Submitted URL: http://pmg-reg.onecount.net/mail/lt.php?tid=fBhWCAIAC1QICUxaBlMAFQcKAFQeCAYFBElTBwBUAVYABgQKAVFPAlQFV1tUVVEVCgQCUh4FUgQCSQpc...
Effective URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Submission: On February 03 via api from US

Summary

This website contacted 23 IPs in 5 countries across 18 domains to perform 134 HTTP transactions. The main IP is 91.134.128.88, located in France and belongs to OVH, FR. The main domain is www.securitytechbrief.com.
TLS certificate: Issued by R3 on December 9th 2020. Valid for: 3 months.
This is the only time www.securitytechbrief.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
3 3 172.81.88.245 10493 (GCN-AS)
33 91.134.128.88 16276 (OVH)
8 2a04:4e42:1b:... 54113 (FASTLY)
11 2001:41d0:202... 16276 (OVH)
16 172.81.88.251 10493 (GCN-AS)
1 2a00:1450:400... 15169 (GOOGLE)
6 2a00:1450:400... 15169 (GOOGLE)
5 2606:2800:234... 15133 (EDGECAST)
4 2a03:2880:f01... 32934 (FACEBOOK)
2 2606:2800:233... 15133 (EDGECAST)
1 8 52.18.215.87 16509 (AMAZON-02)
4 2a00:1450:400... 15169 (GOOGLE)
4 2a00:1450:400... 15169 (GOOGLE)
2 4 216.58.212.166 15169 (GOOGLE)
2 216.58.207.34 15169 (GOOGLE)
1 2 52.50.19.208 16509 (AMAZON-02)
2 2 54.74.225.211 16509 (AMAZON-02)
2 2 52.30.234.204 16509 (AMAZON-02)
1 3.121.27.153 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
1 35.168.139.27 14618 (AMAZON-AES)
1 2a03:2880:f11... 32934 (FACEBOOK)
1 104.244.42.136 13414 (TWITTER)
1 4 2.18.233.40 16625 (AKAMAI-AS)
1 2 54.76.40.71 16509 (AMAZON-02)
134 23
Domain Requested by
44 www.securitytechbrief.com www.securitytechbrief.com
validate.onecount.net
14 validate.onecount.net www.securitytechbrief.com
validate.onecount.net
8 ml314.com 1 redirects www.securitytechbrief.com
ml314.com
8 cdn.jsdelivr.net www.securitytechbrief.com
cdn.jsdelivr.net
6 www.googletagmanager.com www.securitytechbrief.com
www.googletagmanager.com
5 platform.twitter.com www.securitytechbrief.com
platform.twitter.com
4 s.adroll.com 1 redirects www.securitytechbrief.com
s.adroll.com
4 9438555.fls.doubleclick.net 2 redirects www.googletagmanager.com
4 www.google-analytics.com www.googletagmanager.com
www.google-analytics.com
www.securitytechbrief.com
4 ssl.google-analytics.com www.securitytechbrief.com
4 connect.facebook.net www.securitytechbrief.com
connect.facebook.net
3 pmg-reg.onecount.net 3 redirects
2 sync.crwdcntrl.net 2 redirects
2 match.adsrvr.org 2 redirects
2 dpm.demdex.net 1 redirects
2 securepubads.g.doubleclick.net www.googletagservices.com
2 pmg-validate.onecount.net www.securitytechbrief.com
2 platform.linkedin.com www.securitytechbrief.com
2 www.googletagservices.com www.securitytechbrief.com
1 d.adroll.com
1 d.adroll.mgr.consensu.org 1 redirects
1 syndication.twitter.com www.securitytechbrief.com
1 www.facebook.com connect.facebook.net
1 ps.eyeota.net www.securitytechbrief.com
1 in.ml314.com ml314.com
134 25
Subject Issuer Validity Valid
www.securitytechbrief.com
R3
2020-12-09 -
2021-03-09
3 months crt.sh
f3.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2020-10-26 -
2021-04-17
6 months crt.sh
*.onecount.net
Network Solutions OV Server CA 2
2020-10-26 -
2021-11-26
a year crt.sh
*.g.doubleclick.net
GTS CA 1O1
2021-01-05 -
2021-03-30
3 months crt.sh
*.google-analytics.com
GTS CA 1O1
2021-01-05 -
2021-03-30
3 months crt.sh
*.twimg.com
DigiCert TLS RSA SHA256 2020 CA1
2020-11-05 -
2021-11-09
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2020-12-22 -
2021-03-21
3 months crt.sh
platform.linkedin.com
DigiCert SHA2 Secure Server CA
2019-10-10 -
2021-10-14
2 years crt.sh
*.ml314.com
Amazon
2021-01-17 -
2022-02-14
a year crt.sh
*.doubleclick.net
GTS CA 1O1
2021-01-05 -
2021-03-30
3 months crt.sh
*.demdex.net
DigiCert TLS RSA SHA256 2020 CA1
2020-12-02 -
2022-01-02
a year crt.sh
*.eyeota.net
R3
2020-12-29 -
2021-03-29
3 months crt.sh
syndication.twitter.com
DigiCert TLS RSA SHA256 2020 CA1
2020-11-30 -
2021-11-29
a year crt.sh
*.adroll.com
DigiCert SHA2 Secure Server CA
2020-01-29 -
2021-04-29
a year crt.sh
adroll.mgr.consensu.org
Amazon
2020-10-08 -
2021-11-07
a year crt.sh

This page contains 6 frames:

Primary Page: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Frame ID: DA692F771A8A58087E19472D1215E4F8
Requests: 129 HTTP requests in this frame

Frame: https://9438555.fls.doubleclick.net/activityi;dc_pre=CK-yrtS3zO4CFdXU7Qod-JILDQ;src=9438555;type=invmedia;cat=secur0;ord=7652993079451;gtm=2od1k0;auiddc=1662957208.1612311304;~oref=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Frame ID: 18CA1F904AB6E9524F8BA236F638C425
Requests: 1 HTTP requests in this frame

Frame: https://9438555.fls.doubleclick.net/activityi;dc_pre=CLHuidW3zO4CFVDC7QodcNsI4Q;src=9438555;type=invmedia;cat=secur0;ord=2276874585322;gtm=2od1k0;auiddc=1662957208.1612311304;~oref=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Frame ID: 09763B76F6661983BFC722B5AC61D83B
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/widget_iframe.96fd96193cc66c3e11d4c5e4c7c7ec97.html?origin=https%3A%2F%2Fwww.securitytechbrief.com
Frame ID: 7B53BE3C912E6670C1985CEBDDA94EBF
Requests: 1 HTTP requests in this frame

Frame: https://www.facebook.com/v3.3/plugins/like.php?action=like&app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Df1f650ac49d8b5%26domain%3Dwww.securitytechbrief.com%26origin%3Dhttps%253A%252F%252Fwww.securitytechbrief.com%252Ff7ca015f7c222%26relation%3Dparent.parent&container_width=0&href=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address&layout=button_count&locale=en_GB&sdk=joey&share=true&show_faces=false&size=small&width=160
Frame ID: C3DB35E2EBB2F95D77B9E7379AC92BB3
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/tweet_button.96fd96193cc66c3e11d4c5e4c7c7ec97.en-gb.html
Frame ID: 163B5408F912619E03480D27E29C1F0F
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://pmg-reg.onecount.net/mail/lt.php?tid=fBhWCAIAC1QICUxaBlMAFQcKAFQeCAYFBElTBwBUAVYABgQKAVFPAlQFV1tU... HTTP 301
    https://pmg-reg.onecount.net/mail/lt.php?tid=fBhWCAIAC1QICUxaBlMAFQcKAFQeCAYFBElTBwBUAVYABgQKAVFPAlQFV1tU... HTTP 303
    https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-e... Page URL
  2. http://pmg-reg.onecount.net/onecount/redirects/index.php?action=get-tokens&js=1&sid=&return=https%3A%2F%... HTTP 307
    https://pmg-reg.onecount.net/onecount/redirects/index.php?action=get-tokens&js=1&sid=&return=https%3A%2F%... HTTP 302
    https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-e... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • script /googletagservices\.com\/tag\/js\/gpt(?:_mobile)?\.js/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • script /([\d.]+)?\/modernizr(?:.([\d.]+))?.*\.js/i

Overall confidence: 100%
Detected patterns
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

134
Requests

86 %
HTTPS

44 %
IPv6

18
Domains

25
Subdomains

23
IPs

5
Countries

3676 kB
Transfer

7098 kB
Size

20
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://pmg-reg.onecount.net/mail/lt.php?tid=fBhWCAIAC1QICUxaBlMAFQcKAFQeCAYFBElTBwBUAVYABgQKAVFPAlQFV1tUVVEVCgQCUh4FUgQCSQpcVwMcUVJUV1oGBlUCAwIERAUCVVxWAwZQHlcCAVNJBlZSABxcA1EFFAcCBVIEVFFaAVIBCg HTTP 301
    https://pmg-reg.onecount.net/mail/lt.php?tid=fBhWCAIAC1QICUxaBlMAFQcKAFQeCAYFBElTBwBUAVYABgQKAVFPAlQFV1tUVVEVCgQCUh4FUgQCSQpcVwMcUVJUV1oGBlUCAwIERAUCVVxWAwZQHlcCAVNJBlZSABxcA1EFFAcCBVIEVFFaAVIBCg HTTP 303
    https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address Page URL
  2. http://pmg-reg.onecount.net/onecount/redirects/index.php?action=get-tokens&js=1&sid=&return=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address&sid=77c3rfqrb76ibgapr8l9o15qp1 HTTP 307
    https://pmg-reg.onecount.net/onecount/redirects/index.php?action=get-tokens&js=1&sid=&return=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address&sid=77c3rfqrb76ibgapr8l9o15qp1 HTTP 302
    https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • http://pmg-reg.onecount.net/mail/lt.php?tid=fBhWCAIAC1QICUxaBlMAFQcKAFQeCAYFBElTBwBUAVYABgQKAVFPAlQFV1tUVVEVCgQCUh4FUgQCSQpcVwMcUVJUV1oGBlUCAwIERAUCVVxWAwZQHlcCAVNJBlZSABxcA1EFFAcCBVIEVFFaAVIBCg HTTP 301
  • https://pmg-reg.onecount.net/mail/lt.php?tid=fBhWCAIAC1QICUxaBlMAFQcKAFQeCAYFBElTBwBUAVYABgQKAVFPAlQFV1tUVVEVCgQCUh4FUgQCSQpcVwMcUVJUV1oGBlUCAwIERAUCVVxWAwZQHlcCAVNJBlZSABxcA1EFFAcCBVIEVFFaAVIBCg HTTP 303
  • https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Request Chain 50
  • https://9438555.fls.doubleclick.net/activityi;src=9438555;type=invmedia;cat=secur0;ord=7652993079451;gtm=2od1k0;auiddc=1662957208.1612311304;~oref=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address HTTP 302
  • https://9438555.fls.doubleclick.net/activityi;dc_pre=CK-yrtS3zO4CFdXU7Qod-JILDQ;src=9438555;type=invmedia;cat=secur0;ord=7652993079451;gtm=2od1k0;auiddc=1662957208.1612311304;~oref=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Request Chain 57
  • https://dpm.demdex.net/ibs:dpid=22052&dpuuid=3616401254580224076&redir= HTTP 302
  • https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=3616401254580224076&redir=
Request Chain 58
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=d0tro1j&ttd_tpi=1 HTTP 302
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=d0tro1j&ttd_tpi=1 HTTP 302
  • https://ml314.com/utsync.ashx?eid=53819&et=0&fp=e58961f1-004c-4849-b8a0-b3f2ebe70751 HTTP 302
  • https://ml314.com/csync.ashx?fp=e58961f1-004c-4849-b8a0-b3f2ebe70751&person_id=3616401254580224076&eid=53819
Request Chain 59
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3616401254580224076 HTTP 302
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3616401254580224076 HTTP 302
  • https://ml314.com/csync.ashx?fp=231237948ee76b6ed3e7d409fd00a49b&eid=50146&person_id=3616401254580224076
Request Chain 116
  • https://9438555.fls.doubleclick.net/activityi;src=9438555;type=invmedia;cat=secur0;ord=2276874585322;gtm=2od1k0;auiddc=1662957208.1612311304;~oref=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address HTTP 302
  • https://9438555.fls.doubleclick.net/activityi;dc_pre=CLHuidW3zO4CFVDC7QodcNsI4Q;src=9438555;type=invmedia;cat=secur0;ord=2276874585322;gtm=2od1k0;auiddc=1662957208.1612311304;~oref=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Request Chain 129
  • https://s.adroll.com/j/exp/A7FIIZA6YVEEXEIEL2B3ML/index.js HTTP 302
  • https://s.adroll.com/j/exp/index.js
Request Chain 131
  • https://d.adroll.mgr.consensu.org/consent/iabcheck/A7FIIZA6YVEEXEIEL2B3ML?_s=1b7015e4abec2c8415d5ccb38883e3ae&_b=2 HTTP 302
  • https://d.adroll.com/consent/check/A7FIIZA6YVEEXEIEL2B3ML/?_s=1b7015e4abec2c8415d5ccb38883e3ae&_b=2

134 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Cookie set 6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
www.securitytechbrief.com/index.php/news/item/
Redirect Chain
  • http://pmg-reg.onecount.net/mail/lt.php?tid=fBhWCAIAC1QICUxaBlMAFQcKAFQeCAYFBElTBwBUAVYABgQKAVFPAlQFV1tUVVEVCgQCUh4FUgQCSQpcVwMcUVJUV1oGBlUCAwIERAUCVVxWAwZQHlcCAVNJBlZSABxcA1EFFAcCBVIEVFFaAVIBCg
  • https://pmg-reg.onecount.net/mail/lt.php?tid=fBhWCAIAC1QICUxaBlMAFQcKAFQeCAYFBElTBwBUAVYABgQKAVFPAlQFV1tUVVEVCgQCUh4FUgQCSQpcVwMcUVJUV1oGBlUCAwIERAUCVVxWAwZQHlcCAVNJBlZSABxcA1EFFAcCBVIEVFFaAVIBCg
  • https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
88 KB
17 KB
Document
General
Full URL
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
f8349332194ce7474e8809c5ee5a5961bb6e79b138addb89ae5c3200b3b7ee43
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Host
www.securitytechbrief.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:02 GMT
Server
Apache
X-Logged-In
False
X-Content-Powered-By
K2 v2.10.3 (by JoomlaWorks)
P3P
CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Expires
Wed, 03 Feb 2021 00:30:02 GMT
Set-Cookie
9de4cd226fb11624e947853e78bc896f=153b083866952548dcb4f1aee23783b1; path=/; secure; HttpOnly sj_financial_tpl=sj_financial; expires=Mon, 24-Jan-2022 00:15:02 GMT; Max-Age=30672000; path=/
Last-Modified
Thu, 08 Oct 2020 15:22:46 GMT
ETag
7ba2e61e2dba17cde557542af84c5890
Vary
Accept-Encoding
Content-Encoding
gzip
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Cache-Control
public
Content-Length
16227
Content-Type
text/html; charset=utf-8
X-IPLB-Request-ID
52661272:35C2_5B868058:01BB_6019EB06_617E:136E
X-IPLB-Instance
5480

