6xujmNdEvsNtP8CX69nJgof3vVq+QWqPCAloKsL1DKSRk7y3tZ6BWtxDQW16AFHr5zVPQiePhVWHI1wwS03I8IsxJm99ymKBTOOL+xZRQfibdSA=; expires=Wed, 31 Oct 2018 00:52:18 GMT; max-age=7200; path=/; domain=.zdnet.com; HttpOnly
accept-ranges
bytes
expires
Tue, 30 Oct 2018 22:52:18 GMT
id
som.cbsi.com/
90 B
717 B
XHR
General
Full URL
https://som.cbsi.com/id?d_visid_ver=2.3.0&d_fieldgroup=A&mcorgid=10D31225525FF5790A490D4D%40AdobeOrg&mid=35773866003961291993665033273942287627&ts=1540939937777
Requested by
Host: vidtech.cbsinteractive.com
URL: https://vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/adobe/AppMeasurement-2.3.0.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.140.43.34 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
cbsi.com.ssl.d2.sc.omtrdc.net
Software
Omniture DC/2.0.0 /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Date
Tue, 30 Oct 2018 22:52:17 GMT
X-Content-Type-Options
nosniff
Server
Omniture DC/2.0.0
xserver
www248
Vary
Origin
X-C
ms-6.5.1
P3P
CP="This is not a P3P policy"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/x-javascript
Keep-Alive
timeout=15
Content-Length
90
X-XSS-Protection
1; mode=block
loader.js
cdn.taboola.com/libtrc/cbsinteractive-zdnet/
300 KB
25 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/cbsinteractive-zdnet/loader.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
ry_GPvw_TlDczLt67fVcCSvAZvgmlfVI
content-encoding
gzip
etag
"3e43997d238842c634d9c8a4726c0c54"
age
18
x-cache
HIT
status
200
x-amz-replication-status
COMPLETED
content-length
25602
x-amz-id-2
1UmPVR4kVcSUiZqRUIPBUrNDbsRho3rK42KsCJu8qtnzqsibvgOqdfkl6iImH4Buc+eR8PCm0R0=
x-served-by
cache-fra19136-FRA
last-modified
Mon, 29 Oct 2018 10:03:37 GMT
server
AmazonS3
x-timer
S1540939938.802209,VS0,VE0
date
Tue, 30 Oct 2018 22:52:17 GMT
vary
Accept-Encoding
x-amz-request-id
9EEBD4352C7158E2
via
1.1 varnish
cache-control
private,max-age=14401
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
x-cache-hits
1
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&kq=1&lo=0&qs=1&ak=-&i=CBSDFPCW2&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&bq=0&wp=3&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=1200&w=1600&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&cm=13&f=0&j=&o=3&t=1540939934190&de=973407356147&cu=1540939934190&m=1243&ar=7554d5b-clean&cb=0&ll=2&lm=0&ln=1&r=0&dl=0&dm=1000&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5909&le=1&lh=1181&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1194&an=1194&gi=1&gf=1194&gg=1194&ix=1194&ic=1194&ez=1&ck=1194&kw=63&aj=1&pg=100&pf=100&cc=1&bw=1194&bx=1194&ci=1194&jz=63&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1225&cd=63&ah=1225&am=63&rf=0&re=1&ft=581&fv=581&fw=581&wb=1&cl=0&at=0&d=25477209%3A2356361194%3A4745166436%3A138239321298&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=1600x1000&zMoatPS=top&zMoatSZPS=1600x1000%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&zMoatW=1600&zMoatH=1000&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatSN=f&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=skin&zMoatDfpSlotId=skin-5bd8e099312c0&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=1%3A1&tz=skin&fs=152610&na=1031447854&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.38.18.151 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-38-18-151.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:17 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:17 GMT
PF7B87067-BF4D-F80F-E040-070AAD316CE6.js
cdn-gl.imrworldwide.com/conf/
42 KB
8 KB
Script
General
Full URL
https://cdn-gl.imrworldwide.com/conf/PF7B87067-BF4D-F80F-E040-070AAD316CE6.js
Requested by
Host: cdn-gl.imrworldwide.com
URL: https://cdn-gl.imrworldwide.com/novms/js/2/configs/glcfg510.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.93.121 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-93-121.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:41:54 GMT
Content-Encoding
gzip
Last-Modified
Tue, 30 Oct 2018 22:25:22 GMT
Server
AmazonS3
Age
624
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
x-amz-version-id
mWvnGWdOP05RU_OmoVFRZY6A1qCctkg4
Via
1.1 e7c35757c4581d46396ae4c0a48815ef.cloudfront.net (CloudFront)
Transfer-Encoding
chunked
Connection
keep-alive
Content-Type
application/javascript
X-Amz-Cf-Id
3iFEAfbseGRunR8MuWWk2bbGVD2K8rfSl3vAG4iwm_-t1q3f0_16Jw==
embed.js
zdnet-1.disqus.com/
64 KB
21 KB
Script
General
Full URL
https://zdnet-1.disqus.com/embed.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1531-fly/js/libs/require-2.1.2.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.120.134 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
openresty /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:17 GMT
Content-Encoding
gzip
Server
openresty
Age
32
Vary
Accept-Encoding
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Cache-Control
private, max-age=60
X-Service
router
Strict-Transport-Security
max-age=300; includeSubdomains
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
Content-Length
21500
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CBSDFPCW2&hp=1&cm=10&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1540939935608&de=201617140774&m=0&ar=7554d5b-clean&q=30&cb=0&cu=1540939935608&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25477209%3A2356361194%3A4745571990%3A138239450914&zMoatPS=bottom&zMoatPT=article&zMoatW=300&zMoatH=250&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatSN=f&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=mpu-bottom&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=mpu-bottom-5bd8e099312c0&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=bottom&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=300x250&zMoatSZPS=300x250%20%7C%20bottom&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&tz=mpu-bottom&fs=152610&na=1703234243&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.38.18.151 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-38-18-151.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:17 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:17 GMT
nlsSDK600_rc.bundle.min.js
cdn-gl.imrworldwide.com/novms/js/2/
149 KB
44 KB
Script
General
Full URL
https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600_rc.bundle.min.js
Requested by
Host: cdn-gl.imrworldwide.com
URL: https://cdn-gl.imrworldwide.com/conf/PF7B87067-BF4D-F80F-E040-070AAD316CE6.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.93.121 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-93-121.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 04 Oct 2018 18:51:07 GMT
Content-Encoding
gzip
Last-Modified
Wed, 03 Oct 2018 17:26:16 GMT
Server
AmazonS3
Age
14436
x-amz-server-side-encryption
AES256
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
x-amz-version-id
oilZlCdjjWz9M340erw0XCDnDJPMJxIl
Via
1.1 e7c35757c4581d46396ae4c0a48815ef.cloudfront.net (CloudFront)
Cache-Control
max-age=86400
Transfer-Encoding
chunked
Connection
keep-alive
Content-Type
application/javascript
X-Amz-Cf-Id
xinE11FCHDILrddmQE2spd54W0UwPKXa6LAkvtDOnQcW6fvWpsGEeg==
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/cbsinteractive-zdnet/loader.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.57.19.23 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-57-19-23.deploy.static.akamaitechnologies.com
Software
/
Resource Hash

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:17 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
902
Expires
Wed, 31 Oct 2018 22:52:17 GMT
load.js
widget.perfectmarket.com/cbsinteractive-zdnet/
13 KB
5 KB
Script
General
Full URL
https://widget.perfectmarket.com/cbsinteractive-zdnet/load.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/cbsinteractive-zdnet/loader.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.181 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
rwr9L97XovW8QPypI62jHvd7E2HiNZm2
content-encoding
gzip
etag
"fc0de48a0976cde02ddee0bd49a81832"
age
151
x-cache
HIT, HIT
status
200
content-length
4742
x-amz-id-2
cd3Maak8Panxg6ZCxlTt64fcV35xuMA/Kt7Xw0CaHb2taQV1eB3DJTK4A4DF0O+54qpzHOT8xt8=
x-served-by
cache-lax8622-LAX, cache-fra19139-FRA
last-modified
Thu, 20 Oct 2016 17:48:07 GMT
server
AmazonS3
x-timer
S1540939938.876410,VS0,VE1
date
Tue, 30 Oct 2018 22:52:17 GMT
vary
Accept-Encoding
x-amz-request-id
3DF236319D937B57
via
1.1 varnish, 1.1 varnish
cache-control
max-age=300
accept-ranges
bytes
content-type
binary/octet-stream
x-cache-hits
1, 1
impl.330-85-RELEASE.js
cdn.taboola.com/libtrc/
458 KB
126 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/impl.330-85-RELEASE.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/cbsinteractive-zdnet/loader.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
5oHnuBiXxG_ob3vazi03gt_UtoWm0W1T
content-encoding
gzip
etag
"32d7755b130b87c08be0de39cc0801c5"
age
94
x-cache
HIT
status
200
x-amz-replication-status
PENDING
content-length
128473
x-amz-id-2
M8y5u5Glxh7xSSDVUl9CMnck34C7X2GJo2FSMnlqNHYcfFidwAuRKzyJZxJ8CtngGkuSWzG2BdE=
x-served-by
cache-fra19136-FRA
last-modified
Tue, 30 Oct 2018 22:50:41 GMT
server
AmazonS3
x-timer
S1540939938.883660,VS0,VE0
date
Tue, 30 Oct 2018 22:52:17 GMT
vary
Accept-Encoding
x-amz-request-id
80300C4A08C0C95C
via
1.1 varnish
cache-control
private,max-age=31536000
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
x-cache-hits
478
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CBSDFPCW2&hp=1&cm=19&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1540939936938&de=33405734008&m=0&ar=7554d5b-clean&q=33&cb=0&cu=1540939936938&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25477209%3A2356361194%3A4746066197%3A138239375180&zMoatPT=article&zMoatW=372&zMoatH=142&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatSN=f&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=dynamic-showcase-top&zMoatAType=content_article&zMoatTest=zdnet&zMoatDfpSlotId=dynamic-showcase-top-5bd8e099312c0&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&bo=23605329&bp=23619609&bd=-&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=372x142&zMoatPS=Not%20Specified&zMoatSZPS=Not%20Specified&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&fd=1&ac=1&it=500&tz=dynamic-showcase-top&fs=152610&na=330835030&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.38.18.151 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-38-18-151.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:17 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:17 GMT
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=7&c2=13739933&c3=20121515121&ns__t=1540939937894&ns_c=UTF-8&cv=3.1e&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Braz...
  • https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1540939937894&ns_c=UTF-8&cv=3.1e&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Bra...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1540939937894&ns_c=UTF-8&cv=3.1e&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c9=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.57.19.23 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-57-19-23.deploy.static.akamaitechnologies.com
Software
/
Resource Hash