Redirect headers

Server
nginx
Date
Wed, 03 Feb 2021 00:15:02 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Set-Cookie
PHPSESSID=a1h12il1u6k1bfgb5ro0m0cr17; path=/ __ocgt=198736485306c30df365d941a99fa5fe1cfc9cd0046065c8ad27c9e7a178857a; expires=Mon, 03-Feb-2031 12:15:02 GMT; Max-Age=315576000; path=/; domain=onecount.net __ocid=1b322fefd27b188a540a9078aecb04dbea600661ffc939720766980106cb0b67; expires=Mon, 03-Feb-2031 12:15:02 GMT; Max-Age=315576000; path=/ __ocusername=tcwokdkj; expires=Mon, 03-Feb-2031 12:15:02 GMT; Max-Age=315576000; path=/ SERVERID=nj-felb-nj-web06-cl01; path=/
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
Location
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Strict-Transport-Security
max-age=16000000; includeSubDomains; preload;
magnific-popup.min.css
cdn.jsdelivr.net/npm/magnific-popup@1.1.0/dist/
5 KB
2 KB
Stylesheet
General
Full URL
https://cdn.jsdelivr.net/npm/magnific-popup@1.1.0/dist/magnific-popup.min.css
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:4e42:1b::621 , Ascension Island, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
306a201c52dfb7539967d0d1e015f379f0fd4e9b5cc8c0fa69b61dea193e94c5
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
age
6515347
x-cache
HIT, HIT
cross-origin-resource-policy
cross-origin
content-length
1814
etag
W/"15d0-l9cebZjEtdZbwVwNIEewoDsmxg4"
x-served-by
cache-fra19176-FRA, cache-hhn4046-HHN
date
Wed, 03 Feb 2021 00:15:03 GMT
vary
Accept-Encoding
content-type
text/css; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
*
cache-control
public, max-age=31536000, s-maxage=31536000, immutable
accept-ranges
bytes
timing-allow-origin
*
simple-line-icons.css
cdn.jsdelivr.net/npm/simple-line-icons@2.4.1/css/
13 KB
3 KB
Stylesheet
General
Full URL
https://cdn.jsdelivr.net/npm/simple-line-icons@2.4.1/css/simple-line-icons.css
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:4e42:1b::621 , Ascension Island, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
ab9f855e542893de23c7b7e4897eb91066c9dbbfeaa1b1fa73a826867833b4b1
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
age
6515349
x-cache
HIT, HIT
cross-origin-resource-policy
cross-origin
content-length
2717
etag
W/"329e-1wOJAagQuNE/7gtwvi6JZA3p41M"
x-served-by
cache-fra19157-FRA, cache-hhn4046-HHN
date
Wed, 03 Feb 2021 00:15:03 GMT
vary
Accept-Encoding
content-type
text/css; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
*
cache-control
public, max-age=31536000, s-maxage=31536000, immutable
accept-ranges
bytes
timing-allow-origin
*
bd59d427496a1830edb628e5614a090f.css
www.securitytechbrief.com/media/plg_jchoptimize/cache/css/
586 KB
83 KB
Stylesheet
General
Full URL
https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
84a6fdcd6f09a23096aa2e1d2f3243a8314a9fc8de833ef55896f90ef19701d8
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:03 GMT
Content-Encoding
gzip
Last-Modified
Tue, 02 Feb 2021 19:42:07 GMT
Server
Apache
X-IPLB-Request-ID
52661272:35CA_5B868058:01BB_6019EB06_9D46:1A00B
X-IPLB-Instance
5481
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=31536000, public
Transfer-Encoding
chunked
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Accept-Ranges
bytes
Expires
Thu, 03 Feb 2022 00:15:03 GMT
a38fc0aa2a213b1211b4444d6e79c969.js
www.securitytechbrief.com/media/plg_jchoptimize/cache/js/
105 KB
37 KB
Script
General
Full URL
https://www.securitytechbrief.com/media/plg_jchoptimize/cache/js/a38fc0aa2a213b1211b4444d6e79c969.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2001:41d0:202:100:91:134:128:88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
8aa77b30af8b833c55ccf0d1acc75f5083f9a34627b8e9e58e13773c02bc95fe
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:03 GMT
Content-Encoding
gzip
Last-Modified
Tue, 02 Feb 2021 19:42:07 GMT
Server
Apache
X-IPLB-Request-ID
00000000:976C_00000000:01BB_6019EB07_617F:136E
X-IPLB-Instance
5480
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Accept-Ranges
bytes
Content-Length
37675
Expires
Thu, 03 Feb 2022 00:15:03 GMT
jquery.magnific-popup.min.js
cdn.jsdelivr.net/npm/magnific-popup@1.1.0/dist/
20 KB
7 KB
Script
General
Full URL
https://cdn.jsdelivr.net/npm/magnific-popup@1.1.0/dist/jquery.magnific-popup.min.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:4e42:1b::621 , Ascension Island, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
3fddc6d28aba3c13d64cfd4847c333ff48c71d4a5a58bd1a0494ca6ae8ac1bb4
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
age
4750992
x-cache
HIT, HIT
cross-origin-resource-policy
cross-origin
content-length
7348
etag
W/"4ef8-9FXF8VP4cuUiZfh6ZE/4n+FKb7Y"
x-served-by
cache-fra19136-FRA, cache-hhn4046-HHN
date
Wed, 03 Feb 2021 00:15:03 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
*
cache-control
public, max-age=31536000, s-maxage=31536000, immutable
accept-ranges
bytes
timing-allow-origin
*
06d92afca087dbacb2a3a5cde5755635.js
www.securitytechbrief.com/media/plg_jchoptimize/cache/js/
196 KB
60 KB
Script
General
Full URL
https://www.securitytechbrief.com/media/plg_jchoptimize/cache/js/06d92afca087dbacb2a3a5cde5755635.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2001:41d0:202:100:91:134:128:88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
f81fc59f0a49995f3bd6c2679319efa85f924f02f15cc4139096017a436fde10
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:03 GMT
Content-Encoding
gzip
Last-Modified
Tue, 02 Feb 2021 19:42:07 GMT
Server
Apache
X-IPLB-Request-ID
00000000:976A_00000000:01BB_6019EB07_8813:136F
X-IPLB-Instance
5480
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Transfer-Encoding
chunked
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Accept-Ranges
bytes
Expires
Thu, 03 Feb 2022 00:15:03 GMT
all.min.js
validate.onecount.net/js/
58 KB
20 KB
Script
General
Full URL
https://validate.onecount.net/js/all.min.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.81.88.251 , United States, ASN10493 (GCN-AS, US),
Reverse DNS
ocvalidate.onecount.net
Software
nginx /
Resource Hash
a29e74f6beff8e7d58640ad7ec7d8ed1332665f263ddf796fa12e40d68b65d3f

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:03 GMT
Content-Encoding
gzip
Last-Modified
Wed, 29 Jul 2020 19:49:19 GMT
Server
nginx
ETag
W/"5f21d2bf-e778"
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
max-age=86400, public, private
Transfer-Encoding
chunked
Expires
Thu, 04 Feb 2021 00:15:03 GMT
gpt.js
www.googletagservices.com/tag/js/
56 KB
19 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:827::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
00e18674d02b3173004c5bcb3f455cead0b35afa1676dfa332b1648da2305936
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 03 Feb 2021 00:15:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"772 / 20 of 1000 / last-modified: 1612307399"
vary
Accept-Encoding
content-type
text/javascript
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
19167
x-xss-protection
0
expires
Wed, 03 Feb 2021 00:15:03 GMT
js
www.googletagmanager.com/gtag/
97 KB
38 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=UA-3578655-16
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
46de2efbeb52f48e750217bbd48c62417a455adb832fa944b2199ecf0f92e747
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 03 Feb 2021 00:15:03 GMT
content-encoding
br
vary
Accept-Encoding
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
38879
x-xss-protection
0
last-modified
Wed, 03 Feb 2021 00:00:00 GMT
server
Google Tag Manager
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Wed, 03 Feb 2021 00:15:03 GMT
js
www.googletagmanager.com/gtag/
97 KB
38 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=DC-9438555
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
5ba2fe76190526aedfaa66f6deae632bef8c87d156781eeb8eda710142b69e84
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 03 Feb 2021 00:15:03 GMT
content-encoding
br
vary
Accept-Encoding
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
38843
x-xss-protection
0
last-modified
Wed, 03 Feb 2021 00:00:00 GMT
server
Google Tag Manager
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Wed, 03 Feb 2021 00:15:03 GMT
securitylogo.png
www.securitytechbrief.com/images/
13 KB
14 KB
Image
General
Full URL
https://www.securitytechbrief.com/images/securitylogo.png
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
b529220b65aa111c486f6a940eb8ea236364f5310e6137930d3b3a0dd196f38d
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:03 GMT
Last-Modified
Mon, 16 Dec 2019 14:56:53 GMT
Server
Apache
X-IPLB-Request-ID
52661272:35CA_5B868058:01BB_6019EB07_9D49:1A00B
X-IPLB-Instance
5481
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/png
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
13547
Expires
Thu, 03 Feb 2022 00:15:03 GMT
user.png
www.securitytechbrief.com/components/com_k2/images/placeholder/
1 KB
2 KB
Image
General
Full URL
https://www.securitytechbrief.com/components/com_k2/images/placeholder/user.png
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2001:41d0:202:100:91:134:128:88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
2bb6126b7489e72f954d2fb51907352e7176a42b2c1fb2633bbdb3296ccbec57
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:03 GMT
Last-Modified
Sun, 25 Oct 2020 08:59:58 GMT
Server
Apache
X-IPLB-Request-ID
00000000:976C_00000000:01BB_6019EB07_6183:136E
X-IPLB-Instance
5480
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/png
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
1485
Expires
Thu, 03 Feb 2022 00:15:03 GMT
facebook-2429746_640_small.png
www.securitytechbrief.com/images/
17 KB
18 KB
Image
General
Full URL
https://www.securitytechbrief.com/images/facebook-2429746_640_small.png
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:03 GMT
Last-Modified
Mon, 16 Mar 2020 21:53:25 GMT
Server
Apache
X-IPLB-Request-ID
52661272:35C2_5B868058:01BB_6019EB07_6180:136E
X-IPLB-Instance
5480
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/png
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
17497
Expires
Thu, 03 Feb 2022 00:15:03 GMT
gdpr-3385166_1280.jpg
www.securitytechbrief.com/images/
0
0

194df8014cc7359d17897937cd25ec68_S.jpg
www.securitytechbrief.com/media/k2/items/cache/
0
0

81072d2cb1d54b402a67e95e5f91e400_S.jpg
www.securitytechbrief.com/media/k2/items/cache/
0
0

Security_-_Data_Breach_-_cyber-security-1784985_1280.png
www.securitytechbrief.com/images/
0
0

default.jpg
www.securitytechbrief.com/images/
0
0

Security_-_data_breach_-_keyboard-895556_1920.jpg
www.securitytechbrief.com/images/
0
0

boston-2444581_640_small.jpg
www.securitytechbrief.com/images/
0
0

ballet-4941738_640.jpg
www.securitytechbrief.com/images/
0
0

1740.jpg
www.securitytechbrief.com/media/k2/users/
0
0

ea2933593da3839fd3a2bc981af3ac07_S.jpg
www.securitytechbrief.com/media/k2/items/cache/
0
0

a5e4371aebbddf39a80fe2be248b4e5b_S.jpg
www.securitytechbrief.com/media/k2/items/cache/
0
0

0642d6eea96084de83e0904cabc835aa_XS.jpg
www.securitytechbrief.com/media/k2/items/cache/
0
0

Grindr.png
www.securitytechbrief.com/images/
0
0

widgets.js
platform.twitter.com/
95 KB
29 KB
Script
General
Full URL
https://platform.twitter.com/widgets.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (amb/6BBE) /
Resource Hash
2b418a10ba4680c77fa07fb0e736eec6306cba0dbbbc8deac94a25e679178e15

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:03 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Age
1377
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Content-Length
28698
x-tw-cdn
VZ
Last-Modified
Thu, 01 Oct 2020 21:52:09 GMT
Server
ECS (amb/6BBE)
Etag
"a671d4d584ef50954e5cebb21da17065+gzip"
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=1800
sdk.js
connect.facebook.net/en_GB/
3 KB
2 KB
Script
General
Full URL
https://connect.facebook.net/en_GB/sdk.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
054141e17ffe11178af9b71987ccce8cf03b9169764acc77525d3f21f4e0d505
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

Origin
https://www.securitytechbrief.com
Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
wyD+nKsr4JkbDq8i29AuKA==
cross-origin-resource-policy
cross-origin
expires
Wed, 03 Feb 2021 00:32:09 GMT
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
1780
x-fb-rlafr
0
x-fb-debug
/yeOWBufPKe3zf2wJf1X+3QAq7Q01jBYMx0CpmXUo0un1h+ANO+KEdJ7U3jxVxSBx/ZUSP+qshJBZj7fdDWY2A==
x-fb-trip-id
686109401
x-fb-content-md5
590ef74db1d3c798f4a22775694c3e77
cross-origin-embedder-policy-report-only
require-corp;report-to="coep_report"
date
Wed, 03 Feb 2021 00:15:03 GMT
x-frame-options
DENY
report-to
{"group":"coep_report","max_age":86400,"endpoints":[{"url":"https:\/\/www.facebook.com\/browser_reporting\/"}]}
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public,max-age=1200,stale-while-revalidate=3600
etag
"7b7ee3c7a10f4e98cb367cfd22449dcd"
timing-allow-origin
*
access-control-expose-headers
X-FB-Content-MD5
in.js
platform.linkedin.com/
181 KB
55 KB
Script
General
Full URL
https://platform.linkedin.com/in.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:66b5:799a:7cd3:f74d:7071 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (frc/8F0A) /
Resource Hash
c3558e93c65af9eb38a7471492d3eecb8c253d9796919f96ca12c7214d7cb494

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 03 Feb 2021 00:15:03 GMT
content-encoding
gzip
x-cdn-client-ip-version
IPV6
x-cdn
ECST
age
3584
x-cache
HIT
x-cdn-proto
HTTP2
content-length
55605
x-li-uuid
ohh1FFQRYBawFYoT/SoAAA==
server
ECAcc (frc/8F0A)
last-modified
Tue, 02 Feb 2021 23:15:19 GMT
x-li-pop
prod-eda6
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=3600
accept-ranges
bytes
x-li-proto
http/1.1
x-li-fabric
prod-ltx1
expires
Wed, 3 Feb 2021 00:15:19 GMT
2.jpeg
www.securitytechbrief.com/images/
0
0

1.jpeg
www.securitytechbrief.com/images/
0
0

v_sb.js
validate.onecount.net/js/
4 KB
2 KB
Script
General
Full URL
https://validate.onecount.net/js/v_sb.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.81.88.251 , United States, ASN10493 (GCN-AS, US),
Reverse DNS
ocvalidate.onecount.net
Software
nginx /
Resource Hash
9b45d583a798c02009befc5dc12f3968ba3e0fd1a61e8fc08a8efb33b278d28c

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:03 GMT
Content-Encoding
gzip
Last-Modified
Wed, 25 Jan 2017 22:17:02 GMT
Server
nginx
ETag
W/"588923de-e67"
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
max-age=86400, public, private
Transfer-Encoding
chunked
Expires
Thu, 04 Feb 2021 00:15:03 GMT
fs.js
pmg-validate.onecount.net/clients/PMG/js/
0
0

cr.min.js
validate.onecount.net/js/
7 KB
3 KB
Script
General
Full URL
https://validate.onecount.net/js/cr.min.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.81.88.251 , United States, ASN10493 (GCN-AS, US),
Reverse DNS
ocvalidate.onecount.net
Software
nginx /
Resource Hash
69047bfc2e40089f08a6a2e50749a5e45177b8cb338be05b1345326d3b2b315e