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:17 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1540939937894&ns_c=UTF-8&cv=3.1e&c8=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&c9=
Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:17 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
pmk-201618008.1.js
widget.perfectmarket.com/cbsinteractive-zdnet/
323 KB
89 KB
Script
General
Full URL
https://widget.perfectmarket.com/cbsinteractive-zdnet/pmk-201618008.1.js
Requested by
Host: widget.perfectmarket.com
URL: https://widget.perfectmarket.com/cbsinteractive-zdnet/load.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.181 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
bVoOWfmxkMrYwv2s6Uu9D96fE._5IBqu
content-encoding
gzip
etag
"da73fb2066df9f51d08b6688cfb35441"
age
644353
x-cache
HIT, HIT
status
200
content-length
91236
x-amz-id-2
T2A7wWXMDNgx2Z35EWhae8i8jDSVEo/Aqmbmta3HbEBKVMhwoZJKjGQuEf/CaAEiaINfKwR6uJs=
x-served-by
cache-lax8630-LAX, cache-fra19139-FRA
last-modified
Thu, 20 Oct 2016 17:47:53 GMT
server
AmazonS3
x-timer
S1540939938.899189,VS0,VE0
date
Tue, 30 Oct 2018 22:52:17 GMT
vary
Accept-Encoding
x-amz-request-id
58FF20717A687DE4
via
1.1 varnish, 1.1 varnish
cache-control
max-age=31536000
accept-ranges
bytes
content-type
text/javascript
x-cache-hits
386, 2
ls.html
cdn-gl.imrworldwide.com/novms/html/ Frame 4D6A
0
0
Document
General
Full URL
https://cdn-gl.imrworldwide.com/novms/html/ls.html
Requested by
Host: cdn-gl.imrworldwide.com
URL: https://cdn-gl.imrworldwide.com/novms/js/2/nlsSDK600_rc.bundle.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.93.121 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-93-121.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Host
cdn-gl.imrworldwide.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
Date
Thu, 04 Oct 2018 18:49:04 GMT
Last-Modified
Wed, 03 Oct 2018 17:26:14 GMT
x-amz-server-side-encryption
AES256
Cache-Control
max-age=86400
x-amz-version-id
bOFcZJzsYy1.aHYIvu.ftVKtYXxJ9BCk
Server
AmazonS3
Content-Encoding
gzip
Vary
Accept-Encoding
Age
14593
X-Cache
Hit from cloudfront
Via
1.1 e7c35757c4581d46396ae4c0a48815ef.cloudfront.net (CloudFront)
X-Amz-Cf-Id
V3sGpaPbX0I3wfXFe4T5QpneNFfoIDplYNby1lcxF8Mok3Pux3SgOg==
lounge.d49f53e192b9080ef8880a7c9b24f1c3.css
c.disquscdn.com/next/embed/styles/
102 KB
19 KB
Stylesheet
General
Full URL
https://c.disquscdn.com/next/embed/styles/lounge.d49f53e192b9080ef8880a7c9b24f1c3.css
Requested by
Host: zdnet-1.disqus.com
URL: https://zdnet-1.disqus.com/embed.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:4ea6 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:17 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
19425
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Fri, 26 Oct 2018 00:31:19 GMT
server
cloudflare
fastly-debug-digest
eb1006ce43d6cade1496acb1e51569c1d94dd6f363a0a4e497669b5cee0f6289
etag
"5bd26057-4be1"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
cf-ray
472173944c96c2fb-FRA
expires
Sat, 26 Oct 2019 18:02:22 GMT
common.bundle.18932c85febf9520158697cdc31f08ae.js
c.disquscdn.com/next/embed/
242 KB
81 KB
Script
General
Full URL
https://c.disquscdn.com/next/embed/common.bundle.18932c85febf9520158697cdc31f08ae.js
Requested by
Host: zdnet-1.disqus.com
URL: https://zdnet-1.disqus.com/embed.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:4ea6 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:17 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
82684
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Tue, 09 Oct 2018 20:47:01 GMT
server
cloudflare
fastly-debug-digest
b18a35687fb6f9be652456ef708b8bccc57b9a97da44487936422a8a2012c75b
etag
"5bbd13c5-142fc"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
cf-ray
472173944c98c2fb-FRA
expires
Wed, 09 Oct 2019 20:57:55 GMT
lounge.bundle.53ce1bd42cd56ff599219e9d5c200428.js
c.disquscdn.com/next/embed/
369 KB
97 KB
Script
General
Full URL
https://c.disquscdn.com/next/embed/lounge.bundle.53ce1bd42cd56ff599219e9d5c200428.js
Requested by
Host: zdnet-1.disqus.com
URL: https://zdnet-1.disqus.com/embed.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:4ea6 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:17 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
98324
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Mon, 29 Oct 2018 19:14:20 GMT
server
cloudflare
fastly-debug-digest
b527851f0883645f34ef441ac1cc99d4f65b18d2e4ec7566e16c0a9e278f9e82
etag
"5bd75c0c-18014"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
cf-ray
472173944c9ac2fb-FRA
expires
Tue, 29 Oct 2019 21:39:02 GMT
config.js
disqus.com/next/
6 KB
3 KB
Script
General
Full URL
https://disqus.com/next/config.js
Requested by
Host: zdnet-1.disqus.com
URL: https://zdnet-1.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.128.134 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:17 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Age
38
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
2568
X-XSS-Protection
1; mode=block
Server
nginx
X-Frame-Options
SAMEORIGIN
Strict-Transport-Security
max-age=300; includeSubdomains
Content-Type
application/javascript; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
public, stale-while-revalidate=300, s-stalewhilerevalidate=3600, max-age=60
Timing-Allow-Origin
*
id
dpm.demdex.net/
2 KB
1 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=2.3.0&d_fieldgroup=AAM&d_rtbd=json&d_ver=2&d_orgid=10D31225525FF5790A490D4D%40AdobeOrg&d_nsid=0&d_mid=35773866003961291993665033273942287627&d_blob=6G1ynYcLPuiQxYZrsz_pkqfLG9yMXBpb2zX5dvJdYQJzPXImdj0y&d_cid_ic=AVID%012DEC705085311ACF-4000012600000E00&d_cid_ic=userId%01&d_cid_ic=puuid%01&ts=1540939937963
Requested by
Host: vidtech.cbsinteractive.com
URL: https://vidtech.cbsinteractive.com/uvpjs/2.8.3/lib/tracking/adobe/AppMeasurement-2.3.0.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.212.113.202 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-212-113-202.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v006-05a36ce55.edge-irl1.demdex.com 5.41.0.20181011114220 7ms
Pragma
no-cache
Content-Encoding
gzip
X-Error
300,300
X-TID
3o4b3Ll9SA4=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
702
Expires
Thu, 01 Jan 1970 00:00:00 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=3&q=0&x=0&y=0&hp=1&kq=1&lo=0&qs=1&ak=-&i=CBSDFPCW2&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7BA&qp=00000&is=voqBBkBBBBHhBBwBBZkJjBRCqUCY3CTCB6BXwUcu8gKCBS9lYBBBCCBpYFmR4BOZBBgSJTcBBBBBBBBHUoKOFCyz7BB3CZ6mv5TimBBe9oeCt9lXqBvBCfBBBBBBBBBBBBBBCBMBaBeBBkKzQClBeaKaMVMBj5iMPzyHVY9zqxknZlysGxCBcBBBC9CctORpnICyRBBB4OBBBBBBBBBBC9TiFF3dOKBCBBxBBBBBBBfBz1BD7fB3BpkBJUDyDCZ6IDDDCCCCDDCCCCCCCBdh2eBBBGI79kNB8DJoDBBBBCiBBiB&iv=6&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&qr=0&vf=1&vg=100&bq=0&wp=3&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=1200&w=1600&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&cm=13&f=0&j=&o=3&t=1540939934190&de=973407356147&cu=1540939934190&m=3540&ar=7554d5b-clean&cb=0&ll=2&lm=0&ln=1&r=0&dl=0&dm=1000&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=5909&le=1&lf=1432&lg=1&lh=1181&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A20%3A-&as=1&ag=3207&an=1194&gi=1&gf=3207&gg=1194&ix=3207&ic=3207&ez=1&ck=1194&kw=63&aj=1&pg=100&pf=100&cc=1&bw=3207&bx=1194&ci=1194&jz=63&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&cq=0&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=3238&cd=1225&ah=3238&am=1225&rf=0&re=1&ft=2594&fv=581&fw=581&wb=2&ap=3238&cl=0&av=0&at=1&d=25477209%3A2356361194%3A4745166436%3A138239321298&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=1600x1000&zMoatPS=top&zMoatSZPS=1600x1000%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&gw=cbsdfp5832910442&zMoatW=1600&zMoatH=1000&zMoatVGUID=49657216-7986-4ed9-95d0-a60d7f09e775&zMoatSN=f&zMoatCURL=zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&zMoatDev=Desktop&zMoatSlotId=skin&zMoatDfpSlotId=skin-5bd8e099312c0&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=1%3A1&tz=skin&fs=152610&na=1228180788&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.38.18.151 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-38-18-151.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:17 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Tue, 30 Oct 2018 22:52:17 GMT
vglnk.js
cdn.viglink.com/api/
81 KB
28 KB
Script
General
Full URL
https://cdn.viglink.com/api/vglnk.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6810:a10d , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Tue, 30 Oct 2018 22:52:18 GMT
content-encoding
gzip
cf-cache-status
HIT
x-amz-request-id
BC4F97BA1F106EBB
status
200
content-length
28397
x-amz-id-2
J8zmvgfNzG4CAbCbuLht/1b8lYutez8aSXvKTUEfg4it7wLnVKLnn+V6bClwRuRWkmHXuBQrHDM=
last-modified
Wed, 24 Oct 2018 20:32:46 GMT
server
cloudflare
etag
"8132bd22613a0bbbdd73866340c33ab1"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=1800
accept-ranges
bytes
cf-ray
47217394b8bc646f-FRA
expires
Tue, 30 Oct 2018 23:22:18 GMT
0.7013399818603396
saa.cbsi.com/b/ss/cbsib2bleadgen/1/G.4--NS/
43 B
615 B
Image
General
Full URL
https://saa.cbsi.com/b/ss/cbsib2bleadgen/1/G.4--NS/0.7013399818603396?AQB=1&ce=UTF%2D8&events=event66&v0=ftag_cd:LGN22ef1e6&v2=en&v3=desktop&v4=right-rail&v5=zdnet&v10=article&v20=gigantic+100%2C000-strong+botnet+used+to+hijack+traffic+meant+for+brazilian+banks&v22=content_article&v23=&v24=49657216-7986-4ed9-95d0-a60d7f09e775&v30=7a12161d-2a5f-4793-b0a4-9fac038733de&v60=33164268,33164521,33163688&v64=2150&v69=&c0=D%3Dv0&c2=D%3Dv2&c3=D%3Dv3&c4=D%3Dv4&c5=D%3Dv5&c10=D%3Dv10&c20=D%3Dv20&c22=D%3Dv22&c23=D%3Dv23&c24=D%3Dv24&c30=D%3Dv30&c60=D%3Dv60&c64=D%3Dv64&c69=D%3Dv69&pe=lnk_o&pev2=medusa_impression&vid=201810302-leadgen-zdnet&mid=90240133173074011141898988208131324462&aid=2D535D450507F28B-40000106A0001145&AQE=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.140.43.37 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
cbsi.com.ssl.sc.omtrdc.net
Software
Omniture DC/2.0.0 /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 30 Oct 2018 22:52:18 GMT
X-Content-Type-Options
nosniff
X-C
ms-6.5.1
P3P
CP="This is not a P3P policy"
Connection
Keep-Alive
Content-Length
43
X-XSS-Protection
1; mode=block
Pragma
no-cache
Last-Modified
Wed, 31 Oct 2018 22:52:18 GMT
Server
Omniture DC/2.0.0
xserver
www93
ETag
"3309143319492231168-6274922805251278379"
Vary
*
Content-Type
image/gif
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Keep-Alive
timeout=15
Expires
Mon, 29 Oct 2018 22:52:18 GMT
e.gif
dw.cbsi.com/levt/ria/
43 B
369 B
Image
General
Full URL
https://dw.cbsi.com/levt/ria/e.gif?rsid=cnetzdnetglobalsite&sid=2&siteid=2&pagetype=article&assetguid=7a12161d-2a5f-4793-b0a4-9fac038733de&assettitle=gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20brazilian%20banks&assettype=content_article&pubdate=2018-10-01%2004%3A20%3A22&viewguid=49657216-7986-4ed9-95d0-a60d7f09e775&devicetype=desktop&sitetype=responsive%20web&author=catalin%20cimpanu&authorid=85fd8691-f525-4ea2-a601-af296f629f7f&topicguid=113c25b6-ec91-11e3-95d2-02911863765e&topic=security&topicbrcrm=security&s8=cnetzdnetglobalsite&v23=cnetzdnetglobalsite&v19=article&v17=113c25b6-ec91-11e3-95d2-02911863765e&v20=7a12161d-2a5f-4793-b0a4-9fac038733de&v16=49657216-7986-4ed9-95d0-a60d7f09e775&riaevent=impression&comptyp=spot&mapp=medusa_app&objtyp=medusa&eventt=log&v18=security&comp=ucwc&ts=1540939938038&tcset=utf8&im=dsjs&title=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&srcurl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.30.224.172 Fort Lauderdale, United States, ASN6623 (CBSI-1 - CBS Interactive Inc., US),
Reverse DNS
phx1-dw-cbsi-xw-lb.cnet.com
Software
Apache/2.4.25 /
Resource Hash