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:03 GMT
Content-Encoding
gzip
Last-Modified
Wed, 05 Feb 2020 21:00:39 GMT
Server
nginx
ETag
W/"5e3b2cf7-1a2a"
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
max-age=86400, public, private
Transfer-Encoding
chunked
Expires
Thu, 04 Feb 2021 00:15:03 GMT
index.php
validate.onecount.net/onecount/api/public/
721 B
951 B
Script
General
Full URL
https://validate.onecount.net/onecount/api/public/index.php?__cuuid=b3de2f5a4557f2c4b119238e634e2b377989ed29&host=www.securitytechbrief.com&user_agent=Mozilla/5.0%20(Macintosh;%20Intel%20Mac%20OS%20X%2010_14_5)%20AppleWebKit/537.36%20(KHTML,%20like%20Gecko)%20Chrome/83.0.4103.61%20Safari/537.36&cookie=sj_financial_tpl%3Dsj_financial&sid=&js=1&url=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address&referrer=
Requested by
Host: validate.onecount.net
URL: https://validate.onecount.net/js/all.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.81.88.251 , United States, ASN10493 (GCN-AS, US),
Reverse DNS
ocvalidate.onecount.net
Software
nginx /
Resource Hash
5c47f7857a4e9c87cd38ebdaba5b43656906fa2144f3b7d41b9f7083075b70d9

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 03 Feb 2021 00:15:04 GMT
Content-Encoding
gzip
Server
nginx
Vary
Accept-Encoding
Access-Control-Allow-Methods
*
Content-Type
application/json
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Transfer-Encoding
chunked
Access-Control-Allow-Orgin
*
Expires
Thu, 19 Nov 1981 08:52:00 GMT
index.php
validate.onecount.net/js/custom/
63 B
369 B
Script
General
Full URL
https://validate.onecount.net/js/custom/index.php?__cuuid=b3de2f5a4557f2c4b119238e634e2b377989ed29&host=www.securitytechbrief.com
Requested by
Host: validate.onecount.net
URL: https://validate.onecount.net/js/all.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.81.88.251 , United States, ASN10493 (GCN-AS, US),
Reverse DNS
ocvalidate.onecount.net
Software
nginx /
Resource Hash
ca6df3f7d8e9eb10162498d76018b96bcbe808b30aa67e04fcae8e4db501392d

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:03 GMT
Content-Encoding
gzip
Transfer-Encoding
chunked
Server
nginx
Cache-control
private
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
tag.aspx
ml314.com/
26 KB
12 KB
Script
General
Full URL
https://ml314.com/tag.aspx?312021
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.18.215.87 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-18-215-87.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
7d655e8cd62ba58d86b3bc9c8e1e04a76506a4dfc852c3b3813deb0aef284548

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:03 GMT
Content-Encoding
gzip
Last-Modified
Tue, 02 Feb 2021 13:10:00 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, max-age=46496
Connection
keep-alive
Content-Length
11933
Expires
Wed, 03 Feb 2021 13:10:00 GMT
ga.js
ssl.google-analytics.com/
45 KB
17 KB
Script
General
Full URL
https://ssl.google-analytics.com/ga.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
1259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 23 Oct 2020 03:00:57 GMT
server
Golfe2
age
4903
date
Tue, 02 Feb 2021 22:53:20 GMT
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=7200
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
17168
expires
Wed, 03 Feb 2021 00:53:20 GMT
a.php
validate.onecount.net/onecount/automation/
2 B
522 B
Script
General
Full URL
https://validate.onecount.net/onecount/automation/a.php?__cuuid=b3de2f5a4557f2c4b119238e634e2b377989ed29&ocid=&tid=&domain=www.securitytechbrief.com&section=/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Requested by
Host: validate.onecount.net
URL: https://validate.onecount.net/js/all.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.81.88.251 , United States, ASN10493 (GCN-AS, US),
Reverse DNS
ocvalidate.onecount.net
Software
nginx /
Resource Hash
4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

Pragma
no-cache
Date
Wed, 03 Feb 2021 00:15:03 GMT
Content-Encoding
gzip
Server
nginx
Vary
Accept-Encoding
Access-Control-Allow-Methods
*
Content-Type
application/json
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Transfer-Encoding
chunked
Access-Control-Allow-Orgin
*
Expires
Thu, 19 Nov 1981 08:52:00 GMT
segoeui.woff
www.securitytechbrief.com/templates/sj_financial/asset/fonts/segoeui/
240 KB
238 KB
Font
General
Full URL
https://www.securitytechbrief.com/templates/sj_financial/asset/fonts/segoeui/segoeui.woff
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2001:41d0:202:100:91:134:128:88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Origin
https://www.securitytechbrief.com
Referer
https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:03 GMT
Content-Encoding
gzip
Last-Modified
Tue, 09 Oct 2018 12:13:49 GMT
Server
Apache
X-IPLB-Request-ID
00000000:976A_00000000:01BB_6019EB07_8814:136F
X-IPLB-Instance
5480
Vary
Accept-Encoding
Content-Type
font/woff
Cache-Control
max-age=31536000, public
Transfer-Encoding
chunked
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Accept-Ranges
bytes
Expires
Thu, 03 Feb 2022 00:15:03 GMT
fontawesome-webfont.woff
www.securitytechbrief.com/templates/sj_financial/asset/fonts/awesome/
43 KB
43 KB
Font
General
Full URL
https://www.securitytechbrief.com/templates/sj_financial/asset/fonts/awesome/fontawesome-webfont.woff?v=3.2.1
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2001:41d0:202:100:91:134:128:88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Origin
https://www.securitytechbrief.com
Referer
https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:04 GMT
Content-Encoding
gzip
Last-Modified
Tue, 09 Oct 2018 12:13:49 GMT
Server
Apache
X-IPLB-Request-ID
00000000:976C_00000000:01BB_6019EB07_6184:136E
X-IPLB-Instance
5480
Vary
Accept-Encoding
Content-Type
font/woff
Cache-Control
max-age=31536000, public
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Accept-Ranges
bytes
Content-Length
43568
Expires
Thu, 03 Feb 2022 00:15:04 GMT
seguisb.woff
www.securitytechbrief.com/templates/sj_financial/asset/fonts/segoeui/
189 KB
187 KB
Font
General
Full URL
https://www.securitytechbrief.com/templates/sj_financial/asset/fonts/segoeui/seguisb.woff
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Origin
https://www.securitytechbrief.com
Referer
https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:04 GMT
Content-Encoding
gzip
Last-Modified
Tue, 09 Oct 2018 12:13:49 GMT
Server
Apache
X-IPLB-Request-ID
52661272:35CA_5B868058:01BB_6019EB08_9D4A:1A00B
X-IPLB-Instance
5481
Vary
Accept-Encoding
Content-Type
font/woff
Cache-Control
max-age=31536000, public
Transfer-Encoding
chunked
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Accept-Ranges
bytes
Expires
Thu, 03 Feb 2022 00:15:04 GMT
breadcrumb_separate.png
www.securitytechbrief.com/templates/sj_financial/images/
1 KB
2 KB
Image
General
Full URL
https://www.securitytechbrief.com/templates/sj_financial/images/breadcrumb_separate.png
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2001:41d0:202:100:91:134:128:88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:04 GMT
Last-Modified
Tue, 09 Oct 2018 12:13:49 GMT
Server
Apache
X-IPLB-Request-ID
00000000:976A_00000000:01BB_6019EB08_8815:136F
X-IPLB-Instance
5480
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/png
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
1119
Expires
Thu, 03 Feb 2022 00:15:04 GMT
star.png
www.securitytechbrief.com/templates/sj_financial/images/system/
0
0

Simple-Line-Icons.woff2
cdn.jsdelivr.net/npm/simple-line-icons@2.4.1/fonts/
29 KB
30 KB
Font
General
Full URL
https://cdn.jsdelivr.net/npm/simple-line-icons@2.4.1/fonts/Simple-Line-Icons.woff2?v=2.4.0
Requested by
Host: cdn.jsdelivr.net
URL: https://cdn.jsdelivr.net/npm/simple-line-icons@2.4.1/css/simple-line-icons.css
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:4e42:1b::621 , Ascension Island, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
104673f4859604362a18fc6294197d8fffb8cb24ad3211e92eb04f655e18cf4a
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Origin
https://www.securitytechbrief.com
Referer
https://cdn.jsdelivr.net/npm/simple-line-icons@2.4.1/css/simple-line-icons.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
age
6515346
x-cache
HIT, HIT
cross-origin-resource-policy
cross-origin
content-length
30064
etag
W/"7570-XaYDEE1NbjYoJOyefbMustYXlJo"
x-served-by
cache-fra19148-FRA, cache-hhn4066-HHN
date
Wed, 03 Feb 2021 00:15:03 GMT
vary
Accept-Encoding
content-type
font/woff2
access-control-allow-origin
*
access-control-expose-headers
*
cache-control
public, max-age=31536000, s-maxage=31536000, immutable
accept-ranges
bytes
timing-allow-origin
*
Rage_Italic.ttf
www.securitytechbrief.com/templates/sj_financial/css/fonts/
122 KB
81 KB
Font
General
Full URL
https://www.securitytechbrief.com/templates/sj_financial/css/fonts/Rage_Italic.ttf
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Origin
https://www.securitytechbrief.com
Referer
https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:04 GMT
Content-Encoding
gzip
Last-Modified
Tue, 09 Oct 2018 12:13:49 GMT
Server
Apache
X-IPLB-Request-ID
52661272:35C2_5B868058:01BB_6019EB08_6185:136E
X-IPLB-Instance
5480
Vary
Accept-Encoding
Content-Type
font/ttf
Cache-Control
max-age=31536000, public
Transfer-Encoding
chunked
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Accept-Ranges
bytes
Expires
Thu, 03 Feb 2022 00:15:04 GMT
fontawesome-webfont.woff
www.securitytechbrief.com/plugins/system/ytshortcodes/assets/font/
42 KB
0
Font
General
Full URL
https://www.securitytechbrief.com/plugins/system/ytshortcodes/assets/font/fontawesome-webfont.woff
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Origin
https://www.securitytechbrief.com
Referer
https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:04 GMT
Content-Encoding
gzip
Last-Modified
Tue, 09 Oct 2018 12:13:53 GMT
Server
Apache
X-IPLB-Request-ID
52661272:3618_5B868058:01BB_6019EB08_4CAB:136D
X-IPLB-Instance
5480
Vary
Accept-Encoding
Content-Type
font/woff
Cache-Control
max-age=31536000, public
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Accept-Ranges
bytes
Content-Length
44427
Expires
Thu, 03 Feb 2022 00:15:04 GMT
js
www.googletagmanager.com/gtag/
97 KB
38 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=UA-3578655-16&l=dataLayer&cx=c
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=DC-9438555
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:824::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
499942925f7dcb402b550264cbbd88d04c45451bbf58bb5e70d642dd23064aab
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 03 Feb 2021 00:15:03 GMT
content-encoding
br
vary
Accept-Encoding
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
38888
x-xss-protection
0
last-modified
Wed, 03 Feb 2021 00:00:00 GMT
server
Google Tag Manager
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Wed, 03 Feb 2021 00:15:03 GMT
analytics.js
www.google-analytics.com/
46 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=UA-3578655-16
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
e441c3e2771625ba05630ab464275136a82c99650ee2145ca5aa9853bedeb01b
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 23 Oct 2020 03:00:57 GMT
server
Golfe2
age
3660
date
Tue, 02 Feb 2021 23:14:03 GMT
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=7200
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18817
expires
Wed, 03 Feb 2021 01:14:03 GMT
activityi;dc_pre=CK-yrtS3zO4CFdXU7Qod-JILDQ;src=9438555;type=invmedia;cat=secur0;ord=7652993079451;gtm=2od1k0;auiddc=1662957208.1612311304;~oref=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%...
9438555.fls.doubleclick.net/ Frame 18CA
Redirect Chain
  • https://9438555.fls.doubleclick.net/activityi;src=9438555;type=invmedia;cat=secur0;ord=7652993079451;gtm=2od1k0;auiddc=1662957208.1612311304;~oref=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.ph...
  • https://9438555.fls.doubleclick.net/activityi;dc_pre=CK-yrtS3zO4CFdXU7Qod-JILDQ;src=9438555;type=invmedia;cat=secur0;ord=7652993079451;gtm=2od1k0;auiddc=1662957208.1612311304;~oref=https%3A%2F%2Fww...
0
0
Document
General
Full URL
https://9438555.fls.doubleclick.net/activityi;dc_pre=CK-yrtS3zO4CFdXU7Qod-JILDQ;src=9438555;type=invmedia;cat=secur0;ord=7652993079451;gtm=2od1k0;auiddc=1662957208.1612311304;~oref=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address?
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=DC-9438555
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
216.58.212.166 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
ams15s22-in-f6.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=21600
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
9438555.fls.doubleclick.net
:scheme
https
:path
/activityi;dc_pre=CK-yrtS3zO4CFdXU7Qod-JILDQ;src=9438555;type=invmedia;cat=secur0;ord=7652993079451;gtm=2od1k0;auiddc=1662957208.1612311304;~oref=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address?
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
about:blank

Response headers

p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
date
Wed, 03 Feb 2021 00:15:04 GMT
expires
Fri, 01 Jan 1990 00:00:00 GMT
cache-control
no-cache, must-revalidate
strict-transport-security
max-age=21600
content-type
text/html; charset=UTF-8
pragma
no-cache
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
449
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Wed, 03-Feb-2021 00:30:04 GMT; path=/; domain=.doubleclick.net; Secure; HttpOnly; SameSite=none
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"

Redirect headers

p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
date
Wed, 03 Feb 2021 00:15:04 GMT
pragma
no-cache
expires
Fri, 01 Jan 1990 00:00:00 GMT
cache-control
no-cache, must-revalidate
follow-only-when-prerender-shown
1
strict-transport-security
max-age=21600
location
https://9438555.fls.doubleclick.net/activityi;dc_pre=CK-yrtS3zO4CFdXU7Qod-JILDQ;src=9438555;type=invmedia;cat=secur0;ord=7652993079451;gtm=2od1k0;auiddc=1662957208.1612311304;~oref=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address?
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
server
cafe
content-length
0
x-xss-protection
0
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
sdk.js
connect.facebook.net/en_GB/
197 KB
60 KB
Script
General
Full URL
https://connect.facebook.net/en_GB/sdk.js?hash=22273615bba0f99e09d0b6a0a4c7358e&ua=modern_es6
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_GB/sdk.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
4577a8980cff4fdd352ce556116a155c0c07079736109d84cb449a5c08b5983c
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

Origin
https://www.securitytechbrief.com
Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
8skKwUoVzWXDWeq+OJg+yw==
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
60632
x-fb-rlafr
0
x-fb-debug
LWVp3Efi8hj6jQqDl5WENbrsOBGS8G3mjEdn/bEeaGtt5wxCLIRCXSXKgO+yw1huFizgerOosamzWygGm9YOOQ==
x-fb-trip-id
686109401
x-fb-content-md5
60e94075a57859aa63cd190805ffa6ed
x-frame-options
DENY
date
Wed, 03 Feb 2021 00:15:03 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-FB-Content-MD5
cache-control
public,max-age=31536000,stale-while-revalidate=3600,immutable
etag
"7dd27b78aa6abcca05c40fd90889f31d"
timing-allow-origin
*
expires
Thu, 03 Feb 2022 00:00:46 GMT
pubads_impl_2021012801.js
securepubads.g.doubleclick.net/gpt/
275 KB
97 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021012801.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.34 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s24-in-f2.1e100.net
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 03 Feb 2021 00:15:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 28 Jan 2021 09:41:30 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
cache-control
private, immutable, max-age=31536000
cross-origin-resource-policy
cross-origin
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
99311
x-xss-protection
0
expires
Wed, 03 Feb 2021 00:15:04 GMT
__utm.gif
ssl.google-analytics.com/r/
35 B
378 B
Image
General
Full URL
https://ssl.google-analytics.com/r/__utm.gif?utmwv=5.7.2&utms=1&utmn=1279920004&utmhn=www.securitytechbrief.com&utmcs=UTF-8&utmsr=1600x1200&utmvp=1600x1200&utmsc=24-bit&utmul=en-us&utmje=0&utmfl=-&utmdt=Grindr%20Security%20Flaw%20Allowed%20Hacking%20with%20Just%20An%20Email%20Address%20-%20Security%20Tech%20Brief&utmhid=781833556&utmr=-&utmp=%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address&utmht=1612311303980&utmac=UA-1231231-1&utmcc=__utma%3D135802867.1492990387.1612311304.1612311304.1612311304.1%3B%2B__utmz%3D135802867.1612311304.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)%3B&utmjid=542332598&utmredir=1&utmu=qAAAAAAAAAAAAAAAAAAAAAAE~
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:821::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 03 Feb 2021 00:15:04 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
www.google-analytics.com/j/
1 B
394 B
XHR
General
Full URL
https://www.google-analytics.com/j/collect?v=1&_v=j87&a=781833556&t=pageview&_s=1&dl=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address&ul=en-us&de=UTF-8&dt=Grindr%20Security%20Flaw%20Allowed%20Hacking%20with%20Just%20An%20Email%20Address%20-%20Security%20Tech%20Brief&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_utma=135802867.1492990387.1612311304.1612311304.1612311304.1&_utmz=135802867.1612311304.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)&_utmht=1612311303997&_u=IQBCAUABAAAAAC~&jid=1700894379&gjid=407511044&cid=1492990387.1612311304&tid=UA-3578655-16&_gid=1989420094.1612311304&_r=1&gtm=2ou1k0&z=1212132873
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:825::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Wed, 03 Feb 2021 00:15:04 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
content-type
text/plain
access-control-allow-origin
https://www.securitytechbrief.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1
expires
Fri, 01 Jan 1990 00:00:00 GMT
utsync.ashx
ml314.com/
535 B
1 KB
Script
General
Full URL
https://ml314.com/utsync.ashx?pub=&adv=&et=0&eid=65259&ct=js&pi=3616401254580224076&fp=&clid=&if=0&ps=&cl=&mlt=&data=&&cp=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address&pv=1612311304035_gcyfd0kd0&bl=en-us&cb=7413403&return=&ht=&d=&dc=&si=1612311304035_gcyfd0kd0&cid=&s=1600x1200&rp=
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?312021
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.18.215.87 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-18-215-87.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
13a8f71707fc488162365c82c9f4b5e268bd84a275bcec2693fb1afd71d97610

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 03 Feb 2021 00:15:03 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
p3P
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
Cache-Control
private
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Content-Length
437
Expires
0
ud.ashx
in.ml314.com/
0
0

demconf.jpg
dpm.demdex.net/
Redirect Chain
  • https://dpm.demdex.net/ibs:dpid=22052&dpuuid=3616401254580224076&redir=
  • https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=3616401254580224076&redir=
42 B
915 B
Image
General
Full URL
https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=3616401254580224076&redir=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.50.19.208 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-50-19-208.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

DCS
dcs-prod-irl1-v088-06d0ef20f.edge-irl1.demdex.com 5.80.5.20210120122710 0ms (+1ms)
Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Content-Type-Options
nosniff
X-TID
rQiO5geNTyI=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT

Redirect headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-TID
uxzhg5W1TJo=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Location
https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=3616401254580224076&redir=
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Length
0
Expires
Thu, 01 Jan 1970 00:00:00 GMT
csync.ashx
ml314.com/
Redirect Chain
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=d0tro1j&ttd_tpi=1
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=d0tro1j&ttd_tpi=1
  • https://ml314.com/utsync.ashx?eid=53819&et=0&fp=e58961f1-004c-4849-b8a0-b3f2ebe70751
  • https://ml314.com/csync.ashx?fp=e58961f1-004c-4849-b8a0-b3f2ebe70751&person_id=3616401254580224076&eid=53819
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=e58961f1-004c-4849-b8a0-b3f2ebe70751&person_id=3616401254580224076&eid=53819
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.18.215.87 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-18-215-87.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:03 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Wed, 03 Feb 2021 19:15:04 GMT

Redirect headers

Pragma
no-cache
Date
Wed, 03 Feb 2021 00:15:03 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
p3P
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
Location
https://ml314.com/csync.ashx?fp=e58961f1-004c-4849-b8a0-b3f2ebe70751&person_id=3616401254580224076&eid=53819
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
0,Wed, 03 Feb 2021 19:15:04 GMT
csync.ashx
ml314.com/
Redirect Chain
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3616401254580224076
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3616401254580224076
  • https://ml314.com/csync.ashx?fp=231237948ee76b6ed3e7d409fd00a49b&eid=50146&person_id=3616401254580224076
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=231237948ee76b6ed3e7d409fd00a49b&eid=50146&person_id=3616401254580224076
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.18.215.87 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-18-215-87.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:03 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Wed, 03 Feb 2021 19:15:04 GMT

Redirect headers

pragma
no-cache
date
Wed, 03 Feb 2021 00:15:04 GMT
p3p
CP=NOI DSP COR NID PSAa PSDa OUR UNI COM NAV
location
https://ml314.com/csync.ashx?fp=231237948ee76b6ed3e7d409fd00a49b&eid=50146&person_id=3616401254580224076
cache-control
no-cache
x-server
10.45.12.178
content-length
0
expires
0
pixel
ps.eyeota.net/
0
344 B
Image
General
Full URL
https://ps.eyeota.net/pixel?pid=r8hrb20&t=gif
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
3.121.27.153 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-121-27-153.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:04 GMT
Content-Length
0
P3P
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR SAMo BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR", policyref="http://ps.eyeota.net/w3c/p3p.xml"
Primary Request 6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
www.securitytechbrief.com/index.php/news/item/
Redirect Chain
  • http://pmg-reg.onecount.net/onecount/redirects/index.php?action=get-tokens&js=1&sid=&return=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hac...
  • https://pmg-reg.onecount.net/onecount/redirects/index.php?action=get-tokens&js=1&sid=&return=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-ha...
  • https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
88 KB
17 KB
Document
General
Full URL
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Requested by
Host: validate.onecount.net
URL: https://validate.onecount.net/js/all.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
f8349332194ce7474e8809c5ee5a5961bb6e79b138addb89ae5c3200b3b7ee43
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Host
www.securitytechbrief.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
9de4cd226fb11624e947853e78bc896f=153b083866952548dcb4f1aee23783b1; sj_financial_tpl=sj_financial; _gcna=0.0.1612311304.1; _gcnb=1612311304.1; _gcnz=; _gcl_au=1.1.1662957208.1612311304; __utma=135802867.1492990387.1612311304.1612311304.1612311304.1; __utmc=135802867; __utmz=135802867.1612311304.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmt=1; __utmb=135802867.1.10.1612311304; _ga=GA1.2.1492990387.1612311304; _gid=GA1.2.1989420094.1612311304; _gat_gtag_UA_3578655_16=1; oc-js-session=77c3rfqrb76ibgapr8l9o15qp1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address

Response headers

Date
Wed, 03 Feb 2021 00:15:04 GMT
Server
Apache
X-Logged-In
False, False
X-Content-Powered-By
K2 v2.10.3 (by JoomlaWorks), K2 v2.10.3 (by JoomlaWorks)
P3P
CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM", CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Expires
Wed, 03 Feb 2021 00:30:02 GMT
Cache-Control
no-cache public
Pragma
no-cache
Last-Modified
Thu, 08 Oct 2020 15:22:46 GMT
ETag
"4bf65e4cb47fcaddec023f67474ef72e-gzip"
Vary
Accept-Encoding
Content-Encoding
gzip
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Length
16227
Content-Type
text/html; charset=utf-8
X-IPLB-Request-ID
52661272:361A_5B868058:01BB_6019EB08_D56D:1A00C
X-IPLB-Instance
5481

Redirect headers

Server
nginx
Date
Wed, 03 Feb 2021 00:15:04 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Set-Cookie
PHPSESSID=77c3rfqrb76ibgapr8l9o15qp1; path=/
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
Location
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Strict-Transport-Security
max-age=16000000; includeSubDomains; preload;
fontawesome-webfont.ttf
www.securitytechbrief.com/plugins/system/ytshortcodes/assets/font/
0
0

magnific-popup.min.css
cdn.jsdelivr.net/npm/magnific-popup@1.1.0/dist/
5 KB
2 KB
Stylesheet
General
Full URL
https://cdn.jsdelivr.net/npm/magnific-popup@1.1.0/dist/magnific-popup.min.css
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:4e42:1b::621 , Ascension Island, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
306a201c52dfb7539967d0d1e015f379f0fd4e9b5cc8c0fa69b61dea193e94c5
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
age
6515348
x-cache
HIT, HIT
cross-origin-resource-policy
cross-origin
content-length
1814
etag
W/"15d0-l9cebZjEtdZbwVwNIEewoDsmxg4"
x-served-by
cache-fra19176-FRA, cache-hhn4046-HHN
date
Wed, 03 Feb 2021 00:15:04 GMT
vary
Accept-Encoding
content-type
text/css; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
*
cache-control
public, max-age=31536000, s-maxage=31536000, immutable
accept-ranges
bytes
timing-allow-origin
*
simple-line-icons.css
cdn.jsdelivr.net/npm/simple-line-icons@2.4.1/css/
13 KB
3 KB
Stylesheet
General
Full URL
https://cdn.jsdelivr.net/npm/simple-line-icons@2.4.1/css/simple-line-icons.css
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:4e42:1b::621 , Ascension Island, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
ab9f855e542893de23c7b7e4897eb91066c9dbbfeaa1b1fa73a826867833b4b1
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
age
6515350
x-cache
HIT, HIT
cross-origin-resource-policy
cross-origin
content-length
2717
etag
W/"329e-1wOJAagQuNE/7gtwvi6JZA3p41M"
x-served-by
cache-fra19157-FRA, cache-hhn4046-HHN
date
Wed, 03 Feb 2021 00:15:04 GMT
vary
Accept-Encoding
content-type
text/css; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
*
cache-control
public, max-age=31536000, s-maxage=31536000, immutable
accept-ranges
bytes
timing-allow-origin
*
bd59d427496a1830edb628e5614a090f.css
www.securitytechbrief.com/media/plg_jchoptimize/cache/css/
586 KB
83 KB
Stylesheet
General
Full URL
https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2001:41d0:202:100:91:134:128:88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
84a6fdcd6f09a23096aa2e1d2f3243a8314a9fc8de833ef55896f90ef19701d8
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:04 GMT
Content-Encoding
gzip
Last-Modified
Tue, 02 Feb 2021 19:42:07 GMT
Server
Apache
X-IPLB-Request-ID
00000000:97CC_00000000:01BB_6019EB08_4CAD:136D
X-IPLB-Instance
5480
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=31536000, public
Transfer-Encoding
chunked
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Accept-Ranges
bytes
Expires
Thu, 03 Feb 2022 00:15:04 GMT
a38fc0aa2a213b1211b4444d6e79c969.js
www.securitytechbrief.com/media/plg_jchoptimize/cache/js/
105 KB
37 KB
Script
General
Full URL
https://www.securitytechbrief.com/media/plg_jchoptimize/cache/js/a38fc0aa2a213b1211b4444d6e79c969.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
8aa77b30af8b833c55ccf0d1acc75f5083f9a34627b8e9e58e13773c02bc95fe
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:04 GMT
Content-Encoding
gzip
Last-Modified
Tue, 02 Feb 2021 19:42:07 GMT
Server
Apache
X-IPLB-Request-ID
52661272:361A_5B868058:01BB_6019EB08_D576:1A00C
X-IPLB-Instance
5481
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Accept-Ranges
bytes
Content-Length
37675
Expires
Thu, 03 Feb 2022 00:15:04 GMT
jquery.magnific-popup.min.js
cdn.jsdelivr.net/npm/magnific-popup@1.1.0/dist/
20 KB
7 KB
Script
General
Full URL
https://cdn.jsdelivr.net/npm/magnific-popup@1.1.0/dist/jquery.magnific-popup.min.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:4e42:1b::621 , Ascension Island, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
3fddc6d28aba3c13d64cfd4847c333ff48c71d4a5a58bd1a0494ca6ae8ac1bb4
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
age
4750994
x-cache
HIT, HIT
cross-origin-resource-policy
cross-origin
content-length
7348
etag
W/"4ef8-9FXF8VP4cuUiZfh6ZE/4n+FKb7Y"
x-served-by
cache-fra19136-FRA, cache-hhn4046-HHN
date
Wed, 03 Feb 2021 00:15:04 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
*
cache-control
public, max-age=31536000, s-maxage=31536000, immutable
accept-ranges
bytes
timing-allow-origin
*
06d92afca087dbacb2a3a5cde5755635.js
www.securitytechbrief.com/media/plg_jchoptimize/cache/js/
196 KB
60 KB
Script
General
Full URL
https://www.securitytechbrief.com/media/plg_jchoptimize/cache/js/06d92afca087dbacb2a3a5cde5755635.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
f81fc59f0a49995f3bd6c2679319efa85f924f02f15cc4139096017a436fde10
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:05 GMT
Content-Encoding
gzip
Last-Modified
Tue, 02 Feb 2021 19:42:07 GMT
Server
Apache
X-IPLB-Request-ID
52661272:361A_5B868058:01BB_6019EB08_D578:1A00C
X-IPLB-Instance
5481
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Transfer-Encoding
chunked
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Accept-Ranges
bytes
Expires
Thu, 03 Feb 2022 00:15:05 GMT
all.min.js
validate.onecount.net/js/
58 KB
20 KB
Script
General
Full URL
https://validate.onecount.net/js/all.min.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.81.88.251 , United States, ASN10493 (GCN-AS, US),
Reverse DNS
ocvalidate.onecount.net
Software
nginx /
Resource Hash
a29e74f6beff8e7d58640ad7ec7d8ed1332665f263ddf796fa12e40d68b65d3f