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:18 GMT
Server
Apache/2.4.25
Vary
*
Content-Type
image/gif
Cache-Control
no-cache, must-revalidate, no-transform
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=80, max=981
Content-Length
43
Expires
Fri, 23 Jan 1970 12:12:12 GMT
domains
api.viglink.com/api/
42 B
721 B
XHR
General
Full URL
https://api.viglink.com/api/domains
Requested by
Host: cdn.viglink.com
URL: https://cdn.viglink.com/api/vglnk.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.175.204 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-175-204.eu-west-1.compute.amazonaws.com
Software
Apache-Coyote/1.1 /
Resource Hash

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Tue, 30 Oct 2018 22:52:17 GMT
Server
Apache-Coyote/1.1
P3P
CP="ALL IND DSP COR CUR ADM TAIo PSDo OUR COM INT NAV PUR STA UNI"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript;charset=UTF-8
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT
/
disqus.com/embed/comments/ Frame 1E7B
0
0
Document
General
Full URL
https://disqus.com/embed/comments/?base=default&f=zdnet-1&t_i=7a12161d-2a5f-4793-b0a4-9fac038733de&t_u=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks%2F&t_e=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks&t_d=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks&t_t=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks&s_o=default
Requested by
Host: zdnet-1.disqus.com
URL: https://zdnet-1.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.128.134 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ 'unsafe-inline' https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ https://apis.google.com https://www.google.com/recaptcha/ https://disqus.com
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Host
disqus.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

Server
nginx
Content-Security-Policy
script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ 'unsafe-inline' https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ https://apis.google.com https://www.google.com/recaptcha/ https://disqus.com
Link
<https://c.disquscdn.com>;rel=preconnect,<https://c.disquscdn.com>;rel=dns-prefetch
Cache-Control
stale-if-error=3600, s-stalewhilerevalidate=3600, stale-while-revalidate=30, no-cache, must-revalidate, public, s-maxage=5
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Timing-Allow-Origin
*
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Content-Type
text/html; charset=utf-8
Last-Modified
Mon, 29 Oct 2018 19:12:16 GMT
ETag
W/"lounge:view:6942488675.60137d841b47fd0b8991807746eb7d0e.2"
Content-Encoding
gzip
Content-Length
3089
Date
Tue, 30 Oct 2018 22:52:18 GMT
Age
0
Connection
keep-alive
Vary
Accept-Encoding
Strict-Transport-Security
max-age=300; includeSubdomains
analytics.js
www.google-analytics.com/
42 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: widget.perfectmarket.com
URL: https://widget.perfectmarket.com/cbsinteractive-zdnet/pmk-201618008.1.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 11 Oct 2018 19:41:26 GMT
server
Golfe2
age
1796
date
Tue, 30 Oct 2018 22:22:22 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
17301
expires
Wed, 31 Oct 2018 00:22:22 GMT
tboptevent.html
widget.perfectmarket.com/opt/ Frame F712
0
0
Document
General
Full URL
https://widget.perfectmarket.com/opt/tboptevent.html?v=2&a=u&d=%7B%22stp%22%3A%7B%22a%22%3A1%7D%7D
Requested by
Host: widget.perfectmarket.com
URL: https://widget.perfectmarket.com/cbsinteractive-zdnet/pmk-201618008.1.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.181 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Varnish /
Resource Hash

Request headers

:method
GET
:authority
widget.perfectmarket.com
:scheme
https
:path
/opt/tboptevent.html?v=2&a=u&d=%7B%22stp%22%3A%7B%22a%22%3A1%7D%7D
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
404
server
Varnish
retry-after
0
accept-ranges
bytes
date
Tue, 30 Oct 2018 22:52:19 GMT
via
1.1 varnish
x-served-by
cache-fra19139-FRA
x-cache
MISS
x-cache-hits
0
x-timer
S1540939939.006690,VS0,VE0
content-length
0
collect
www.google-analytics.com/r/
35 B
109 B
Image
General
Full URL
https://www.google-analytics.com/r/collect?v=1&_v=j71&aip=1&a=1795029455&t=pageview&_s=1&dl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fgigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks&ul=en-us&de=UTF-8&dt=Gigantic%20100%2C000-strong%20botnet%20used%20to%20hijack%20traffic%20meant%20for%20Brazilian%20banks%20%7C%20ZDNet&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=YAhAAEAB~&jid=2091616868&gjid=835125186&cid=965284673.1540939932&tid=UA-33613588-22&_gid=1860191396.1540939939&_r=1&cd2=other&z=1288288623
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 30 Oct 2018 22:52:19 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
tboptevent.html
widget.perfectmarket.com/opt/ Frame D493
0
0
Document
General
Full URL
https://widget.perfectmarket.com/opt/tboptevent.html?v=2&a=u&d=%7B%22stp%22%3A%7B%22v%22%3A1%7D%7D
Requested by
Host: widget.perfectmarket.com
URL: https://widget.perfectmarket.com/cbsinteractive-zdnet/pmk-201618008.1.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.181 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Varnish /
Resource Hash

Request headers

:method
GET
:authority
widget.perfectmarket.com
:scheme
https
:path
/opt/tboptevent.html?v=2&a=u&d=%7B%22stp%22%3A%7B%22v%22%3A1%7D%7D
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/

Response headers

status
404
server
Varnish
retry-after
0
accept-ranges
bytes
date
Tue, 30 Oct 2018 22:52:19 GMT
via
1.1 varnish
x-served-by
cache-fra19139-FRA
x-cache
MISS
x-cache-hits
0
x-timer
S1540939939.105256,VS0,VE0
content-length
0