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:04 GMT
Content-Encoding
gzip
Last-Modified
Wed, 29 Jul 2020 19:49:19 GMT
Server
nginx
ETag
W/"5f21d2bf-e778"
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
max-age=86400, public, private
Transfer-Encoding
chunked
Expires
Thu, 04 Feb 2021 00:15:04 GMT
gpt.js
www.googletagservices.com/tag/js/
56 KB
19 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
51e5bdacb1c90a8ecea973d5ba5fdaf72ef232b4d5874b5481354da7538d0a82
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 03 Feb 2021 00:15:05 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"772 / 666 of 1000 / last-modified: 1612307474"
vary
Accept-Encoding
content-type
text/javascript
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
19174
x-xss-protection
0
expires
Wed, 03 Feb 2021 00:15:05 GMT
js
www.googletagmanager.com/gtag/
97 KB
38 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=UA-3578655-16
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:824::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
05d3fd97e597cdba0de2b6f29ee35ff3ce86f10184fe1bfe0f7bb68c759f7e4b
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 03 Feb 2021 00:15:05 GMT
content-encoding
br
server
Google Tag Manager
access-control-allow-headers
Cache-Control
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
strict-transport-security
max-age=31536000; includeSubDomains
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
38887
x-xss-protection
0
expires
Wed, 03 Feb 2021 00:15:05 GMT
js
www.googletagmanager.com/gtag/
97 KB
38 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=DC-9438555
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:824::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
e13fe118455778c0dafef89ad3d4378ea38c18cfaa477ac6027423275f35566d
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 03 Feb 2021 00:15:05 GMT
content-encoding
br
server
Google Tag Manager
access-control-allow-headers
Cache-Control
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
strict-transport-security
max-age=31536000; includeSubDomains
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
38830
x-xss-protection
0
expires
Wed, 03 Feb 2021 00:15:05 GMT
securitylogo.png
www.securitytechbrief.com/images/
13 KB
14 KB
Image
General
Full URL
https://www.securitytechbrief.com/images/securitylogo.png
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
b529220b65aa111c486f6a940eb8ea236364f5310e6137930d3b3a0dd196f38d
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:05 GMT
Last-Modified
Mon, 16 Dec 2019 14:56:53 GMT
Server
Apache
X-IPLB-Request-ID
52661272:361A_5B868058:01BB_6019EB09_D57A:1A00C
X-IPLB-Instance
5481
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/png
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
13547
Expires
Thu, 03 Feb 2022 00:15:05 GMT
user.png
www.securitytechbrief.com/components/com_k2/images/placeholder/
1 KB
2 KB
Image
General
Full URL
https://www.securitytechbrief.com/components/com_k2/images/placeholder/user.png
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
2bb6126b7489e72f954d2fb51907352e7176a42b2c1fb2633bbdb3296ccbec57
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:05 GMT
Last-Modified
Sun, 25 Oct 2020 08:59:58 GMT
Server
Apache
X-IPLB-Request-ID
52661272:3634_5B868058:01BB_6019EB08_CC08:1370
X-IPLB-Instance
5480
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/png
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
1485
Expires
Thu, 03 Feb 2022 00:15:05 GMT
facebook-2429746_640_small.png
www.securitytechbrief.com/images/
17 KB
18 KB
Image
General
Full URL
https://www.securitytechbrief.com/images/facebook-2429746_640_small.png
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
2f6904230f8d058372c0d2e018d8d5572f296dca11890f8577c17d7f13140b4c
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:05 GMT
Last-Modified
Mon, 16 Mar 2020 21:53:25 GMT
Server
Apache
X-IPLB-Request-ID
52661272:3632_5B868058:01BB_6019EB08_618F:136E
X-IPLB-Instance
5480
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/png
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
17497
Expires
Thu, 03 Feb 2022 00:15:05 GMT
gdpr-3385166_1280.jpg
www.securitytechbrief.com/images/
167 KB
167 KB
Image
General
Full URL
https://www.securitytechbrief.com/images/gdpr-3385166_1280.jpg
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
cd991fe424cc588b38ff6330b07ffb56dbc873a98a288ee997003ea842402426
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:05 GMT
Last-Modified
Sat, 02 Jan 2021 22:01:29 GMT
Server
Apache
X-IPLB-Request-ID
52661272:3636_5B868058:01BB_6019EB08_4CAF:136D
X-IPLB-Instance
5480
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/jpeg
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
170853
Expires
Thu, 03 Feb 2022 00:15:05 GMT
194df8014cc7359d17897937cd25ec68_S.jpg
www.securitytechbrief.com/media/k2/items/cache/
37 KB
38 KB
Image
General
Full URL
https://www.securitytechbrief.com/media/k2/items/cache/194df8014cc7359d17897937cd25ec68_S.jpg
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
45a33f766bafc9235550594a0754d35d4e6fdcad7479194bce9ccd958113639a
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:05 GMT
Last-Modified
Sat, 01 Jun 2019 05:04:54 GMT
Server
Apache
X-IPLB-Request-ID
52661272:3630_5B868058:01BB_6019EB08_6319:1A009
X-IPLB-Instance
5481
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/jpeg
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
37985
Expires
Thu, 03 Feb 2022 00:15:05 GMT
81072d2cb1d54b402a67e95e5f91e400_S.jpg
www.securitytechbrief.com/media/k2/items/cache/
28 KB
29 KB
Image
General
Full URL
https://www.securitytechbrief.com/media/k2/items/cache/81072d2cb1d54b402a67e95e5f91e400_S.jpg
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
c9de22071e2010403d2af6b5b9544d37789832e3f5d98c7099784dcd150987bd
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:06 GMT
Last-Modified
Mon, 27 May 2019 00:39:21 GMT
Server
Apache
X-IPLB-Request-ID
52661272:361A_5B868058:01BB_6019EB0A_D57F:1A00C
X-IPLB-Instance
5481
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/jpeg
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
29063
Expires
Thu, 03 Feb 2022 00:15:06 GMT
Security_-_Data_Breach_-_cyber-security-1784985_1280.png
www.securitytechbrief.com/images/
284 KB
284 KB
Image
General
Full URL
https://www.securitytechbrief.com/images/Security_-_Data_Breach_-_cyber-security-1784985_1280.png
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2001:41d0:202:100:91:134:128:88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
8d10739e1eb065a193296ab6574a5d00f37f6e179e150c5cd9ad425c40a0272b
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:06 GMT
Last-Modified
Thu, 30 Jan 2020 15:51:27 GMT
Server
Apache
X-IPLB-Request-ID
00000000:97CC_00000000:01BB_6019EB0A_4CB2:136D
X-IPLB-Instance
5480
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/png
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
290809
Expires
Thu, 03 Feb 2022 00:15:06 GMT
default.jpg
www.securitytechbrief.com/images/
20 KB
20 KB
Image
General
Full URL
https://www.securitytechbrief.com/images/default.jpg
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
02e63e46981863392e67598cbf76d86e9c731644c6ee1b1a5b971547e98d4909
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:06 GMT
Last-Modified
Mon, 30 Dec 2019 10:17:02 GMT
Server
Apache
X-IPLB-Request-ID
52661272:361A_5B868058:01BB_6019EB0A_D57E:1A00C
X-IPLB-Instance
5481
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/jpeg
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
20251
Expires
Thu, 03 Feb 2022 00:15:06 GMT
Security_-_data_breach_-_keyboard-895556_1920.jpg
www.securitytechbrief.com/images/
244 KB
245 KB
Image
General
Full URL
https://www.securitytechbrief.com/images/Security_-_data_breach_-_keyboard-895556_1920.jpg
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
7487ab4c8696e12ab103313de23580256601298333e4824f2154dbdaedf9cd6b
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:06 GMT
Last-Modified
Sat, 18 Apr 2020 20:13:00 GMT
Server
Apache
X-IPLB-Request-ID
52661272:3632_5B868058:01BB_6019EB0A_6194:136E
X-IPLB-Instance
5480
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/jpeg
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
249960
Expires
Thu, 03 Feb 2022 00:15:06 GMT
boston-2444581_640_small.jpg
www.securitytechbrief.com/images/
84 KB
85 KB
Image
General
Full URL
https://www.securitytechbrief.com/images/boston-2444581_640_small.jpg
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
d7e597065992eaa76ad1b4a0375bb7bf5292d10aa6bf10d3fdc69c4f9c8bf14f
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:06 GMT
Last-Modified
Sat, 18 Apr 2020 20:23:05 GMT
Server
Apache
X-IPLB-Request-ID
52661272:3630_5B868058:01BB_6019EB0A_631C:1A009
X-IPLB-Instance
5481
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/jpeg
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
86396
Expires
Thu, 03 Feb 2022 00:15:06 GMT
ballet-4941738_640.jpg
www.securitytechbrief.com/images/
29 KB
30 KB
Image
General
Full URL
https://www.securitytechbrief.com/images/ballet-4941738_640.jpg
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
086714ab62242d9ea1c328af93ec05a79b4903a33e0f9b70e995f59062160b91
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:06 GMT
Last-Modified
Wed, 14 Oct 2020 15:55:09 GMT
Server
Apache
X-IPLB-Request-ID
52661272:3636_5B868058:01BB_6019EB0A_4CB4:136D
X-IPLB-Instance
5480
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/jpeg
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
30061
Expires
Thu, 03 Feb 2022 00:15:06 GMT
1740.jpg
www.securitytechbrief.com/media/k2/users/
3 KB
4 KB
Image
General
Full URL
https://www.securitytechbrief.com/media/k2/users/1740.jpg
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
fe29395b33c5d4d95fe6b681a9bd06b509770d9776ce6883779b3403ec40cfab
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:06 GMT
Last-Modified
Tue, 09 Oct 2018 12:13:43 GMT
Server
Apache
X-IPLB-Request-ID
52661272:3634_5B868058:01BB_6019EB0A_CC0E:1370
X-IPLB-Instance
5480
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/jpeg
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
3581
Expires
Thu, 03 Feb 2022 00:15:06 GMT
ea2933593da3839fd3a2bc981af3ac07_S.jpg
www.securitytechbrief.com/media/k2/items/cache/
57 KB
57 KB
Image
General
Full URL
https://www.securitytechbrief.com/media/k2/items/cache/ea2933593da3839fd3a2bc981af3ac07_S.jpg
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
29d7576378de2f45935f833f581821b0e0b8ffbd72c69e38903299a2e6527c91
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:06 GMT
Last-Modified
Fri, 26 Oct 2018 12:22:53 GMT
Server
Apache
X-IPLB-Request-ID
52661272:361A_5B868058:01BB_6019EB0A_D580:1A00C
X-IPLB-Instance
5481
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/jpeg
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
57907
Expires
Thu, 03 Feb 2022 00:15:06 GMT
a5e4371aebbddf39a80fe2be248b4e5b_S.jpg
www.securitytechbrief.com/media/k2/items/cache/
33 KB
34 KB
Image
General
Full URL
https://www.securitytechbrief.com/media/k2/items/cache/a5e4371aebbddf39a80fe2be248b4e5b_S.jpg
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2001:41d0:202:100:91:134:128:88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
77fa58804fde9f6efee714e6a76e4e5edd2a6c9d8ba2b1b70d085e81ca9e4e48
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:07 GMT
Last-Modified
Fri, 26 Oct 2018 13:12:02 GMT
Server
Apache
X-IPLB-Request-ID
00000000:97CC_00000000:01BB_6019EB0A_4CB5:136D
X-IPLB-Instance
5480
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/jpeg
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
34218
Expires
Thu, 03 Feb 2022 00:15:07 GMT
0642d6eea96084de83e0904cabc835aa_XS.jpg
www.securitytechbrief.com/media/k2/items/cache/
7 KB
8 KB
Image
General
Full URL
https://www.securitytechbrief.com/media/k2/items/cache/0642d6eea96084de83e0904cabc835aa_XS.jpg
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
05554348910fca66d24fff193a91643a15ceaaee5485638c15573523a518739b
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:07 GMT
Last-Modified
Fri, 26 Oct 2018 18:01:43 GMT
Server
Apache
X-IPLB-Request-ID
52661272:3634_5B868058:01BB_6019EB0A_CC10:1370
X-IPLB-Instance
5480
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/jpeg
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
7360
Expires
Thu, 03 Feb 2022 00:15:07 GMT
Grindr.png
www.securitytechbrief.com/images/
6 KB
7 KB
Image
General
Full URL
https://www.securitytechbrief.com/images/Grindr.png
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
f8d33df8712de21bb3f6808b1d4ede4d246b6751c140d94d09e454861af05ef8
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:06 GMT
Last-Modified
Thu, 08 Oct 2020 15:31:59 GMT
Server
Apache
X-IPLB-Request-ID
52661272:3636_5B868058:01BB_6019EB09_4CB0:136D
X-IPLB-Instance
5480
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/png
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
6542
Expires
Thu, 03 Feb 2022 00:15:06 GMT
widgets.js
platform.twitter.com/
95 KB
29 KB
Script
General
Full URL
https://platform.twitter.com/widgets.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (amb/6BBE) /
Resource Hash
2b418a10ba4680c77fa07fb0e736eec6306cba0dbbbc8deac94a25e679178e15

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:05 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Age
1379
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Content-Length
28698
x-tw-cdn
VZ
Last-Modified
Thu, 01 Oct 2020 21:52:09 GMT
Server
ECS (amb/6BBE)
Etag
"a671d4d584ef50954e5cebb21da17065+gzip"
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=1800
sdk.js
connect.facebook.net/en_GB/
3 KB
2 KB
Script
General
Full URL
https://connect.facebook.net/en_GB/sdk.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
054141e17ffe11178af9b71987ccce8cf03b9169764acc77525d3f21f4e0d505
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

Origin
https://www.securitytechbrief.com
Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
wyD+nKsr4JkbDq8i29AuKA==
cross-origin-resource-policy
cross-origin
expires
Wed, 03 Feb 2021 00:32:09 GMT
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
1780
x-fb-rlafr
0
x-fb-debug
/yeOWBufPKe3zf2wJf1X+3QAq7Q01jBYMx0CpmXUo0un1h+ANO+KEdJ7U3jxVxSBx/ZUSP+qshJBZj7fdDWY2A==
x-fb-trip-id
686109401
x-fb-content-md5
590ef74db1d3c798f4a22775694c3e77
cross-origin-embedder-policy-report-only
require-corp;report-to="coep_report"
date
Wed, 03 Feb 2021 00:15:05 GMT
x-frame-options
DENY
report-to
{"group":"coep_report","max_age":86400,"endpoints":[{"url":"https:\/\/www.facebook.com\/browser_reporting\/"}]}
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public,max-age=1200,stale-while-revalidate=3600
etag
"7b7ee3c7a10f4e98cb367cfd22449dcd"
timing-allow-origin
*
access-control-expose-headers
X-FB-Content-MD5
in.js
platform.linkedin.com/
181 KB
54 KB
Script
General
Full URL
https://platform.linkedin.com/in.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:66b5:799a:7cd3:f74d:7071 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (frc/8F0A) /
Resource Hash
c3558e93c65af9eb38a7471492d3eecb8c253d9796919f96ca12c7214d7cb494

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 03 Feb 2021 00:15:04 GMT
content-encoding
gzip
x-cdn-client-ip-version
IPV6
x-cdn
ECST
age
3585
x-cache
HIT
x-cdn-proto
HTTP2
content-length
55605
x-li-uuid
ohh1FFQRYBawFYoT/SoAAA==
server
ECAcc (frc/8F0A)
last-modified
Tue, 02 Feb 2021 23:15:19 GMT
x-li-pop
prod-eda6
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=3600
accept-ranges
bytes
x-li-proto
http/1.1
x-li-fabric
prod-ltx1
expires
Wed, 3 Feb 2021 00:15:19 GMT
2.jpeg
www.securitytechbrief.com/images/
20 KB
20 KB
Image
General
Full URL
https://www.securitytechbrief.com/images/2.jpeg
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
c267b2091019fcc7f733017086e2ba50f4c03b18fc82d311e130e15e3a57c1df
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:06 GMT
Last-Modified
Wed, 10 Oct 2018 10:11:28 GMT
Server
Apache
X-IPLB-Request-ID
52661272:3630_5B868058:01BB_6019EB0A_631B:1A009
X-IPLB-Instance
5481
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/jpeg
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
20346
Expires
Thu, 03 Feb 2022 00:15:06 GMT
1.jpeg
www.securitytechbrief.com/images/
35 KB
35 KB
Image
General
Full URL
https://www.securitytechbrief.com/images/1.jpeg
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
ec909d2b6845663bebe888269146fa1a9bba97834e9701c43880aa63b63eb808
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:06 GMT
Last-Modified
Wed, 10 Oct 2018 10:11:45 GMT
Server
Apache
X-IPLB-Request-ID
52661272:3636_5B868058:01BB_6019EB0A_4CB3:136D
X-IPLB-Instance
5480
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/jpeg
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
35701
Expires
Thu, 03 Feb 2022 00:15:06 GMT
v_sb.js
validate.onecount.net/js/
4 KB
2 KB
Script
General
Full URL
https://validate.onecount.net/js/v_sb.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.81.88.251 , United States, ASN10493 (GCN-AS, US),
Reverse DNS
ocvalidate.onecount.net
Software
nginx /
Resource Hash
9b45d583a798c02009befc5dc12f3968ba3e0fd1a61e8fc08a8efb33b278d28c

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:04 GMT
Content-Encoding
gzip
Last-Modified
Wed, 25 Jan 2017 22:17:02 GMT
Server
nginx
ETag
W/"588923de-e67"
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
max-age=86400, public, private
Transfer-Encoding
chunked
Expires
Thu, 04 Feb 2021 00:15:04 GMT
fs.js
pmg-validate.onecount.net/clients/PMG/js/
0
0
Script
General
Full URL
https://pmg-validate.onecount.net/clients/PMG/js/fs.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.81.88.251 , United States, ASN10493 (GCN-AS, US),
Reverse DNS
ocvalidate.onecount.net
Software
/
Resource Hash

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

cr.min.js
validate.onecount.net/js/
7 KB
3 KB
Script
General
Full URL
https://validate.onecount.net/js/cr.min.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.81.88.251 , United States, ASN10493 (GCN-AS, US),
Reverse DNS
ocvalidate.onecount.net
Software
nginx /
Resource Hash
69047bfc2e40089f08a6a2e50749a5e45177b8cb338be05b1345326d3b2b315e

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:05 GMT
Content-Encoding
gzip
Last-Modified
Wed, 05 Feb 2020 21:00:39 GMT
Server
nginx
ETag
W/"5e3b2cf7-1a2a"
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
max-age=86400, public, private
Transfer-Encoding
chunked
Expires
Thu, 04 Feb 2021 00:15:05 GMT
index.php
validate.onecount.net/onecount/api/public/
1 KB
1 KB
Script
General
Full URL
https://validate.onecount.net/onecount/api/public/index.php?__cuuid=b3de2f5a4557f2c4b119238e634e2b377989ed29&host=www.securitytechbrief.com&user_agent=Mozilla/5.0%20(Macintosh;%20Intel%20Mac%20OS%20X%2010_14_5)%20AppleWebKit/537.36%20(KHTML,%20like%20Gecko)%20Chrome/83.0.4103.61%20Safari/537.36&cookie=sj_financial_tpl%3Dsj_financial%3B%20_gcna%3D0.0.1612311304.1%3B%20_gcnb%3D1612311304.1%3B%20_gcnz%3D%3B%20_gcl_au%3D1.1.1662957208.1612311304%3B%20__utma%3D135802867.1492990387.1612311304.1612311304.1612311304.1%3B%20__utmc%3D135802867%3B%20__utmz%3D135802867.1612311304.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)%3B%20__utmt%3D1%3B%20__utmb%3D135802867.1.10.1612311304%3B%20_ga%3DGA1.2.1492990387.1612311304%3B%20_gid%3DGA1.2.1989420094.1612311304%3B%20_gat_gtag_UA_3578655_16%3D1%3B%20oc-js-session%3D77c3rfqrb76ibgapr8l9o15qp1&sid=77c3rfqrb76ibgapr8l9o15qp1&js=1&url=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address&referrer=
Requested by
Host: validate.onecount.net
URL: https://validate.onecount.net/js/all.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.81.88.251 , United States, ASN10493 (GCN-AS, US),
Reverse DNS
ocvalidate.onecount.net
Software
nginx /
Resource Hash
f35508d4e3369d5c51ac5b0967d77329b64d92ccb516ccd9983efb53f859e2db

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 03 Feb 2021 00:15:05 GMT
Content-Encoding
gzip
Server
nginx
Vary
Accept-Encoding
Access-Control-Allow-Methods
*
Content-Type
application/json
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Transfer-Encoding
chunked
Access-Control-Allow-Orgin
*
Expires
Thu, 19 Nov 1981 08:52:00 GMT
index.php
validate.onecount.net/js/custom/
63 B
369 B
Script
General
Full URL
https://validate.onecount.net/js/custom/index.php?__cuuid=b3de2f5a4557f2c4b119238e634e2b377989ed29&host=www.securitytechbrief.com
Requested by
Host: validate.onecount.net
URL: https://validate.onecount.net/js/all.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.81.88.251 , United States, ASN10493 (GCN-AS, US),
Reverse DNS
ocvalidate.onecount.net
Software
nginx /
Resource Hash
ca6df3f7d8e9eb10162498d76018b96bcbe808b30aa67e04fcae8e4db501392d

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:05 GMT
Content-Encoding
gzip
Transfer-Encoding
chunked
Server
nginx
Cache-control
private
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
tag.aspx
ml314.com/
26 KB
12 KB
Script
General
Full URL
https://ml314.com/tag.aspx?312021
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.18.215.87 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-18-215-87.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
7d655e8cd62ba58d86b3bc9c8e1e04a76506a4dfc852c3b3813deb0aef284548

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:04 GMT
Content-Encoding
gzip
Last-Modified
Tue, 02 Feb 2021 11:48:36 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, max-age=41610
Connection
keep-alive
Content-Length
11933
Expires
Wed, 03 Feb 2021 11:48:36 GMT
ga.js
ssl.google-analytics.com/
45 KB
17 KB
Script
General
Full URL
https://ssl.google-analytics.com/ga.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:821::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
1259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 23 Oct 2020 03:00:57 GMT
server
Golfe2
age
4905
date
Tue, 02 Feb 2021 22:53:20 GMT
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=7200
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
17168
expires
Wed, 03 Feb 2021 00:53:20 GMT
a.php
validate.onecount.net/onecount/automation/
2 B
522 B
Script
General
Full URL
https://validate.onecount.net/onecount/automation/a.php?__cuuid=b3de2f5a4557f2c4b119238e634e2b377989ed29&ocid=&tid=&domain=www.securitytechbrief.com&section=/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Requested by
Host: validate.onecount.net
URL: https://validate.onecount.net/js/all.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.81.88.251 , United States, ASN10493 (GCN-AS, US),
Reverse DNS
ocvalidate.onecount.net
Software
nginx /
Resource Hash
4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

Pragma
no-cache
Date
Wed, 03 Feb 2021 00:15:05 GMT
Content-Encoding
gzip
Server
nginx
Vary
Accept-Encoding
Access-Control-Allow-Methods
*
Content-Type
application/json
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Transfer-Encoding
chunked
Access-Control-Allow-Orgin
*
Expires
Thu, 19 Nov 1981 08:52:00 GMT
pubads_impl_2021012801.js
securepubads.g.doubleclick.net/gpt/
275 KB
97 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021012801.js?31060000
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
216.58.207.34 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s24-in-f2.1e100.net
Software
sffe /
Resource Hash
fa533eb34a8900f6013bf6f0095c696ea16758fe6fbf7442694de0f8ebb2f536
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 03 Feb 2021 00:15:05 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 28 Jan 2021 09:41:30 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
cache-control
private, immutable, max-age=31536000
cross-origin-resource-policy
cross-origin
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
99311
x-xss-protection
0
expires
Wed, 03 Feb 2021 00:15:05 GMT
analytics.js
www.google-analytics.com/
46 KB
19 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=UA-3578655-16
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:825::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
e441c3e2771625ba05630ab464275136a82c99650ee2145ca5aa9853bedeb01b
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 23 Oct 2020 03:00:57 GMT
server
Golfe2
age
3662
date
Tue, 02 Feb 2021 23:14:03 GMT
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=7200
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18817
expires
Wed, 03 Feb 2021 01:14:03 GMT
js
www.googletagmanager.com/gtag/
97 KB
38 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=DC-9438555&l=dataLayer&cx=c
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=UA-3578655-16
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:824::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
ac0519f48b8fad9c76b9ed6c596130a93ca49c741fc371cf7ff925398cf020fe
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 03 Feb 2021 00:15:05 GMT
content-encoding
br
server
Google Tag Manager
access-control-allow-headers
Cache-Control
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
strict-transport-security
max-age=31536000; includeSubDomains
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
38843
x-xss-protection
0
expires
Wed, 03 Feb 2021 00:15:05 GMT
segoeui.woff
www.securitytechbrief.com/templates/sj_financial/asset/fonts/segoeui/
240 KB
238 KB
Font
General
Full URL
https://www.securitytechbrief.com/templates/sj_financial/asset/fonts/segoeui/segoeui.woff
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2001:41d0:202:100:91:134:128:88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
e95cacb2ce2f37f831cbd06c8474a9930037455cbd7701d76655fbbdbd26ccce
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Origin
https://www.securitytechbrief.com
Referer
https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:05 GMT
Content-Encoding
gzip
Last-Modified
Tue, 09 Oct 2018 12:13:49 GMT
Server
Apache
X-IPLB-Request-ID
00000000:97CC_00000000:01BB_6019EB08_4CAE:136D
X-IPLB-Instance
5480
Vary
Accept-Encoding
Content-Type
font/woff
Cache-Control
max-age=31536000, public
Transfer-Encoding
chunked
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Accept-Ranges
bytes
Expires
Thu, 03 Feb 2022 00:15:05 GMT
breadcrumb_separate.png
www.securitytechbrief.com/templates/sj_financial/images/
1 KB
2 KB
Image
General
Full URL
https://www.securitytechbrief.com/templates/sj_financial/images/breadcrumb_separate.png
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
058c6306cbff0e1c10d9f76a5e0a537ffdb29df7dc03f77f9fe01d13a2344b02
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:06 GMT
Last-Modified
Tue, 09 Oct 2018 12:13:49 GMT
Server
Apache
X-IPLB-Request-ID
52661272:3634_5B868058:01BB_6019EB0A_CC0C:1370
X-IPLB-Instance
5480
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/png
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
1119
Expires
Thu, 03 Feb 2022 00:15:06 GMT
star.png
www.securitytechbrief.com/templates/sj_financial/images/system/
1 KB
2 KB
Image
General
Full URL
https://www.securitytechbrief.com/templates/sj_financial/images/system/star.png
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2001:41d0:202:100:91:134:128:88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
78ca5f1b0d85199bf67ba125034990e58c97d7ccee13728591004c4b0876cf01
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:06 GMT
Last-Modified
Tue, 09 Oct 2018 12:13:49 GMT
Server
Apache
X-IPLB-Request-ID
00000000:97CC_00000000:01BB_6019EB09_4CB1:136D
X-IPLB-Instance
5480
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/png
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
1492
Expires
Thu, 03 Feb 2022 00:15:06 GMT
Rage_Italic.ttf
www.securitytechbrief.com/templates/sj_financial/css/fonts/
122 KB
81 KB
Font
General
Full URL
https://www.securitytechbrief.com/templates/sj_financial/css/fonts/Rage_Italic.ttf
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
3b499f9c7261b2adda5d6d668c87a9205754e20d2a2d66588cf1fd0653907f54
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Origin
https://www.securitytechbrief.com
Referer
https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:05 GMT
Content-Encoding
gzip
Last-Modified
Tue, 09 Oct 2018 12:13:49 GMT
Server
Apache
X-IPLB-Request-ID
52661272:361A_5B868058:01BB_6019EB09_D57D:1A00C
X-IPLB-Instance
5481
Vary
Accept-Encoding
Content-Type
font/ttf
Cache-Control
max-age=31536000, public
Transfer-Encoding
chunked
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Accept-Ranges
bytes
Expires
Thu, 03 Feb 2022 00:15:05 GMT
fontawesome-webfont.woff
www.securitytechbrief.com/templates/sj_financial/asset/fonts/awesome/
43 KB
43 KB
Font
General
Full URL
https://www.securitytechbrief.com/templates/sj_financial/asset/fonts/awesome/fontawesome-webfont.woff?v=3.2.1
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
18e6b5ff511b90edf098e62ac45ed9d6673a3eee10165d0de4164d4d02a3a77f
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Origin
https://www.securitytechbrief.com
Referer
https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:05 GMT
Content-Encoding
gzip
Last-Modified
Tue, 09 Oct 2018 12:13:49 GMT
Server
Apache
X-IPLB-Request-ID
52661272:3634_5B868058:01BB_6019EB09_CC0B:1370
X-IPLB-Instance
5480
Vary
Accept-Encoding
Content-Type
font/woff
Cache-Control
max-age=31536000, public
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Accept-Ranges
bytes
Content-Length
43568
Expires
Thu, 03 Feb 2022 00:15:05 GMT
Simple-Line-Icons.woff2
cdn.jsdelivr.net/npm/simple-line-icons@2.4.1/fonts/
29 KB
29 KB
Font
General
Full URL
https://cdn.jsdelivr.net/npm/simple-line-icons@2.4.1/fonts/Simple-Line-Icons.woff2?v=2.4.0
Requested by
Host: cdn.jsdelivr.net
URL: https://cdn.jsdelivr.net/npm/simple-line-icons@2.4.1/css/simple-line-icons.css
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:4e42:1b::621 , Ascension Island, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
104673f4859604362a18fc6294197d8fffb8cb24ad3211e92eb04f655e18cf4a
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Origin
https://www.securitytechbrief.com
Referer
https://cdn.jsdelivr.net/npm/simple-line-icons@2.4.1/css/simple-line-icons.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
age
6515347
x-cache
HIT, HIT
cross-origin-resource-policy
cross-origin
content-length
30064
etag
W/"7570-XaYDEE1NbjYoJOyefbMustYXlJo"
x-served-by
cache-fra19148-FRA, cache-hhn4066-HHN
date
Wed, 03 Feb 2021 00:15:05 GMT
vary
Accept-Encoding
content-type
font/woff2
access-control-allow-origin
*
access-control-expose-headers
*
cache-control
public, max-age=31536000, s-maxage=31536000, immutable
accept-ranges
bytes
timing-allow-origin
*
seguisb.woff
www.securitytechbrief.com/templates/sj_financial/asset/fonts/segoeui/
189 KB
187 KB
Font
General
Full URL
https://www.securitytechbrief.com/templates/sj_financial/asset/fonts/segoeui/seguisb.woff
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
642ece5a9ab9a1f4b115580ce467025f7a906c1499a901c2bd5aaf4a4c01fce5
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Origin
https://www.securitytechbrief.com
Referer
https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:05 GMT
Content-Encoding
gzip
Last-Modified
Tue, 09 Oct 2018 12:13:49 GMT
Server
Apache
X-IPLB-Request-ID
52661272:3632_5B868058:01BB_6019EB09_6192:136E
X-IPLB-Instance
5480
Vary
Accept-Encoding
Content-Type
font/woff
Cache-Control
max-age=31536000, public
Transfer-Encoding
chunked
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Accept-Ranges
bytes
Expires
Thu, 03 Feb 2022 00:15:05 GMT
fs.js
pmg-validate.onecount.net/clients/PMG/js/
0
0
Script
General
Full URL
https://pmg-validate.onecount.net/clients/PMG/js/fs.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.81.88.251 , United States, ASN10493 (GCN-AS, US),
Reverse DNS
ocvalidate.onecount.net
Software
/
Resource Hash

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

fontawesome-webfont.woff
www.securitytechbrief.com/plugins/system/ytshortcodes/assets/font/
43 KB
44 KB
Font
General
Full URL
https://www.securitytechbrief.com/plugins/system/ytshortcodes/assets/font/fontawesome-webfont.woff
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
0fd28fece9ebd606b8b071460ebd3fc2ed7bc7a66ef91c8834f11dfacab4a849
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Origin
https://www.securitytechbrief.com
Referer
https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:05 GMT
Content-Encoding
gzip
Last-Modified
Tue, 09 Oct 2018 12:13:53 GMT
Server
Apache
X-IPLB-Request-ID
52661272:3630_5B868058:01BB_6019EB09_631A:1A009
X-IPLB-Instance
5481
Vary
Accept-Encoding
Content-Type
font/woff
Cache-Control
max-age=31536000, public
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Accept-Ranges
bytes
Content-Length
44427
Expires
Thu, 03 Feb 2022 00:15:05 GMT
sdk.js
connect.facebook.net/en_GB/
197 KB
59 KB
Script
General
Full URL
https://connect.facebook.net/en_GB/sdk.js?hash=22273615bba0f99e09d0b6a0a4c7358e&ua=modern_es6
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_GB/sdk.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
4577a8980cff4fdd352ce556116a155c0c07079736109d84cb449a5c08b5983c
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