Verdicts & Comments Add Verdict or Comment

186 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| soastaTracking object| ZdnetPageVars object| ZdnetFunctions boolean| gdprConsent object| evidon object| knownServiceWorkers object| cbsiGptDivIds function| UUIDv4 string| __tealium_data_guid object| utag_data function| requirejs function| require function| define number| BOOMR_lstart object| headertag object| googletag function| headertag_render object| pbjs object| BOOMR object| BOOMR_mq function| $ function| jQuery undefined| easyXDM object| __core-js_shared__ function| setImmediate function| clearImmediate function| UUIDv1 function| clamp object| STR undefined| UUID object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken object| fly undefined| testGroup undefined| testName object| utag_err boolean| utag_condload function| getCookieValue object| isInternal object| js object| s object| adData string| adCookieName undefined| adCookieData undefined| adRegion function| parseJson object| match object| utag function| runInternalUserFuncs function| cbsiInternal function| _tealium_old_error boolean| isEuUser object| vglnk object| omnitureMgr object| dwMgr object| om object| jQuery183005938307649846686 function| vl_cB function| vl_disable function| vglnk_15409399305165 object| GPT_jstiming object| google_reactive_ads_global_state undefined| google_measure_js_timing function| pf_notify function| lightboxjs function| lightboxlib number| BOOMR_configt object| _ml function| dw_callback object| EF function| setUpAgknTag function| AppMeasurement_Module_AudienceManagement function| AppMeasurement_Module_ActivityMap function| AppMeasurement function| s_gi function| s_pgicq function| doSiteCatalystTag object| headID object| newScript object| s_c_il number| s_c_in object| _bmrEvents function| Visitor object| visitor function| DIL number| s_objectID number| s_giq object| Modernizr function| Waypoint function| agknTagBuilder object| _agknTag string| _agknTagName object| _agknEchoTag number| _isAgknTagSet object| debug object| __ql string| path string| host object| scriptTags object| TRUE_ANTHEM object| CryptoJS object| mPulseApp object| swfobject object| DW function| dw_anonc object| DW_anonc object| optimizely string| f0 object| omMgr object| DIGIOH_API function| renderAdCallback function| blankAdCallback string| firstpgvar string| waypointContextKey object| sticky undefined| _ function| Hls undefined| uuid function| addResizeListener function| removeResizeListener function| Spinner object| uvpjs function| Class object| mpulseUserTiming object| s_i_cnetzdnetglobalsite undefined| vglnk_15409399310176 undefined| vglnk_15409399312118 number| BOOMR_onload string| bm_website_code object| $tealium boolean| google_noFetch boolean| google_DisableInitialLoad number| __google_ad_urls_id object| ret number| google_unique_id object| gaGlobal boolean| searchOpen object| $lastFocusedInput string| pageType undefined| jQuery183005938307649846686_1540939930384 undefined| jQuery183005938307649846686_1540939930385 function| udm_ function| ns_order object| ns_ object| ns_p string| ZN_3xeBFJDuSs0SRW5_ed string| ZN_3xeBFJDuSs0SRW5_sampleRate string| ZN_3xeBFJDuSs0SRW5_url function| fbq function| _fbq function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter object| UA object| QSI number| _rnd string| __prot object| __i string| disqus_shortname object| __google_ad_urls boolean| google_osd_loaded boolean| google_onload_fired object| DISQUSWIDGETS undefined| disqus_domain function| mb function| Goog_AdSense_Lidar_sendVastEvent function| Goog_AdSense_Lidar_getViewability function| Goog_AdSense_Lidar_getUrlSignalsArray function| Goog_AdSense_Lidar_getUrlSignalsList object| ima object| google function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| NOLCMB object| platform function| mux object| Moat#G26 boolean| Moat#EVA object| MoatSuperV26 object| ADB object| google_jobrunner number| google_global_correlator object| google_prev_clients

5 Cookies

Domain/Path Name / Value
.lightboxcdn.com/ Name: __cfduid
Value: d1ff186885fcaf0b18f144f3b779364611540939931
.demdex.net/ Name: demdex
Value: 14800636450567127481351596307358116261
.zdnet.com/ Name: RT
Value: "sl=1&ss=1540939928122&tt=3758&obo=0&bcn=%2F%2F22ffabbe.akstat.io%2F&sh=1540939931909%3D1%3A0%3A3758&dm=zdnet.com&si=e952bd0c-7094-4622-8840-ba662346d9f8&ld=1540939931910"
.demdex.net/ Name: dextp
Value: 127444-1-1540939931711
.zdnet.com/ Name: utag_main
Value: _sn:1$_ss:0$_st:1540941731769$ses_id:1540939930482%3Bexp-session$_pn:1%3Bexp-session$linktag:undefined%3Bexp-session

60 Console Messages

Source Level URL
Text
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service pending (GDPR consent not granted): script_indexexchange
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service pending (GDPR consent not granted): script_mpulse
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service pending (GDPR consent not granted): script_gpt
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 732)
Message:
ADS: queuing nav-ad-5bd8e099312c0 for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1203)
Message:
ADS: queuing intromercial-5bd8e099312c0 for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1272)
Message:
ADS: queuing skin-5bd8e099312c0 for display
console-api log URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js(Line 1)
Message:
dom not ready, setting event
console-api log URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js(Line 1)
Message:
dom not ready, setting event
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1281)
Message:
ADS: queuing leader-plus-top-5bd8e099312c0 for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1420)
Message:
ADS: queuing inpage-video-top-5bd8e099312c0 for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1430)
Message:
ADS: queuing sharethrough-top-5bd8e099312c0 for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1653)
Message:
ADS: queuing mpu-plus-top-5bd8e099312c0 for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1763)
Message:
ADS: queuing dynamic-showcase-top-5bd8e099312c0 for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1770)
Message:
ADS: queuing mpu-middle-5bd8e099312c0 for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1979)
Message:
ADS: queuing mpu-bottom-5bd8e099312c0 for display
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 1996)
Message:
ADS: queuing leader-plus-bottom-5bd8e099312c0 for display
console-api log URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js(Line 1)
Message:
dom not ready, setting event
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service pending (GDPR consent not granted): script_sharethrough
console-api log URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js(Line 1)
Message:
dom ready, triggering load
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
GDPR consent granted
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent finally granted): script_indexexchange
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent finally granted): script_mpulse
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent finally granted): script_gpt
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent finally granted): script_sharethrough
console-api log URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js(Line 1)
Message:
dom ready, triggering load
console-api log URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js(Line 1)
Message:
dom ready, triggering load
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js(Line 9)
Message:
Missing adCookieData!
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js(Line 92)
Message:
zdnet
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_mpulse
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): _injectQueryStringGCP
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_ad
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201809191808(Line 177)
Message:
Service: sitecatalyst
console-api log (Line 2)
Message:
ADS: queuing mpu-bottom-5bd8e099312c0 for display
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js(Line 92)
Message:
zdnet
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_sharebar
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_video
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_sharebar
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/user.js?cb=636754604557185965(Line 1224)
Message:
DIGIOH: identityChildReady999999999: zyxcba
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_urban_airship
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_disqus_count
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_disqus_count
console-api log (Line 33)
Message:
blank creative loaded: 138239360957 (7 x 7, pos=nav)
console-api log (Line 33)
Message:
blank creative loaded: 138239321298 (1600 x 1000, pos=top)
console-api log (Line 33)
Message:
blank creative loaded: 138239450914 (300 x 250, pos=bottom)
console-api log URL: https://vidtech.cbsinteractive.com/uvpjs/2.8.3/CBSI-PLAYER.js(Line 20)
Message:
UVPJS 2.8.3 03/26/18 8:42:19 AM (PDT)
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 164)
Message:
Dynamic Showcase Center container ::: creative id = 138247024569
console-api log URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/user.js?cb=636754604557185965(Line 1224)
Message:
DIGIOH: Calling setIsCrossDomainStorageWorking using short circuit!!!!
console-api log (Line 33)
Message:
blank creative loaded: 138239375180 (372 x 142, pos=)
console-api log (Line 33)
Message:
blank creative loaded: 138239375540 (372 x 142, pos=)
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_taboola
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): script_medusa_async_load
console-api log URL: https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/(Line 106)
Message:
Service loading (GDPR consent already granted): disqus_init
console-api warning URL: https://zdnet1.cbsistatic.com/fly/js/libs/mpulse-1.0.2.js(Line 8)
Message:
mPulse: Custom Timer 'video_ploaded' is not defined
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js(Line 92)
Message:
zdnet