Origin
https://www.securitytechbrief.com
Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
8skKwUoVzWXDWeq+OJg+yw==
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
60632
x-fb-rlafr
0
x-fb-debug
LWVp3Efi8hj6jQqDl5WENbrsOBGS8G3mjEdn/bEeaGtt5wxCLIRCXSXKgO+yw1huFizgerOosamzWygGm9YOOQ==
x-fb-trip-id
686109401
x-fb-content-md5
60e94075a57859aa63cd190805ffa6ed
x-frame-options
DENY
date
Wed, 03 Feb 2021 00:15:05 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-FB-Content-MD5
cache-control
public,max-age=31536000,stale-while-revalidate=3600,immutable
etag
"7dd27b78aa6abcca05c40fd90889f31d"
timing-allow-origin
*
expires
Thu, 03 Feb 2022 00:00:46 GMT
collect
www.google-analytics.com/
35 B
122 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j87&a=659215774&t=pageview&_s=1&dl=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address&ul=en-us&de=UTF-8&dt=Grindr%20Security%20Flaw%20Allowed%20Hacking%20with%20Just%20An%20Email%20Address%20-%20Security%20Tech%20Brief&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_utma=135802867.1492990387.1612311304.1612311304.1612311304.1&_utmz=135802867.1612311304.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)&_utmht=1612311305499&_u=AACCAUAB~&jid=&gjid=&cid=1492990387.1612311304&tid=UA-3578655-16&_gid=1989420094.1612311304&gtm=2ou1k0&z=1779331680
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:825::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 02 Feb 2021 19:54:32 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
15633
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
__utm.gif
ssl.google-analytics.com/
35 B
109 B
Image
General
Full URL
https://ssl.google-analytics.com/__utm.gif?utmwv=5.7.2&utms=2&utmn=368637311&utmhn=www.securitytechbrief.com&utmcs=UTF-8&utmsr=1600x1200&utmvp=1600x1200&utmsc=24-bit&utmul=en-us&utmje=0&utmfl=-&utmdt=Grindr%20Security%20Flaw%20Allowed%20Hacking%20with%20Just%20An%20Email%20Address%20-%20Security%20Tech%20Brief&utmhid=659215774&utmr=-&utmp=%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address&utmht=1612311305505&utmac=UA-1231231-1&utmcc=__utma%3D135802867.1492990387.1612311304.1612311304.1612311304.1%3B%2B__utmz%3D135802867.1612311304.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)%3B&utmjid=&utmu=qAAAAAAAAAAAAAAAAAAAAAAE~
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:821::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 02 Feb 2021 06:19:45 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
64520
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
activityi;dc_pre=CLHuidW3zO4CFVDC7QodcNsI4Q;src=9438555;type=invmedia;cat=secur0;ord=2276874585322;gtm=2od1k0;auiddc=1662957208.1612311304;~oref=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%...
9438555.fls.doubleclick.net/ Frame 0976
Redirect Chain
  • https://9438555.fls.doubleclick.net/activityi;src=9438555;type=invmedia;cat=secur0;ord=2276874585322;gtm=2od1k0;auiddc=1662957208.1612311304;~oref=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.ph...
  • https://9438555.fls.doubleclick.net/activityi;dc_pre=CLHuidW3zO4CFVDC7QodcNsI4Q;src=9438555;type=invmedia;cat=secur0;ord=2276874585322;gtm=2od1k0;auiddc=1662957208.1612311304;~oref=https%3A%2F%2Fww...
0
0
Document
General
Full URL
https://9438555.fls.doubleclick.net/activityi;dc_pre=CLHuidW3zO4CFVDC7QodcNsI4Q;src=9438555;type=invmedia;cat=secur0;ord=2276874585322;gtm=2od1k0;auiddc=1662957208.1612311304;~oref=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address?
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=DC-9438555
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
216.58.212.166 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
ams15s22-in-f6.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=21600
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
9438555.fls.doubleclick.net
:scheme
https
:path
/activityi;dc_pre=CLHuidW3zO4CFVDC7QodcNsI4Q;src=9438555;type=invmedia;cat=secur0;ord=2276874585322;gtm=2od1k0;auiddc=1662957208.1612311304;~oref=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address?
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
test_cookie=CheckForPermission
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
about:blank

Response headers

p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
date
Wed, 03 Feb 2021 00:15:05 GMT
expires
Wed, 03 Feb 2021 00:15:05 GMT
cache-control
private, max-age=0
strict-transport-security
max-age=21600
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
397
x-xss-protection
0
set-cookie
IDE=AHWqTUngM1iI7txeI1gQR7-MWjQ_xcyMFKNUz_8ye15DtOinXCB-9y7wsvnfWe9ALO4; expires=Mon, 28-Feb-2022 00:15:05 GMT; path=/; domain=.doubleclick.net; Secure; HttpOnly; SameSite=none test_cookie=; expires=Fri, 01-Aug-2008 22:45:55 GMT; path=/; domain=.doubleclick.net; Secure; HttpOnly; SameSite=none
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"

Redirect headers

p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
date
Wed, 03 Feb 2021 00:15:05 GMT
pragma
no-cache
expires
Fri, 01 Jan 1990 00:00:00 GMT
cache-control
no-cache, must-revalidate
follow-only-when-prerender-shown
1
strict-transport-security
max-age=21600
location
https://9438555.fls.doubleclick.net/activityi;dc_pre=CLHuidW3zO4CFVDC7QodcNsI4Q;src=9438555;type=invmedia;cat=secur0;ord=2276874585322;gtm=2od1k0;auiddc=1662957208.1612311304;~oref=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address?
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
server
cafe
content-length
0
x-xss-protection
0
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
utsync.ashx
ml314.com/
0
361 B
Script
General
Full URL
https://ml314.com/utsync.ashx?pub=&adv=&et=0&eid=65259&ct=js&pi=3616401254580224076&fp=&clid=&if=0&ps=&cl=&mlt=&data=&&cp=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address&pv=1612311305531_c9vexv9uz&bl=en-us&cb=6470128&return=&ht=&d=&dc=&si=1612311304035_gcyfd0kd0&cid=&s=1600x1200&rp=
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?312021
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.18.215.87 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-18-215-87.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 03 Feb 2021 00:15:05 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
p3P
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
application/javascript
Content-Length
0
Expires
0
ud.ashx
in.ml314.com/
20 B
482 B
Script
General
Full URL
https://in.ml314.com/ud.ashx?topiclimit=&cb=312021
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?312021
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.168.139.27 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-168-139-27.compute-1.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
d0e4a6372d6fb5ffe9505dbe9e94aee8f1b9b96ec8e5e20684cce8b4c5a88fa7

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:05 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public
Connection
keep-alive
Content-Length
138
Expires
Thu, 04 Feb 2021 00:15:05 GMT
oc-form-embed-js.php
validate.onecount.net/onecount/flexreg/
385 B
696 B
Script
General
Full URL
https://validate.onecount.net/onecount/flexreg/oc-form-embed-js.php?__cuuid=b3de2f5a4557f2c4b119238e634e2b377989ed29&containerId=one_count&ocurl=undefined&type=form&form=77
Requested by
Host: validate.onecount.net
URL: https://validate.onecount.net/js/all.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.81.88.251 , United States, ASN10493 (GCN-AS, US),
Reverse DNS
ocvalidate.onecount.net
Software
nginx /
Resource Hash
51b63c4796ed490226516e07ae00a95d31af79b8de350dedde7ca0175f3ded1b

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

Pragma
no-cache
Date
Wed, 03 Feb 2021 00:15:05 GMT
Content-Encoding
gzip
Server
nginx
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Transfer-Encoding
chunked
Expires
Thu, 19 Nov 1981 08:52:00 GMT
widget_iframe.96fd96193cc66c3e11d4c5e4c7c7ec97.html
platform.twitter.com/widgets/ Frame 7B53
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/widget_iframe.96fd96193cc66c3e11d4c5e4c7c7ec97.html?origin=https%3A%2F%2Fwww.securitytechbrief.com
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (amb/6B81) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address

Response headers

Content-Encoding
gzip
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Age
437281
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Wed, 03 Feb 2021 00:15:05 GMT
Etag
"9fa476ae827f556d5b037fe43632370d+gzip"
Last-Modified
Thu, 01 Oct 2020 21:50:01 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (amb/6B81)
Vary
Accept-Encoding
X-Cache
HIT
x-tw-cdn
VZ
Content-Length
5825
pattern1.png
www.securitytechbrief.com/templates/sj_financial/images/pattern/header/
979 B
1 KB
Image
General
Full URL
https://www.securitytechbrief.com/templates/sj_financial/images/pattern/header/pattern1.png
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
d9a1967b9408df285941f66e58f150e31303a8456cc80a302818d55a8edabe5f
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:06 GMT
Last-Modified
Tue, 09 Oct 2018 12:13:49 GMT
Server
Apache
X-IPLB-Request-ID
52661272:3632_5B868058:01BB_6019EB0A_6193:136E
X-IPLB-Instance
5480
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/png
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
979
Expires
Thu, 03 Feb 2022 00:15:06 GMT
pattern1.png
www.securitytechbrief.com/templates/sj_financial/images/pattern/footer/
979 B
1 KB
Image
General
Full URL
https://www.securitytechbrief.com/templates/sj_financial/images/pattern/footer/pattern1.png
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.134.128.88 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
Apache /
Resource Hash
d9a1967b9408df285941f66e58f150e31303a8456cc80a302818d55a8edabe5f
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Request headers

Referer
https://www.securitytechbrief.com/media/plg_jchoptimize/cache/css/bd59d427496a1830edb628e5614a090f.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:06 GMT
Last-Modified
Tue, 09 Oct 2018 12:13:49 GMT
Server
Apache
X-IPLB-Request-ID
52661272:3634_5B868058:01BB_6019EB0A_CC0D:1370
X-IPLB-Instance
5480
Strict-Transport-Security
max-age=10886400; includeSubDomains; preload
Content-Type
image/png
Cache-Control
max-age=31536000, public
Accept-Ranges
bytes
Content-Length
979
Expires
Thu, 03 Feb 2022 00:15:06 GMT
like.php
www.facebook.com/v3.3/plugins/ Frame C3DB
0
0
Document
General
Full URL
https://www.facebook.com/v3.3/plugins/like.php?action=like&app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Df1f650ac49d8b5%26domain%3Dwww.securitytechbrief.com%26origin%3Dhttps%253A%252F%252Fwww.securitytechbrief.com%252Ff7ca015f7c222%26relation%3Dparent.parent&container_width=0&href=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address&layout=button_count&locale=en_GB&sdk=joey&share=true&show_faces=false&size=small&width=160
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_GB/sdk.js?hash=22273615bba0f99e09d0b6a0a4c7358e&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;block-all-mixed-content;upgrade-insecure-requests;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www.facebook.com
:scheme
https
:path
/v3.3/plugins/like.php?action=like&app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Df1f650ac49d8b5%26domain%3Dwww.securitytechbrief.com%26origin%3Dhttps%253A%252F%252Fwww.securitytechbrief.com%252Ff7ca015f7c222%26relation%3Dparent.parent&container_width=0&href=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address&layout=button_count&locale=en_GB&sdk=joey&share=true&show_faces=false&size=small&width=160
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address

Response headers

content-security-policy
default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;block-all-mixed-content;upgrade-insecure-requests;
cache-control
private, no-cache, no-store, must-revalidate
expires
Sat, 01 Jan 2000 00:00:00 GMT
x-xss-protection
0
strict-transport-security
max-age=15552000; preload
content-encoding
br
facebook-api-version
v3.3
x-content-type-options
nosniff
vary
Accept-Encoding
pragma
no-cache
x-fb-rlafr
0
content-type
text/html; charset="utf-8"
x-fb-debug
hoKp6yNuovWoEYWUmnyrZlN8xLezOcy2UcNSCfQzc++iBwBGhnVy05zCfyaAZUWhSMrHrjgjj3OO6CUzuvLpnQ==
date
Wed, 03 Feb 2021 00:15:05 GMT
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
button.63c51c903061d0dbd843c41e8a00aa5a.js
platform.twitter.com/js/
7 KB
3 KB
Script
General
Full URL
https://platform.twitter.com/js/button.63c51c903061d0dbd843c41e8a00aa5a.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (amb/6BBE) /
Resource Hash
e0a70c5d116d9c823c7d7958ecea2a7926315fac156e390bd7dc8a5fa088cdc3

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:05 GMT
Content-Encoding
gzip
Last-Modified
Thu, 01 Oct 2020 21:49:51 GMT
Server
ECS (amb/6BBE)
Age
437282
Etag
"62d4b0301f07768d13f3ee5de8633739+gzip"
Vary
Accept-Encoding
x-tw-cdn
VZ
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Content-Length
2294
tweet_button.96fd96193cc66c3e11d4c5e4c7c7ec97.en-gb.html
platform.twitter.com/widgets/ Frame 163B
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/tweet_button.96fd96193cc66c3e11d4c5e4c7c7ec97.en-gb.html
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (amb/6BBE) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address

Response headers

Content-Encoding
gzip
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Age
436978
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Wed, 03 Feb 2021 00:15:05 GMT
Etag
"cdb605318ca1a891c7d6342e7b8f5103+gzip"
Last-Modified
Thu, 01 Oct 2020 21:49:58 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (amb/6BBE)
Vary
Accept-Encoding
X-Cache
HIT
x-tw-cdn
VZ
Content-Length
12269
tracker.php
validate.onecount.net/onecount/oc_track/
42 B
546 B
Image
General
Full URL
https://validate.onecount.net/onecount/oc_track/tracker.php?__cuuid=b3de2f5a4557f2c4b119238e634e2b377989ed29&_c=1&_d=0&_h=www.securitytechbrief.com&_l=en-US&_p=https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address&_pf=Linux%20x86_64&_r=&_s=1600x1200&_t=Grindr%20Security%20Flaw%20Allowed%20Hacking%20with%20Just%20An%20Email%20Address%20-%20Security%20Tech%20Brief&_u=1461940026&_us=zCyZF3bNmg&_v=5.0&_k=Grindr,%20Wassime%20Bouimadaghene,%20Troy%20Hunt,%20Rick%20Marini&_cv=&_ds=310411976~en-US~24~1200x1600~-60~1~1~true~undefined~function~undefined~Linux%20x86_64~~1257683291~131932328~0~1~Not%20Installed~Not%20Installed~24%7C1600%7C1200%7C1600%7C1200~3078910503~3793789618&_ca=b3de2f5a4557f2c4b119238e634e2b377989ed29&_gcna=1b322fefd27b188a540a9078aecb04dbea600661ffc939720766980106cb0b67.198736485306c30df365d941a99fa5fe1cfc9cd0046065c8ad27c9e7a178857a.1612311306.1&_gcnb=1612311306.1&_gcno=1b322fefd27b188a540a9078aecb04dbea600661ffc939720766980106cb0b67&_gcnt=198736485306c30df365d941a99fa5fe1cfc9cd0046065c8ad27c9e7a178857a&_gcnz=&_nvstr=1&_rvstr=0&_pctr=1&_vctr=1&_ts=1612311306
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
172.81.88.251 , United States, ASN10493 (GCN-AS, US),
Reverse DNS
ocvalidate.onecount.net
Software
nginx /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 03 Feb 2021 00:15:06 GMT
X-Content-Type-Options
nosniff
Last-Modified
Tue, 01 Jan 2002 00:00:00 GMT
Server
nginx
Transfer-Encoding
chunked
Content-Type
image/gif
Cache-Control
private, no-cache, must-revalidate, proxy-revalidate, max-age=0, post-check=0, pre-check=0
Expires
Sat, 01 Jan 2000 00:00:00 GMT
jot
syndication.twitter.com/i/
43 B
383 B
Image
General
Full URL
https://syndication.twitter.com/i/jot?dnt=1&l=%7B%22widget_origin%22%3A%22https%3A%2F%2Fwww.securitytechbrief.com%2Findex.php%2Fnews%2Fitem%2F6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address%22%2C%22widget_frame%22%3Afalse%2C%22language%22%3A%22en-gb%22%2C%22message%22%3A%22m%3Anocount%3A%22%2C%22_category_%22%3A%22tfw_client_event%22%2C%22triggered_on%22%3A1612311306474%2C%22dnt%22%3Atrue%2C%22client_version%22%3A%22ed20a2b%3A1601588405575%22%2C%22format_version%22%3A1%2C%22event_namespace%22%3A%7B%22client%22%3A%22tfw%22%2C%22page%22%3A%22button%22%2C%22section%22%3A%22share%22%2C%22action%22%3A%22impression%22%7D%7D
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.136 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 03 Feb 2021 00:15:06 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200 OK
x-twitter-response-tags
BouncerCompliant
content-length
65
x-xss-protection
0
x-response-time
112
pragma
no-cache
last-modified
Wed, 03 Feb 2021 00:15:06 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=631138519
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
28c494bc83f1cfbb6c8e8ac236c2ce6a
x-transaction
00ec29cd00007079
expires
Tue, 31 Mar 1981 05:00:00 GMT
roundtrip.js
s.adroll.com/j/
40 KB
13 KB
Script
General
Full URL
https://s.adroll.com/j/roundtrip.js
Requested by
Host: www.securitytechbrief.com
URL: https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.40 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
c2cb2cc5345c71f30b0ce56069cfe0bdf65eb061228333d27ba0e7388748636a