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval'; font-src https: blob: data:; img-src https: data: android-webview-video-poster:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

22ffabbe.akstat.io
ad.yieldmanager.com
ads.rubiconproject.com
adservice.google.com
adservice.google.de
api.viglink.com
as-sec.casalemedia.com
asset.pagefair.com
asset.pagefair.net
beacon-eu-ams3.rubiconproject.com
beacon.tru.am
c.disquscdn.com
c.evidon.com
c.go-mpulse.net
cbsdfp5832910442.s.moatpixel.com
cbsi.demdex.net
cdn-gl.imrworldwide.com
cdn.taboola.com
cdn.viglink.com
cm.everesttech.net
cm.g.doubleclick.net
connect.facebook.net
d.agkn.com
disqus.com
dpm.demdex.net
dw.cbsi.com
eus.rubiconproject.com
geo.moatads.com
googleads.g.doubleclick.net
graph.facebook.com
idsync.rlcdn.com
iicbsi-a.akamaihd.net
imasdk.googleapis.com
in.ml314.com
js-sec.indexww.com
js.agkn.com
l.betrad.com
match.adsrvr.org
ml314.com
native.sharethrough.com
optimized-by.rubiconproject.com
pagead2.googlesyndication.com
pixel.everesttech.net
pixel.mathtag.com
ps.eyeota.net
px.moatads.com
rev.cbsi.com
s.update.rubiconproject.com
s0.2mdn.net
saa.cbsi.com
sb.scorecardresearch.com
secure-us.imrworldwide.com
secure.adnxs.com
securepubads.g.doubleclick.net
som.cbsi.com
stats.pagefair.com
sync.crwdcntrl.net
tags.bluekai.com
tags.tiqcdn.com
tpc.googlesyndication.com
tru.am
vidtech.cbsinteractive.com
web-sdk.urbanairship.com
widget.perfectmarket.com
www.everestjs.net
www.facebook.com
www.google-analytics.com
www.google.com
www.google.de
www.googleadservices.com
www.googletagservices.com
www.lightboxcdn.com
www.linkedin.com
www.zdnet.com
z.moatads.com
zdnet-1.disqus.com
zdnet1.cbsistatic.com
zdnet2.cbsistatic.com
zdnet3.cbsistatic.com
zdnet4.cbsistatic.com
zn_3xebfjduss0srw5-cbs.siteintercept.qualtrics.com
104.111.230.142
104.111.244.243
104.66.101.26
108.161.188.128
151.101.1.181
151.101.120.134
151.101.128.134
151.101.2.2
18.130.88.116
18.184.225.117
18.233.16.74
185.33.223.221
2.18.233.143
2.18.233.149
2.18.233.201
2.18.234.21
2.18.235.40
213.19.162.57
213.19.162.61
216.58.206.2
216.58.210.2
216.58.214.66
23.211.9.67
23.38.18.151
23.57.19.23
23.60.198.210
23.77.209.221
23.8.11.168
23.8.8.176
2400:cb00:2048:1::6810:4ea5
2400:cb00:2048:1::6810:4ea6
2400:cb00:2048:1::6810:a10d
2600:9000:200c:7e00:15:efbc:e300:93a1
2606:4700:20::6819:a222
2606:4700:20::6819:a322
2620:109:c00c:104::b93f:9001
2a00:1288:110:422::3000
2a00:1450:4001:814::2002
2a00:1450:4001:815::2002
2a00:1450:4001:816::2001
2a00:1450:4001:816::2004
2a00:1450:4001:816::2006
2a00:1450:4001:816::200a
2a00:1450:4001:816::200e
2a00:1450:4001:81a::2002
2a00:1450:4001:820::2002
2a00:1450:4001:821::2002
2a00:1450:4001:821::2003
2a02:26f0:6c00:19d::e3d
2a02:26f0:6c00::210:ba1b
2a03:2880:f01a:1:face:b00c:0:1
2a03:2880:f02d:12:face:b00c:0:3
2a03:2880:f12d:83:face:b00c:0:25de
34.231.154.145
34.246.247.78
52.18.169.38
52.206.48.193
52.208.88.219
52.212.113.202
52.215.27.193
52.50.182.20
54.154.175.204
54.230.93.121
54.230.93.44
54.246.133.167
54.76.196.204
54.88.105.249
63.140.43.34
63.140.43.37
64.30.224.172
66.117.28.68
66.117.28.86
68.232.35.180
94.31.29.248
0025565f0cddfceb7ebdbc4b21d2552c894998e443153f97a6e8b353dfd9bebd
009396e873c2f93482891861160df34a0a69bd1beaad7c5fc04d8dd36e4eec44
01629bfbfc659b4f648bdfd1d4749d9f23931c045114180094ba8d90091b938e
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
07b69027231d985f5bdcd4d5a539f120d26003feef6e9dc0a6b77a4b43a9b21f
081873caa83744b6d819ab294b08927e20b60841dd8f23a87c2a57e15f65591c
09ee3d95bf4c05be8568f5214f9b48ff244e6d27e7f95da4d8fb252246bf726e
0b2cb31e08683eea5c3cb7cfb26f89ef1c95d64d0ff031fc2c6fb3ba393158fc
0d6baa46c3cd463a5d3f967d89f7cf48d5909c34b22f6d671cc9f0c4f929611c
0e13cd6845611f0c419398a75b85ba014a7fffb1b9e9575c2e1b4cfefebd0017
0f4176807e149be9c6cc0e583699fffe630cccb37e57242ce5a7b1f7d63d859d
10113bad06fefd5698a45480ffaedd421c6e06f9dbd0d1c772b7128bbea0842d
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
110c6ce599b9f03196d683eba46e5a17770c9859893efc2d97a2b05e1d6c6998
13112639ea5d320063c21803f0172ec3273678f4d8a6215df67c4774659a233e
1491a1594a4058a62ea4c08441cfcbbfe82a0916b4f26b55f3605af896766dd7
1724d7fd70903754d6f29172f2ac879dc6dab79df6c4c78ed06f45c0f117e15c
181124d1788d7083ab1de6fbeb87f524e1a3c9658ccdf54c4f49ab523df2253c
1850ed533f7bef263c3b15379882c2ff9a33ac1d097864dd0c600633665f334d
186e5821720593367310d36fc9e71747518897853d453a6823194d0004b51f16
18e110ff918c99541657918aa03e2f59e43e5490ac8f7d7fa84ad19ab622db0c
196cf7096a620f542f2560e5c4f17e2e453a546c1c9b6d6fc4730e773595af59
1b91058b5969c2319ee3f3efb2b91ccf388c64fe22f806e59b0edb43694150d4
1c0ccb11374e2374cb7a52c792ffe07d9203d28d4ad97623bcf27bc58d2513f9
1d4d518e1da495fb6d6d8b3d86bba79d7597b61b466e71c45cdb09ed79659c53
1ff53412e0f7149ee0e54173d5681958ad656643e3213acdd588941c89642f9e
221a4620fcc4d7af712510e6ddc3db1dd5b70af63cbc2f414ba647daad2d6c4c
2364a14550f47455ce7c868b6ea1e3701aa6e09d4a7c482422fcdbfb35f04eb7
23e9daa10cae0ae10331dea2810980b4f670e0dbfb318797ccb598055e6ff9ee
23f515e63abad47efe09fc0e9199340c22b063467f3c72be0937ac0a5c3fef73
25e9475fd11aa1a1d5e4f8c67e26a1a4c6b29533548a7641e9fe8437c2117691
261603859cac0e676a2208b1b117c220249063b789e8216039e9148bfbbb5d34
2651576977d18928324a68a053a929a1acddffbbc6a04c8face239c5b489b34a
2671d72b96d6d9a1b8bbc1429048505ea6dbc3514daf22ab6dd6dfc8a70ce8d3
27676ea482895bdddd3f3796f430a812e11364efc224227c86973a52398966c2
2a0910180c90117140d4839a65e12b3a9b62f0ec56c507ff5b809dadf6e9f1f9
2b28e861a4e45fd1f546a63afabd2f757f8f9e18ec13a5316812237d02a74ecc
2b4b44954ecddf65e5391cb2df9f86cffc2979ebe88399bac1d61e5e918b8ed6
2bb8e607aa914110121eb1e2d4a65514285c78342811558156449443f644cf7b
2ccd728594ce65fa7e6651109e3bbd61877e548c4dab5480cafa6965f358a4e0
2dbd42e5d6b936274e0cf1688678f567784f89ae4f350d3eaee2dd6b86f65075
317b0ea8b9c2cae32b9f43e01d0a95803172e6b928ba36546261eee53f1f59ee
31f2502985cd82156618c2842decdd66226091e4f616c8cd3867a9ead2c8a9e3
334ecb5de067cf73650b13cd8a01b4493877bdbcb41405cde049e4fdcb14d487
33a177bffe6c9cfbc0d891362161de8bf268c106edc77b87de697888e2d6d5ac
3487ef2baf0c08ba660a8a143cdeb8ebeec961eea04bccd7c49096b4eb26b875
3544c18bb4d954e8f42793b40c495a703718155222054639fd3be53139e0a363
35733dd71de077b039d2bac6614c78eb3ab7d3879cb307cc10cc1907d2f61eb6
35c04e5b7a4044d3d19a6ccd99871a0e7d999570e2c5cfca5c91837e54ebfc9f
36d28341aaffbfab267617d0b7218195130a68d5456ce911e14419558ff3e9cb
37594bf5cea078e78adfeaee203437d94166b7d2c073b5c3c170a1ba730eca01
37a01e173304b3e8db18b7ecf014820e004f01057bd47e3bd07f38c53eccfcfa
37c1f28fa5af6044e8bbaf10eb2e55ec5f102a23ec29430f6b4b1fa5c0ba3f7b
39792a87040a1614ad8fa37afddca74efcfdfb5f4983f008154bc2f3d5b13c4f
3988f709c09d423be46f08ad2547895597522365a2ef41a233f6d270d284e5a6
3abead375bb8d384d18dd455d548fa9d94dfd5a876dd8be9b3a5235c771abfec
3ae5d0f70dfeb1308462aaaa19d8326a6bd2d41781323b07db04cccffc09cf5f
3c599ef176cecdb3de25c6c36bc2945b92c12bcbc2ab03350729f4de296b53b8
3ff065de0d90b0510727a72c173d05652c30967c5e6561dbf1d82fa077cabb22
40c707d407e524f6e535fe307be27c3d79067da9cbf8fa9eef3c9ec1933e12df
40d317f999e71c7635619879cf4c5901505ea487011a00a220e560996f7557b1
4974c54f5183f50fd1f3c3d49c496fd79602f8159b6d393d3fab09e4433555dd
4ab6a27e7fab0d1aa86e5fb3cef44c53865862b2c8d6c076ee44409a12e6b644
4d049d83eef469c1f2cc0f5df820144ff6c5eb896b4e4aa2e681a1cba7d622a9
50cba2f3945021dd8c300cd7a82a8c462b24c2695afe49596499400e357de132
516b065177d1546683627fa32c8574fd59edc3eb3bf92cef5882d53e58d7a1f2
51979f4c4b881a194decaf4487925722017946d58e61c34e04125cad81d0fd7c
56bf714084093ce2762a223acbaee3f925b631b6fb24aee9f2f96c09bcc94c66
576e8bf4510a62d7cdcfedd8b749f3039d0c5aa8b2bdfe2e38a44645e0f982e4
579e81f46017126d8f898dd79dc3930782f6e9e41d0537e9050310cc8dadc73e
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd
5ecb58845a9ac30e4eb4b18eb0e7431ba1fb195ce035309735efaee67421c7a3
5ecc6a93ec2939faa8dbf80084346c7d940f5a2181ee69343810da52902eb92d
61fdf37d30bf412dd87c52565f2b227ce9c3b57030950437fd0bd650d11bc035
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
6777cc97d90b6e3773b62f12dfc047362dd55f7610369239eafd46c109cd5380
678fd380b7f978e41cbe90b8fa8f463c5e44db228e8e5a7aae06cf5dc33db45e
694d40f6c8eb9760993e74b773dbb2cf3822ccb7f14a6d28320927cc5f9bad90
69721aa2f1085046c84d1943a1daa0515be8e2f060c21063024ea117789e425c
6987f5dab3ced7612887b80ca2de81041654a6434970e1cbbb03c293dd47ce0b
6ac72fa11e76ea6fdbb1b310f67b3b9b24c11da94774a89323b71930ae544eee
6bd6c1f48bbf2f3f10bdcf7f938a263f9b5aac6bf47357bb1d4e0d6baa216839
6c65a8205295ee9b8a16e60080102aa2125add70f44910fef31523649d252ac0
6d4dc28c491ca7ff1c86fa292821d3174e2c7638170628e1daa411da61d10684
7017fe26514320eea8b02069a2ec814953fc7f78d3513ab52c4c80108d112b56
729d743174ed040cea87f86a9a5454920c77d53cb2b2442e941637fdeaab469d
763fa0bd7eff816d0a5f8c3e4075f9173a5cebf51a1e2c0d1174f841de10b9dd
767032ff802abda20f0238fab293fe01a8c7ff1bffb06f5cf09d92a640d49a27
769f5af15dd678e43d180cba425f2b943f20aeaf2c66de356583e64d9d987216
78e6c9bd32bac30d3171f0257ad9961c141202694725e96d005fd11a8281f556
791b7ff5657f9c41e24adaa1f6f5a4dc51046d292b25b01a5a8d152ff4a951ac
7e9696aabfbb60803028b14636581f459404cea187d0c0c50b7d4d5cf8e1a3b1
7eae865fd7c820936603897a072b7ddd77b2c74e8022160fd19792291a63fac8
802446cd0aefe1f43030cf3e02eddbbbec61e27e62479d990d8889266943a650
869ae907506390d8c2e636064ddd91a84705ce6a7c6eb9cbb8156b6be4dab4ec
87bc265dda5e31597442c420def76eeadb5c516d016213a47f570c65d5558b72
8896bd9aad2399ee52a9878c7ada2e49df2f66ba91afd102244018c25ffd88e2
89b08981d2dcbbc50524744f8d3beee8e325096b9030f5bbb0244f5e93bc57dc
89fe0ee6020314794fc2cfeacf3d10c31050cfe56f8ebddf1ed0a33fbe941fa7
8a27fab6c5a0b1db438219c7d24ce2fff95e0910378fe4bdeb64b4f970eebccc
8ba131a677ea1357ae7fdc95d6a5c67c3b02d171bb286f6c9ec6bce3cef5c211
901fc3206be099c4dc64931428fe93dc4a2130063aaba7e94090303ded1397a0