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-amz-version-id
eHeCFa11ZmebQv0hmrjMAs.eB.BPo.q4
Content-Encoding
gzip
ETag
"0aed5b94bc26ce0fe9e58d25dd314418"
x-amz-request-id
A153E367E4F64E44
x-amz-server-side-encryption
AES256
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
12695
x-amz-id-2
1CcC1EKrieRTlAyvmM8I9czxbYiNWqUAlIg4XQoBWjKMxkmKs0MXuebcXJ5+1jv9UbHz74EL7Lo=
Last-Modified
Thu, 10 Dec 2020 18:09:34 GMT
Server
AmazonS3
Date
Wed, 03 Feb 2021 00:15:07 GMT
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=3600, must-revalidate
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
index.js
s.adroll.com/j/exp/
Redirect Chain
  • https://s.adroll.com/j/exp/A7FIIZA6YVEEXEIEL2B3ML/index.js
  • https://s.adroll.com/j/exp/index.js
28 B
747 B
Script
General
Full URL
https://s.adroll.com/j/exp/index.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.40 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
f59e5f34a941183aacaed25322ac0856628493c2cfd936ded3fddc0a49510e52

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-amz-version-id
8C_4p5S6NLuKOM2fXKpm7asomxwPn3IL
Content-Encoding
gzip
ETag
"5816cced8568d223aa09d889f300692b"
x-amz-request-id
A6E4D842C4F3666B
x-amz-server-side-encryption
AES256
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
48
x-amz-id-2
1Pslf+Y9QwUHIZmwUo95w2CKA8MTrgZpbGBRFLUwAevxRDJ3euWTGuAJ2AJ78njOjdUd48ZsKSg=
Last-Modified
Tue, 19 Jan 2021 16:25:36 GMT
Server
AmazonS3
Date
Wed, 03 Feb 2021 00:15:07 GMT
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Content-Type
application/javascript
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*

Redirect headers

Date
Wed, 03 Feb 2021 00:15:07 GMT
Server
AkamaiGHost
Location
https://s.adroll.com/j/exp/index.js
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
false
Connection
keep-alive
Access-Control-Allow-Headers
*
Content-Length
0
index.js
s.adroll.com/j/pre/A7FIIZA6YVEEXEIEL2B3ML/TUM74KWGOJFPPAOAB5JPGX/
0
773 B
Script
General
Full URL
https://s.adroll.com/j/pre/A7FIIZA6YVEEXEIEL2B3ML/TUM74KWGOJFPPAOAB5JPGX/index.js
Requested by
Host: s.adroll.com
URL: https://s.adroll.com/j/roundtrip.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.40 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-amz-version-id
.HoYOPvRjCiviEp20FEQx9QUlpIPqfu3
Content-Encoding
gzip
ETag
"d41d8cd98f00b204e9800998ecf8427e"
x-amz-request-id
D1997AD5DBCD5F8A
x-amz-server-side-encryption
AES256
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
20
x-amz-id-2
HTrrsyl/sJbMx282c8Yf+qWfjikC6smHdnEppoCV9YlMH/Ltipr9oq6XEtekszTmJKiT+a24pDc=
Last-Modified
Tue, 02 Feb 2021 18:37:35 GMT
Server
AmazonS3
Date
Wed, 03 Feb 2021 00:15:07 GMT
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Content-Type
text/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=3600, must-revalidate
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
/
d.adroll.com/consent/check/A7FIIZA6YVEEXEIEL2B3ML/
Redirect Chain
  • https://d.adroll.mgr.consensu.org/consent/iabcheck/A7FIIZA6YVEEXEIEL2B3ML?_s=1b7015e4abec2c8415d5ccb38883e3ae&_b=2
  • https://d.adroll.com/consent/check/A7FIIZA6YVEEXEIEL2B3ML/?_s=1b7015e4abec2c8415d5ccb38883e3ae&_b=2
395 B
487 B
Script
General
Full URL
https://d.adroll.com/consent/check/A7FIIZA6YVEEXEIEL2B3ML/?_s=1b7015e4abec2c8415d5ccb38883e3ae&_b=2
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.76.40.71 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-76-40-71.eu-west-1.compute.amazonaws.com
Software
nginx/1.18.0 /
Resource Hash
da831f6ab7e357d7c962e031bfa4cd844e27d308cd9e0e46bab9bf4018fa9372

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 03 Feb 2021 00:15:07 GMT
server
nginx/1.18.0
content-length
395
content-type
application/javascript

Redirect headers

location
https://d.adroll.com/consent/check/A7FIIZA6YVEEXEIEL2B3ML/?_s=1b7015e4abec2c8415d5ccb38883e3ae&_b=2
date
Wed, 03 Feb 2021 00:15:07 GMT
server
nginx/1.18.0
content-length
105
imsync.ashx
ml314.com/
17 B
427 B
Script
General
Full URL
https://ml314.com/imsync.ashx?pi=3616401254580224076&data=eyJwaCI6MTIwMCwid2giOjEyMDAsInRicyI6MCwiZHQiOjE1LCJwaWQiOiIxNjEyMzExMzA1NTMxX2M5dmV4djl1eiIsInNkIjoxMjAwfQ%3D%3D
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?312021
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.18.215.87 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-18-215-87.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
62ce950ad0d7f664b316b4253bbc993bf0bf8310970f64b150fda6f1fa59dfea

Request headers

Referer
https://www.securitytechbrief.com/index.php/news/item/6654-grindr-security-flaw-allowed-hacking-with-just-an-email-address
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 03 Feb 2021 00:15:19 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
text/html; charset=utf-8
Cache-Control
private
Connection
keep-alive
Content-Length
135

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
www.securitytechbrief.com
URL
https://www.securitytechbrief.com/images/gdpr-3385166_1280.jpg
Domain
www.securitytechbrief.com
URL
https://www.securitytechbrief.com/media/k2/items/cache/194df8014cc7359d17897937cd25ec68_S.jpg
Domain
www.securitytechbrief.com
URL
https://www.securitytechbrief.com/media/k2/items/cache/81072d2cb1d54b402a67e95e5f91e400_S.jpg
Domain
www.securitytechbrief.com
URL
https://www.securitytechbrief.com/images/Security_-_Data_Breach_-_cyber-security-1784985_1280.png
Domain
www.securitytechbrief.com
URL
https://www.securitytechbrief.com/images/default.jpg
Domain
www.securitytechbrief.com
URL
https://www.securitytechbrief.com/images/Security_-_data_breach_-_keyboard-895556_1920.jpg
Domain
www.securitytechbrief.com
URL
https://www.securitytechbrief.com/images/boston-2444581_640_small.jpg
Domain
www.securitytechbrief.com
URL
https://www.securitytechbrief.com/images/ballet-4941738_640.jpg
Domain
www.securitytechbrief.com
URL
https://www.securitytechbrief.com/media/k2/users/1740.jpg
Domain
www.securitytechbrief.com
URL
https://www.securitytechbrief.com/media/k2/items/cache/ea2933593da3839fd3a2bc981af3ac07_S.jpg
Domain
www.securitytechbrief.com
URL
https://www.securitytechbrief.com/media/k2/items/cache/a5e4371aebbddf39a80fe2be248b4e5b_S.jpg
Domain
www.securitytechbrief.com
URL
https://www.securitytechbrief.com/media/k2/items/cache/0642d6eea96084de83e0904cabc835aa_XS.jpg
Domain
www.securitytechbrief.com
URL
https://www.securitytechbrief.com/images/Grindr.png
Domain
www.securitytechbrief.com
URL
https://www.securitytechbrief.com/images/2.jpeg
Domain
www.securitytechbrief.com
URL
https://www.securitytechbrief.com/images/1.jpeg
Domain
pmg-validate.onecount.net
URL
https://pmg-validate.onecount.net/clients/PMG/js/fs.js
Domain
www.securitytechbrief.com
URL
https://www.securitytechbrief.com/templates/sj_financial/images/system/star.png
Domain
in.ml314.com
URL
https://in.ml314.com/ud.ashx?topiclimit=&cb=312021
Domain
www.securitytechbrief.com
URL
https://www.securitytechbrief.com/plugins/system/ytshortcodes/assets/font/fontawesome-webfont.ttf

Verdicts & Comments Add Verdict or Comment

154 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| 1 object| 2 object| 3 object| 4 object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| $K2 object| q boolean| pp_alreadyInitialized function| IFrame function| Elements function| Cookie function| processScroll function| createCookie function| getCookie function| closeMessage object| jQuery1124022645967903761388 boolean| PR_SHOULD_USE_CONTINUATION function| prettyPrintOne function| prettyPrint object| PR object| Joomla function| writeDynaList function| changeDynaList function| radioGetCheckedValue function| getSelectedValue function| listItemTask function| submitbutton function| submitform function| saveorder function| checkAll_button object| MooTools function| typeOf function| instanceOf function| Type object| Browser function| $constructor function| $family function| DOMEvent function| Class function| Chain function| Events function| Options object| Slick number| uniqueNumber function| getDocument function| getWindow function| $$ function| addListener function| removeListener function| retrieve function| store function| eliminate function| addEvent function| removeEvent function| addEvents function| removeEvents function| fireEvent function| cloneEvents function| getSize function| getScroll function| getScrollSize function| getPosition function| getCoordinates function| getHeight function| getWidth function| getScrollTop function| getScrollLeft function| getScrollHeight function| getScrollWidth function| getTop function| getLeft function| Fx function| Swiff string| TMPL_NAME object| TMPL_COOKIE function| MobileRedirectUrl undefined| __oc_tracker_interval object| GCN function| returnResponse object| swfobject function| ES6Promise function| Fingerprint object| googletag function| gtag object| dataLayer object| _ml object| _gaq object| ggeac object| google_js_reporting_queue object| google_tag_manager object| google_tag_data string| GoogleAnalyticsObject function| ga object| __core-js_shared__ object| Sslac object| IN function| MM_jumpMenu function| useSP string| adroll_adv_id string| adroll_pix_id object| Viewability object| oc_ad_container object| oc_ad_timer boolean| oc_wfocus object| __oc_fs_config object| FB object| gaplugins object| gaGlobal object| gaData object| _gat object| __twttrll object| twttr object| __twttr number| custom_script_b3de2f5a4557f2c4b119238e634e2b377989ed29 object| doT object| option function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter undefined| google_measure_js_timing object| _sT function| jSelectShortcode function| cookiehintfadeOut function| cookiehintsubmit function| cookiehintsubmitno object| YTScript boolean| doresize object| scroll_pos boolean| hashtag number| newlogin number| offset_top boolean| __adroll_loaded string| adroll_sid object| __adroll boolean| adroll_optout object| adroll_ext_network object| adroll_callbacks function| adroll_tpc_callback boolean| __adroll_consent boolean| __adroll_consent_is_gdpr object| __adroll_consent_data string| __adroll_consent_user_country string| __adroll_consent_adv_country object| adroll_exp_list

20 Cookies

Domain/Path Name / Value
.securitytechbrief.com/ Name: _gcnb
Value: 1612311306.1
.securitytechbrief.com/ Name: realReferer
Value:
.securitytechbrief.com/ Name: _gcna
Value: 1b322fefd27b188a540a9078aecb04dbea600661ffc939720766980106cb0b67.198736485306c30df365d941a99fa5fe1cfc9cd0046065c8ad27c9e7a178857a.1612311306.1
.securitytechbrief.com/ Name: __tempcookie
Value: 198736485306c30df365d941a99fa5fe1cfc9cd0046065c8ad27c9e7a178857a
.securitytechbrief.com/ Name: __ocid
Value: 1b322fefd27b188a540a9078aecb04dbea600661ffc939720766980106cb0b67
.securitytechbrief.com/ Name: __utmb
Value: 135802867.2.10.1612311304
www.securitytechbrief.com/ Name: oc-js-session
Value: 77c3rfqrb76ibgapr8l9o15qp1
.securitytechbrief.com/ Name: _gid
Value: GA1.2.1989420094.1612311304
.securitytechbrief.com/ Name: __utmt
Value: 1
.securitytechbrief.com/ Name: _ga
Value: GA1.2.1492990387.1612311304
.securitytechbrief.com/ Name: __utmz
Value: 135802867.1612311304.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)
.securitytechbrief.com/ Name: _gat_gtag_UA_3578655_16
Value: 1
.securitytechbrief.com/ Name: __utmc
Value: 135802867
.securitytechbrief.com/ Name: __utma
Value: 135802867.1492990387.1612311304.1612311304.1612311304.1
.doubleclick.net/ Name: IDE
Value: AHWqTUngM1iI7txeI1gQR7-MWjQ_xcyMFKNUz_8ye15DtOinXCB-9y7wsvnfWe9ALO4
.securitytechbrief.com/ Name: __ocusername
Value: tcwokdkj
.securitytechbrief.com/ Name: _gcnz
Value:
www.securitytechbrief.com/ Name: sj_financial_tpl
Value: sj_financial
.securitytechbrief.com/ Name: _gcl_au
Value: 1.1.1662957208.1612311304
www.securitytechbrief.com/ Name: 9de4cd226fb11624e947853e78bc896f
Value: 153b083866952548dcb4f1aee23783b1

2 Console Messages

Source Level URL
Text
console-api log URL: https://www.securitytechbrief.com/media/plg_jchoptimize/cache/js/a38fc0aa2a213b1211b4444d6e79c969.js(Line 3)
Message:
JQMIGRATE: Migrate is installed, version 1.4.1
console-api log URL: https://www.securitytechbrief.com/media/plg_jchoptimize/cache/js/a38fc0aa2a213b1211b4444d6e79c969.js(Line 3)
Message:
JQMIGRATE: Migrate is installed, version 1.4.1

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

9438555.fls.doubleclick.net
cdn.jsdelivr.net
connect.facebook.net
d.adroll.com
d.adroll.mgr.consensu.org
dpm.demdex.net
in.ml314.com
match.adsrvr.org
ml314.com
platform.linkedin.com
platform.twitter.com
pmg-reg.onecount.net
pmg-validate.onecount.net
ps.eyeota.net
s.adroll.com
securepubads.g.doubleclick.net
ssl.google-analytics.com
sync.crwdcntrl.net
syndication.twitter.com
validate.onecount.net
www.facebook.com
www.google-analytics.com
www.googletagmanager.com
www.googletagservices.com
www.securitytechbrief.com
in.ml314.com
pmg-validate.onecount.net
www.securitytechbrief.com
104.244.42.136
172.81.88.245
172.81.88.251
2.18.233.40
2001:41d0:202:100:91:134:128:88
216.58.207.34
216.58.212.166
2606:2800:233:66b5:799a:7cd3:f74d:7071
2606:2800:234:46c:e8b:1e2f:2bd:694
2a00:1450:4001:800::2002
2a00:1450:4001:821::2008
2a00:1450:4001:824::2008
2a00:1450:4001:825::200e
2a00:1450:4001:827::2002
2a03:2880:f01c:8012:face:b00c:0:3
2a03:2880:f11c:8183:face:b00c:0:25de
2a04:4e42:1b::621
3.121.27.153
35.168.139.27
52.18.215.87
52.30.234.204
52.50.19.208
54.74.225.211
54.76.40.71
91.134.128.88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