9242cae28bc65d0b14fc566242452e05bdce12813551d6bb027c066d54bbf2f7
9337d4f2ef8a00759da573e178e302712fec944ac54cfd808f48c526b9816d3b
965b325924d7bd803f6fb1007b982eeb412ebfd696a20986fd4e6bc221daf413
9acc0eb4103d7b741c330849d8234002afa518fd931f8dc964dd3824298d41a1
9b0b6168c980a7f48beb5e4482e3f39275b7b341427b4ebd437392f71c4bdff0
9b8a19af975870b49a3d4d941b65613ef40b35ffff646e4667701d9e23e481da
9bc919db282a05a6925ee14310e2cca9085053ae8d9dd7e2e0cbfe1b93fae0ac
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627
a20c788fad1957d4bcd135b761c2ede3fd3ddc4a1b9a5ed0c565be047fe7e3f0
a2c2339691fc48fbd14fb307292dff3e21222712d9240810742d7df0c6d74dfb
a774caeb545e1303d90eecc947ec2bf8e8bf534b7db6b17ec88b7cf44ca0ccc4
a862607c2fb71979258d7a62448f3909a8e8449a0e4fab3ddad1c88dbe61c266
acf3b5b3ade1391096f23120b725a032dce430448ba8aff2a6f0c3f9c598b2a3
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b
b2816ae41889388360482588c8af317634fce4179e6cfdad21f26e23ab6a9f7e
b2ab8784d5ca4bc5e4e1990ba55c6d9f041b8fe8cf41ad9afa37bc1c3dd12756
b34a764a54cd042f769a2e1a002a27c14132167d8ab9967bc49419c87b694d99
b35a95a86cc71364688d5c031e3ea4da928c773c564fdbb76ece333ca8f1b3c7
b47241eabf30c18bf1761e363bdc9e5b755ea4b60d71ca9d1a0b3c4f7ffefdb7
b50a701e3677d3b9810ddf2d0a775c976210f5c433926d515b24e0d62b6e3af4
b836eb7325ac607513eaacb51a19639451d3fb357168f991c29bd6e9d9f250af
b8c15c61feffdfe68b168cf2ac8cf58867f38547da3b15d7971a75c44f16bc26
ba2fa15976662b87f31dccdd53d415b927f2118760fdafc4ac21dd2c1b234ff3
ba34757c29dec9b09a7783e13122d0832ea84985249bcd283048eb714a08a426
bbf03c4e25d86bbfa6c5bc4bb0f26a17602f93576366ec5d19d7e1c142522ba5
bf413671ac4278a51bc9621af98e7f5a6cdbb228ecda66602f7e02ea27b28d13
bf94db5c7d218f9a2a2edfff6c01bf65f5946a32000cd41835fee5b564efa62f
c1edbbc80d61f94af9ae00bb2923e5c73d1f31f847e3c7722a2deae4fae8535f
c45325cec13fd257eb7af08698d810061c425c91ca137b3fb1c9b350170fde0d
c56ce4f47224f4a6f86cd8102f446357b5038738ae9d156773f6d39efd908ecd
c67e5c86a702ef23d3197cccef739cefd32fcdab3ccef2e7c0314fa1914adbaa
c798d4e19a4c22d6aa1eea2cf92bc5d455e7cf6eb876256612522f1b75ef54fa
c9f9ded1c66d9f290eeb0fadad73f3bba0d8cc2c784b078e9b00eca200eca125
cbe1f033ed03b9f1b425c1ad45d6406f019fe8666c20ab24fb6719579f75065b
cbeacd59b57d482da0073dbd5363079e9b7c70afdb535c3bdbbf18878183bfb0
cce5c991fc672328e8eb7e5f9026496acd4fa608d26d0df95c54b7f16a8e5cc4
cd5e6512fdbb698425174148dba05f72357a3b1944413f8812c55c4025d3d562
ceffb891c3e1891757ead2e7e41497adc13abca0d14d7f58d20e3aa8d5aee108
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda
d02197080b9680999381b5f5337fedd92674e5a1550ddfcc0c70612d3170a5e3
d05a0088d1a2c67e0707be3f7ff1823683ba849a3d3d4004d971cb58eb40d08a
d0e4a6372d6fb5ffe9505dbe9e94aee8f1b9b96ec8e5e20684cce8b4c5a88fa7
d2fe67ecc4354b214728e0a7d75b67536a78f6b575080b589d54a1937fc46b41
d48e0904f1b40972f1fc6dac3f358719e080fab3291d13d2ca4a60405707a88b
d5e9dfd6066c2872be4f85c25aa0186402b124ea3f80152e2e2b767906793284
d64f82c9b53b37bef6aa77d35e939e067fc74c96bc78d5a630f2425ca7a64ccc
d696da403b0169c2191d0ec0b0fcdaa85487b21b19fd58f4b1fb5b9edf40b153
d6e6bd9d40a807b7402dd2c2b74700d0790e0733718a4343c2a6fa140da3a62e
dabf73474662398f4f686a1b3103542f53384dd6241e6ac13f8ba535c6372aff
db72d232206dbb103f4c7591aeca7c058192283dec7a22ee37f4be61d7d9a3bf
ddfc91f954a7df70ddb1b6d0265eb1792d1c7922d50463d968159e7a4403fb1c
de749bdbeeb7bb7f79cb31ff00fe6830004064419f73fe9a6ec982e9de8bf19d
de9d3fd0eb948bd294477d0eda60a73b85caff1794803530d0463193a113da98
e08209b44a15fd9f6b9977d2580034e8d3da36542235802c2722ff8db4c0a461
e0b8436d50fb200de76d7a25cf450ea238cd100197f8e9d462e9228153da873f
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e482ba089d973ca257acfd70b2d7541447d5d333449b106d5c3dffebe322566a
e9b3eb7f022396e969766ad5e908b21df0b646c943e149902c64de590e9549d9
ebff5e526eaecb20e91c2af0476f72cdae479b8e36b89f4e3068ce46dd1db96f
ee221041a905f4b0fbe76dc05e44575523fd26a93f9e038bcb19d16e4155ee5b
ee58d451d4c826e171525a0fb417343a42ae338fd8afb6b77613235476f89dfe
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
f064de9e559cb4483bff51b21a1d7a36ba057126778f6ecd8dca5329c190a9ee
f27c0c9f284c6959dd7db1e768c6e43a518ea650afc69d7a60383f3a963cde7b
f5c73ee2715971ba4663672c0233757ed4add12f12ef8d74ce9c62d7da46f11c
f68ec7cf550e86cb14e4d992724157c4f625ea3f0cd7d06e9e533c17c735401d
f7739b424d4acd048d584bf1bfa99a1ea5481989d1abb8948e9bf571729f2c72
f8ab45ee0969bb98916fa2ba950a26e40d4039a8d402bc661bd99ee0392edbc0
f96f203f5605c9f56e7f6f97caf6ea84f122872ec3c5ac1f9037a1b508c706ee
f9784f57729f84391b084eed9e944e048f771129d65e9b58f34095fdfba86473
fa107680c3e0cfd1620aebe62462103703993ada997d84aa6d5f55ce0ea3cba0
fa33d1db535d783b0baf4e74bdc7ce9e54633f87a03669b2803e567088d64ccb
faf50b9ffe58f834c4796d588923150c2a2ed752b0d670e32293827b6038c758
fb9007c254c493be4a067de535b19a30f5e5aef3d5b19f58b1c72d2c65a04f79
fe748898d14a9ad7576bb309866e8c4190dc739d3a16fb8eea0c6ff59e449b59
ff2ae991ac0efdb5ae8b4428ba8555a0aeb0fd94b8014ce290c484242c524097